3f3a7d5a8991e6dfa37f5dcfcc713fbbb1371af", 0x5) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000140)={0x4, 0x9b, 0x81}) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000001340)=""/7, &(0x7f00000004c0)=0x7) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getitimer(0x3, &(0x7f0000000040)) syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={0x2, {0x2}, {0x2, 0x4e20, @multicast2=0xe0000002}, {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x50, 0x4, 0x455, 0x1ff, 0x8, &(0x7f0000000000)='gre0\x00', 0xfffffffffffffff9, 0x10000, 0x1}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000cb8fd8)={'vcan0\x00'}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000837000)='loginuid\x00') sendfile(r4, r4, &(0x7f000017f000), 0x5) ioctl$KVM_SET_TSS_ADDR(r3, 0xae47, 0xd000) mlock(&(0x7f00006cc000/0x3000)=nil, 0x3000) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000000)={0x0, 0xfffd}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000bb7000/0x18000)=nil, &(0x7f0000000340)=[@text16={0x10, &(0x7f0000000180)="0f20e06635080000000f22e066b9e009000066b8c4d8179b66ba000000000f300f01ba2ce50f080f234b0f300f01c8660f3a0cfb0e650f01cb640f9ae5", 0x3d}], 0x1, 0x11, &(0x7f0000000380)=[@cr0, @cstype3={0x5, 0xd}], 0x2) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x10000) 2018/04/16 23:18:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000a3bff8)={&(0x7f0000000000)=@ipv4_getaddr={0x18, 0x16, 0x223, 0x0, 0x0, {0x2}}, 0x18}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={&(0x7f0000000040)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=""/166, 0xa6}, 0x0) 2018/04/16 23:18:49 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000a3bff8)={&(0x7f0000000000)=@ipv4_getaddr={0x18, 0x16, 0x223, 0x0, 0x0, {0x2}}, 0x18}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={&(0x7f0000000040)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=""/166, 0xa6}, 0x0) 2018/04/16 23:18:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r1, &(0x7f0000000280)=""/191, 0xbf, 0x0, &(0x7f0000000340)=@can={0x1d}, 0x80) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x3, 0x5f5, 0x5f2, 0x0, 0xffffffffffffffff, 0x0, [0x5]}, 0x2c) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x2) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r2) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/loop-control\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x0, 0x4, 0x2, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={r4, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)=0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000080)=0x5f, 0x102000004) ioctl$LOOP_CLR_FD(r3, 0x4c01) sync() name_to_handle_at(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000740), 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000540)=0x80, &(0x7f0000000580)=0x1) getrusage(0xffffffffffffffff, &(0x7f0000000480)) ftruncate(r2, 0x2) dup2(r3, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x9, 0x8) truncate(&(0x7f0000000780)='./file0\x00', 0x3) eventfd2(0x0, 0x0) 2018/04/16 23:18:49 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r1, &(0x7f0000000280)=""/191, 0xbf, 0x0, &(0x7f0000000340)=@can={0x1d}, 0x80) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x3, 0x5f5, 0x5f2, 0x0, 0xffffffffffffffff, 0x0, [0x5]}, 0x2c) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x2) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r2) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/loop-control\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x0, 0x4, 0x2, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={r4, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)=0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000080)=0x5f, 0x102000004) ioctl$LOOP_CLR_FD(r3, 0x4c01) sync() name_to_handle_at(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000740), 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000540)=0x80, &(0x7f0000000580)=0x1) getrusage(0xffffffffffffffff, &(0x7f0000000480)) ftruncate(r2, 0x2) dup2(r3, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x9, 0x8) truncate(&(0x7f0000000780)='./file0\x00', 0x3) eventfd2(0x0, 0x0) [ 820.024843] device bridge_slave_1 left promiscuous mode [ 820.030543] bridge0: port 2(bridge_slave_1) entered disabled state [ 820.064911] device bridge_slave_0 left promiscuous mode 2018/04/16 23:18:49 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000a3bff8)={&(0x7f0000000000)=@ipv4_getaddr={0x18, 0x16, 0x223, 0x0, 0x0, {0x2}}, 0x18}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={&(0x7f0000000040)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=""/166, 0xa6}, 0x0) [ 820.070965] bridge0: port 1(bridge_slave_0) entered disabled state [ 820.124554] IPVS: ftp: loaded support on port[0] = 21 [ 820.169617] team0 (unregistering): Port device team_slave_1 removed [ 820.182839] team0 (unregistering): Port device team_slave_0 removed [ 820.204825] bond0 (unregistering): Releasing backup interface bond_slave_1 2018/04/16 23:18:50 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r1, &(0x7f0000000280)=""/191, 0xbf, 0x0, &(0x7f0000000340)=@can={0x1d}, 0x80) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x3, 0x5f5, 0x5f2, 0x0, 0xffffffffffffffff, 0x0, [0x5]}, 0x2c) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x2) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r2) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/loop-control\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x0, 0x4, 0x2, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={r4, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)=0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000080)=0x5f, 0x102000004) ioctl$LOOP_CLR_FD(r3, 0x4c01) sync() name_to_handle_at(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000740), 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000540)=0x80, &(0x7f0000000580)=0x1) getrusage(0xffffffffffffffff, &(0x7f0000000480)) ftruncate(r2, 0x2) dup2(r3, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x9, 0x8) truncate(&(0x7f0000000780)='./file0\x00', 0x3) eventfd2(0x0, 0x0) [ 820.236285] bond0 (unregistering): Releasing backup interface bond_slave_0 2018/04/16 23:18:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r1, &(0x7f0000000280)=""/191, 0xbf, 0x0, &(0x7f0000000340)=@can={0x1d}, 0x80) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x3, 0x5f5, 0x5f2, 0x0, 0xffffffffffffffff, 0x0, [0x5]}, 0x2c) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x2) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r2) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/loop-control\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x0, 0x4, 0x2, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={r4, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)=0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000080)=0x5f, 0x102000004) ioctl$LOOP_CLR_FD(r3, 0x4c01) sync() name_to_handle_at(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000740), 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000540)=0x80, &(0x7f0000000580)=0x1) getrusage(0xffffffffffffffff, &(0x7f0000000480)) ftruncate(r2, 0x2) dup2(r3, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x9, 0x8) truncate(&(0x7f0000000780)='./file0\x00', 0x3) eventfd2(0x0, 0x0) 2018/04/16 23:18:50 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r1, &(0x7f0000000280)=""/191, 0xbf, 0x0, &(0x7f0000000340)=@can={0x1d}, 0x80) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x3, 0x5f5, 0x5f2, 0x0, 0xffffffffffffffff, 0x0, [0x5]}, 0x2c) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x2) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r2) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/loop-control\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x0, 0x4, 0x2, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={r4, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)=0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000080)=0x5f, 0x102000004) ioctl$LOOP_CLR_FD(r3, 0x4c01) sync() name_to_handle_at(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000740), 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000540)=0x80, &(0x7f0000000580)=0x1) getrusage(0xffffffffffffffff, &(0x7f0000000480)) ftruncate(r2, 0x2) dup2(r3, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x9, 0x8) truncate(&(0x7f0000000780)='./file0\x00', 0x3) eventfd2(0x0, 0x0) [ 820.354771] bond0 (unregistering): Released all slaves 2018/04/16 23:18:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000a3bff8)={&(0x7f0000000000)=@ipv4_getaddr={0x18, 0x16, 0x223, 0x0, 0x0, {0x2}}, 0x18}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={&(0x7f0000000040)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=""/166, 0xa6}, 0x0) 2018/04/16 23:18:50 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000a3bff8)={&(0x7f0000000000)=@ipv4_getaddr={0x18, 0x16, 0x223, 0x0, 0x0, {0x2}}, 0x18}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={&(0x7f0000000040)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=""/166, 0xa6}, 0x0) 2018/04/16 23:18:50 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r1, &(0x7f0000000280)=""/191, 0xbf, 0x0, &(0x7f0000000340)=@can={0x1d}, 0x80) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x3, 0x5f5, 0x5f2, 0x0, 0xffffffffffffffff, 0x0, [0x5]}, 0x2c) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x2) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r2) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/loop-control\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x0, 0x4, 0x2, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={r4, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)=0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000080)=0x5f, 0x102000004) ioctl$LOOP_CLR_FD(r3, 0x4c01) sync() name_to_handle_at(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000740), 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000540)=0x80, &(0x7f0000000580)=0x1) getrusage(0xffffffffffffffff, &(0x7f0000000480)) ftruncate(r2, 0x2) dup2(r3, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x9, 0x8) truncate(&(0x7f0000000780)='./file0\x00', 0x3) eventfd2(0x0, 0x0) 2018/04/16 23:18:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000007000000000000df4000000008"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) [ 821.389354] bridge0: port 1(bridge_slave_0) entered blocking state [ 821.395840] bridge0: port 1(bridge_slave_0) entered disabled state [ 821.403502] device bridge_slave_0 entered promiscuous mode [ 821.441734] bridge0: port 2(bridge_slave_1) entered blocking state [ 821.448190] bridge0: port 2(bridge_slave_1) entered disabled state [ 821.456203] device bridge_slave_1 entered promiscuous mode [ 821.495431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 821.536239] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 821.654904] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 821.697831] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 821.881830] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 821.889317] team0: Port device team_slave_0 added [ 821.926896] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 821.934366] team0: Port device team_slave_1 added [ 821.966136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 822.007766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 822.044569] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 822.051700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 822.059709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 822.097316] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 822.104544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 822.112660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 822.389755] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.396171] bridge0: port 2(bridge_slave_1) entered forwarding state [ 822.402825] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.409212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 822.416594] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 823.071136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 823.278373] 8021q: adding VLAN 0 to HW filter on device bond0 [ 823.362263] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 823.446550] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 823.452743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 823.460572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 823.539219] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:18:53 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r1, &(0x7f0000000280)=""/191, 0xbf, 0x0, &(0x7f0000000340)=@can={0x1d}, 0x80) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x3, 0x5f5, 0x5f2, 0x0, 0xffffffffffffffff, 0x0, [0x5]}, 0x2c) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x2) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r2) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/loop-control\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x0, 0x4, 0x2, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={r4, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)=0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000080)=0x5f, 0x102000004) ioctl$LOOP_CLR_FD(r3, 0x4c01) sync() name_to_handle_at(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="02010000ffffff7f65a32bca7a9579dbea27247b829ce7a0e7bdfffd54cd01877c76968da8d2aa0e8d44da462ca6b7a8a56a990807f2103a665f2cfceb5323c622001311e458542cc58d000200008500000000000000e504b0d98f7041ceba83d8d70ed8be00100000bcac359c6c12d2ef1327bfcc3748be7731000000000000001eb1bf83a418871a6ea5c3a7775d9972a80f2e6f157afc6a343fcd942ca4bdc92cd40cbf63cf12eae46bd3a22c4d21182c062fb26e798c123e2a3586b195e51fb0f032185c872b745b60b08b51269af6b3bebfee5a8c642c7a33132e79e12a961a39bd0c1ef5af4b637cf4fedda1850c25f2c2b3b8eb45f57b89968b"], &(0x7f0000000740), 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000540)=0x80, &(0x7f0000000580)=0x1) getrusage(0xffffffffffffffff, &(0x7f0000000480)) ftruncate(r2, 0x2) dup2(r3, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x9, 0x8) truncate(&(0x7f0000000780)='./file0\x00', 0x3) eventfd2(0x0, 0x0) 2018/04/16 23:18:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000007000000000000df4000000008"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 2018/04/16 23:18:53 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000042ff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000da1000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000061000)={0xfffffffffffffffd}, &(0x7f0000039ff0), &(0x7f0000039ff0)={0x77359400, 0xffff}, 0x8) truncate(&(0x7f0000373000)='./file0\x00', 0x0) fcntl$getflags(r0, 0x401) 2018/04/16 23:18:53 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000007ff6)='/dev/dsp#\x00', 0x2800000001, 0x400000041) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000006000)) 2018/04/16 23:18:53 executing program 2: exit(0x9000) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value={0x0, 0x7}, 0x8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)="eabba32122600ea879d1b2aae9e9059c17c791208d0865a8f8e76805a0bd9b99194126653e8a874f88419815cacd490fd41068b33baa0001a0345e733b36b659a57a0e3c964065f37f769606f3a97a731d790ddc25661275424f755d8667dc0148da894f3001a1a0d4f496cc901510e36bfc625755d5381cba01e6be93123fb8bc9e008663f3a7d5a8991e6dfa37f5dcfcc713fbbb1371af", 0x5) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000140)={0x4, 0x9b, 0x81}) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000001340)=""/7, &(0x7f00000004c0)=0x7) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getitimer(0x3, &(0x7f0000000040)) syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={0x2, {0x2}, {0x2, 0x4e20, @multicast2=0xe0000002}, {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x50, 0x4, 0x455, 0x1ff, 0x8, &(0x7f0000000000)='gre0\x00', 0xfffffffffffffff9, 0x10000, 0x1}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000cb8fd8)={'vcan0\x00'}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000837000)='loginuid\x00') sendfile(r4, r4, &(0x7f000017f000), 0x5) ioctl$KVM_SET_TSS_ADDR(r3, 0xae47, 0xd000) mlock(&(0x7f00006cc000/0x3000)=nil, 0x3000) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000000)={0x0, 0xfffd}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000bb7000/0x18000)=nil, &(0x7f0000000340)=[@text16={0x10, &(0x7f0000000180)="0f20e06635080000000f22e066b9e009000066b8c4d8179b66ba000000000f300f01ba2ce50f080f234b0f300f01c8660f3a0cfb0e650f01cb640f9ae5", 0x3d}], 0x1, 0x11, &(0x7f0000000380)=[@cr0, @cstype3={0x5, 0xd}], 0x2) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x10000) 2018/04/16 23:18:53 executing program 3: exit(0x9000) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value={0x0, 0x7}, 0x8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)="eabba32122600ea879d1b2aae9e9059c17c791208d0865a8f8e76805a0bd9b99194126653e8a874f88419815cacd490fd41068b33baa0001a0345e733b36b659a57a0e3c964065f37f769606f3a97a731d790ddc25661275424f755d8667dc0148da894f3001a1a0d4f496cc901510e36bfc625755d5381cba01e6be93123fb8bc9e008663f3a7d5a8991e6dfa37f5dcfcc713fbbb1371af", 0x5) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000140)={0x4, 0x9b, 0x81}) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000001340)=""/7, &(0x7f00000004c0)=0x7) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getitimer(0x3, &(0x7f0000000040)) syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={0x2, {0x2}, {0x2, 0x4e20, @multicast2=0xe0000002}, {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x50, 0x4, 0x455, 0x1ff, 0x8, &(0x7f0000000000)='gre0\x00', 0xfffffffffffffff9, 0x10000, 0x1}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000cb8fd8)={'vcan0\x00'}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000837000)='loginuid\x00') sendfile(r4, r4, &(0x7f000017f000), 0x5) ioctl$KVM_SET_TSS_ADDR(r3, 0xae47, 0xd000) mlock(&(0x7f00006cc000/0x3000)=nil, 0x3000) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000000)={0x0, 0xfffd}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000bb7000/0x18000)=nil, &(0x7f0000000340)=[@text16={0x10, &(0x7f0000000180)="0f20e06635080000000f22e066b9e009000066b8c4d8179b66ba000000000f300f01ba2ce50f080f234b0f300f01c8660f3a0cfb0e650f01cb640f9ae5", 0x3d}], 0x1, 0x11, &(0x7f0000000380)=[@cr0, @cstype3={0x5, 0xd}], 0x2) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x10000) 2018/04/16 23:18:53 executing program 6: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r0, &(0x7f0000002b40)=[{{&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/244, 0xf4}], 0x1, &(0x7f00000002c0)=""/170, 0xaa}}, {{&(0x7f0000000380)=@can, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/178, 0xfffffffffffffe82}], 0x2, &(0x7f0000000540)=""/132, 0x84}}, {{&(0x7f0000000600)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000000680)=""/59, 0x3b}, {&(0x7f00000006c0)=""/82, 0x52}], 0x2, &(0x7f0000000780)=""/92, 0xfffffffffffffe2e}}, {{&(0x7f0000000800)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000880)=""/30, 0x1e}, {&(0x7f00000008c0)=""/133, 0x85}, {&(0x7f0000000980)=""/248, 0xffffffc3}, {&(0x7f0000000a80)=""/115, 0x73}], 0x4, &(0x7f0000000b40)=""/80, 0x50}}, {{&(0x7f0000000bc0)=@can, 0x80, &(0x7f0000001040)=[{&(0x7f0000000c40)=""/52, 0x34}, {&(0x7f0000000c80)=""/238, 0xee}, {&(0x7f0000000d80)=""/116, 0x74}, {&(0x7f0000000e00)=""/239, 0xef}, {&(0x7f0000000f00)=""/102, 0x66}, {&(0x7f0000000f80)=""/172, 0xac}], 0x6, &(0x7f00000010c0)=""/81, 0x51}}, {{&(0x7f0000001140)=@nl=@proc, 0x80, &(0x7f0000002600)=[{&(0x7f00000011c0)=""/99, 0x63}, {&(0x7f0000001240)=""/105, 0x69}, {&(0x7f00000012c0)=""/124, 0x7c}, {&(0x7f0000001340)=""/32, 0x18a}, {&(0x7f0000001380)=""/228, 0xe4}, {&(0x7f0000001480)=""/6, 0x6}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/213, 0xd5}, {&(0x7f00000025c0)=""/15, 0xf}], 0x9, &(0x7f00000026c0)=""/191, 0xbf}}, {{&(0x7f0000002780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000002a80)=[{&(0x7f0000002800)=""/95, 0x5f}, {&(0x7f0000002880)=""/53, 0x35}, {&(0x7f00000028c0)=""/129, 0x81}, {&(0x7f0000002980)=""/93, 0x5d}, {&(0x7f0000002a00)=""/106, 0x6a}], 0x5, &(0x7f0000002b00)=""/2, 0x2}}], 0x7, 0x0, &(0x7f0000002d00)={0x0, 0x1c9c380}) sendmsg(r0, &(0x7f0000003080)={&(0x7f0000002d80)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(rfc4106-gcm-aesni)\x00'}, 0x80, &(0x7f0000002ec0), 0x0, &(0x7f0000002f00)}, 0x0) 2018/04/16 23:18:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r1, &(0x7f0000000280)=""/191, 0xbf, 0x0, &(0x7f0000000340)=@can={0x1d}, 0x80) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x3, 0x5f5, 0x5f2, 0x0, 0xffffffffffffffff, 0x0, [0x5]}, 0x2c) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x2) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r2) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/loop-control\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x0, 0x4, 0x2, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={r4, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)=0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000080)=0x5f, 0x102000004) ioctl$LOOP_CLR_FD(r3, 0x4c01) sync() name_to_handle_at(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000740), 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000540)=0x80, &(0x7f0000000580)=0x1) getrusage(0xffffffffffffffff, &(0x7f0000000480)) ftruncate(r2, 0x2) dup2(r3, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x9, 0x8) truncate(&(0x7f0000000780)='./file0\x00', 0x3) eventfd2(0x0, 0x0) 2018/04/16 23:18:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000007000000000000df4000000008"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 2018/04/16 23:18:53 executing program 6: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r0, &(0x7f0000002b40)=[{{&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/244, 0xf4}], 0x1, &(0x7f00000002c0)=""/170, 0xaa}}, {{&(0x7f0000000380)=@can, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/178, 0xfffffffffffffe82}], 0x2, &(0x7f0000000540)=""/132, 0x84}}, {{&(0x7f0000000600)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000000680)=""/59, 0x3b}, {&(0x7f00000006c0)=""/82, 0x52}], 0x2, &(0x7f0000000780)=""/92, 0xfffffffffffffe2e}}, {{&(0x7f0000000800)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000880)=""/30, 0x1e}, {&(0x7f00000008c0)=""/133, 0x85}, {&(0x7f0000000980)=""/248, 0xffffffc3}, {&(0x7f0000000a80)=""/115, 0x73}], 0x4, &(0x7f0000000b40)=""/80, 0x50}}, {{&(0x7f0000000bc0)=@can, 0x80, &(0x7f0000001040)=[{&(0x7f0000000c40)=""/52, 0x34}, {&(0x7f0000000c80)=""/238, 0xee}, {&(0x7f0000000d80)=""/116, 0x74}, {&(0x7f0000000e00)=""/239, 0xef}, {&(0x7f0000000f00)=""/102, 0x66}, {&(0x7f0000000f80)=""/172, 0xac}], 0x6, &(0x7f00000010c0)=""/81, 0x51}}, {{&(0x7f0000001140)=@nl=@proc, 0x80, &(0x7f0000002600)=[{&(0x7f00000011c0)=""/99, 0x63}, {&(0x7f0000001240)=""/105, 0x69}, {&(0x7f00000012c0)=""/124, 0x7c}, {&(0x7f0000001340)=""/32, 0x18a}, {&(0x7f0000001380)=""/228, 0xe4}, {&(0x7f0000001480)=""/6, 0x6}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/213, 0xd5}, {&(0x7f00000025c0)=""/15, 0xf}], 0x9, &(0x7f00000026c0)=""/191, 0xbf}}, {{&(0x7f0000002780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000002a80)=[{&(0x7f0000002800)=""/95, 0x5f}, {&(0x7f0000002880)=""/53, 0x35}, {&(0x7f00000028c0)=""/129, 0x81}, {&(0x7f0000002980)=""/93, 0x5d}, {&(0x7f0000002a00)=""/106, 0x6a}], 0x5, &(0x7f0000002b00)=""/2, 0x2}}], 0x7, 0x0, &(0x7f0000002d00)={0x0, 0x1c9c380}) sendmsg(r0, &(0x7f0000003080)={&(0x7f0000002d80)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(rfc4106-gcm-aesni)\x00'}, 0x80, &(0x7f0000002ec0), 0x0, &(0x7f0000002f00)}, 0x0) 2018/04/16 23:18:53 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000007ff6)='/dev/dsp#\x00', 0x2800000001, 0x400000041) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000006000)) 2018/04/16 23:18:54 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000007000000000000df4000000008"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) [ 824.282845] device bridge_slave_1 left promiscuous mode [ 824.289617] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:18:54 executing program 6: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r0, &(0x7f0000002b40)=[{{&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/244, 0xf4}], 0x1, &(0x7f00000002c0)=""/170, 0xaa}}, {{&(0x7f0000000380)=@can, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/178, 0xfffffffffffffe82}], 0x2, &(0x7f0000000540)=""/132, 0x84}}, {{&(0x7f0000000600)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000000680)=""/59, 0x3b}, {&(0x7f00000006c0)=""/82, 0x52}], 0x2, &(0x7f0000000780)=""/92, 0xfffffffffffffe2e}}, {{&(0x7f0000000800)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000880)=""/30, 0x1e}, {&(0x7f00000008c0)=""/133, 0x85}, {&(0x7f0000000980)=""/248, 0xffffffc3}, {&(0x7f0000000a80)=""/115, 0x73}], 0x4, &(0x7f0000000b40)=""/80, 0x50}}, {{&(0x7f0000000bc0)=@can, 0x80, &(0x7f0000001040)=[{&(0x7f0000000c40)=""/52, 0x34}, {&(0x7f0000000c80)=""/238, 0xee}, {&(0x7f0000000d80)=""/116, 0x74}, {&(0x7f0000000e00)=""/239, 0xef}, {&(0x7f0000000f00)=""/102, 0x66}, {&(0x7f0000000f80)=""/172, 0xac}], 0x6, &(0x7f00000010c0)=""/81, 0x51}}, {{&(0x7f0000001140)=@nl=@proc, 0x80, &(0x7f0000002600)=[{&(0x7f00000011c0)=""/99, 0x63}, {&(0x7f0000001240)=""/105, 0x69}, {&(0x7f00000012c0)=""/124, 0x7c}, {&(0x7f0000001340)=""/32, 0x18a}, {&(0x7f0000001380)=""/228, 0xe4}, {&(0x7f0000001480)=""/6, 0x6}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/213, 0xd5}, {&(0x7f00000025c0)=""/15, 0xf}], 0x9, &(0x7f00000026c0)=""/191, 0xbf}}, {{&(0x7f0000002780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000002a80)=[{&(0x7f0000002800)=""/95, 0x5f}, {&(0x7f0000002880)=""/53, 0x35}, {&(0x7f00000028c0)=""/129, 0x81}, {&(0x7f0000002980)=""/93, 0x5d}, {&(0x7f0000002a00)=""/106, 0x6a}], 0x5, &(0x7f0000002b00)=""/2, 0x2}}], 0x7, 0x0, &(0x7f0000002d00)={0x0, 0x1c9c380}) sendmsg(r0, &(0x7f0000003080)={&(0x7f0000002d80)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(rfc4106-gcm-aesni)\x00'}, 0x80, &(0x7f0000002ec0), 0x0, &(0x7f0000002f00)}, 0x0) 2018/04/16 23:18:54 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000007ff6)='/dev/dsp#\x00', 0x2800000001, 0x400000041) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000006000)) [ 824.334343] device bridge_slave_0 left promiscuous mode [ 824.339985] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:18:54 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000007ff6)='/dev/dsp#\x00', 0x2800000001, 0x400000041) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000006000)) [ 824.410823] IPVS: ftp: loaded support on port[0] = 21 2018/04/16 23:18:54 executing program 1: r0 = socket(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x0, 0x7, 0x0, "c96632088e9da8eb5182b72b249a5bc3775b4e01f76cb0a4af4040c3bbb56cf91ebd9e89612db143e43a36ac56b69af1d9f832119f0b883db3669fd3cbe4bb320a1e1174ab443dffbc865d9059496801"}, 0xd8) 2018/04/16 23:18:54 executing program 6: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r0, &(0x7f0000002b40)=[{{&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/244, 0xf4}], 0x1, &(0x7f00000002c0)=""/170, 0xaa}}, {{&(0x7f0000000380)=@can, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/178, 0xfffffffffffffe82}], 0x2, &(0x7f0000000540)=""/132, 0x84}}, {{&(0x7f0000000600)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000000680)=""/59, 0x3b}, {&(0x7f00000006c0)=""/82, 0x52}], 0x2, &(0x7f0000000780)=""/92, 0xfffffffffffffe2e}}, {{&(0x7f0000000800)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000880)=""/30, 0x1e}, {&(0x7f00000008c0)=""/133, 0x85}, {&(0x7f0000000980)=""/248, 0xffffffc3}, {&(0x7f0000000a80)=""/115, 0x73}], 0x4, &(0x7f0000000b40)=""/80, 0x50}}, {{&(0x7f0000000bc0)=@can, 0x80, &(0x7f0000001040)=[{&(0x7f0000000c40)=""/52, 0x34}, {&(0x7f0000000c80)=""/238, 0xee}, {&(0x7f0000000d80)=""/116, 0x74}, {&(0x7f0000000e00)=""/239, 0xef}, {&(0x7f0000000f00)=""/102, 0x66}, {&(0x7f0000000f80)=""/172, 0xac}], 0x6, &(0x7f00000010c0)=""/81, 0x51}}, {{&(0x7f0000001140)=@nl=@proc, 0x80, &(0x7f0000002600)=[{&(0x7f00000011c0)=""/99, 0x63}, {&(0x7f0000001240)=""/105, 0x69}, {&(0x7f00000012c0)=""/124, 0x7c}, {&(0x7f0000001340)=""/32, 0x18a}, {&(0x7f0000001380)=""/228, 0xe4}, {&(0x7f0000001480)=""/6, 0x6}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/213, 0xd5}, {&(0x7f00000025c0)=""/15, 0xf}], 0x9, &(0x7f00000026c0)=""/191, 0xbf}}, {{&(0x7f0000002780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000002a80)=[{&(0x7f0000002800)=""/95, 0x5f}, {&(0x7f0000002880)=""/53, 0x35}, {&(0x7f00000028c0)=""/129, 0x81}, {&(0x7f0000002980)=""/93, 0x5d}, {&(0x7f0000002a00)=""/106, 0x6a}], 0x5, &(0x7f0000002b00)=""/2, 0x2}}], 0x7, 0x0, &(0x7f0000002d00)={0x0, 0x1c9c380}) sendmsg(r0, &(0x7f0000003080)={&(0x7f0000002d80)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(rfc4106-gcm-aesni)\x00'}, 0x80, &(0x7f0000002ec0), 0x0, &(0x7f0000002f00)}, 0x0) 2018/04/16 23:18:54 executing program 1: r0 = socket(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x0, 0x7, 0x0, "c96632088e9da8eb5182b72b249a5bc3775b4e01f76cb0a4af4040c3bbb56cf91ebd9e89612db143e43a36ac56b69af1d9f832119f0b883db3669fd3cbe4bb320a1e1174ab443dffbc865d9059496801"}, 0xd8) [ 824.470646] team0 (unregistering): Port device team_slave_1 removed [ 824.509323] team0 (unregistering): Port device team_slave_0 removed [ 824.542997] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 824.565877] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 824.592123] bond0 (unregistering): Released all slaves [ 825.353112] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.359555] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.373905] device bridge_slave_0 entered promiscuous mode [ 825.423393] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.429881] bridge0: port 2(bridge_slave_1) entered disabled state [ 825.438293] device bridge_slave_1 entered promiscuous mode [ 825.477818] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 825.519471] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 825.637659] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 825.680519] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 825.857240] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 825.865410] team0: Port device team_slave_0 added [ 825.903466] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 825.911717] team0: Port device team_slave_1 added [ 825.949302] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 825.977408] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 826.017006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 826.057879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 826.315379] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.321767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 826.328411] bridge0: port 1(bridge_slave_0) entered blocking state [ 826.334770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 826.341995] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 827.167829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 827.203671] 8021q: adding VLAN 0 to HW filter on device bond0 [ 827.290284] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 827.371906] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 827.378131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 827.385265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 827.463496] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:18:57 executing program 3: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0xffff, 0x4) fallocate(r0, 0x0, 0x4b99, 0x5) fallocate(r0, 0x1, 0x0, 0x4000003) ioctl$fiemap(r0, 0xc020660b, &(0x7f00000000c0)={0x0, 0x1, 0x6}) 2018/04/16 23:18:57 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0x58) 2018/04/16 23:18:57 executing program 1: r0 = socket(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x0, 0x7, 0x0, "c96632088e9da8eb5182b72b249a5bc3775b4e01f76cb0a4af4040c3bbb56cf91ebd9e89612db143e43a36ac56b69af1d9f832119f0b883db3669fd3cbe4bb320a1e1174ab443dffbc865d9059496801"}, 0xd8) 2018/04/16 23:18:57 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e74e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x60}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x6f2000, 0x6f2000, 0x1, &(0x7f0000000040)) 2018/04/16 23:18:57 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000007ff6)='/dev/dsp#\x00', 0x2800000001, 0x400000041) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000006000)) 2018/04/16 23:18:57 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000007ff6)='/dev/dsp#\x00', 0x2800000001, 0x400000041) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000006000)) 2018/04/16 23:18:57 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x258, 0x0, 0x3}]}) 2018/04/16 23:18:57 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000240)={0x1}, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_wait(r1, &(0x7f000000affb)=[{}], 0xda, 0xfffffffffffffef7) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000200)=0x6) shutdown(r0, 0x1) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x7f, 0x9, 0x200, 0x4, 0x60000000, 0x800000000008, 0x6, 0x800, r2}, 0x20) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000140)={r2, 0x7ff, 0x7, 0x10000, 0x200, 0x3ff}, 0x14) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r2, 0xfff}, &(0x7f00000001c0)=0x8) 2018/04/16 23:18:57 executing program 1: r0 = socket(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x0, 0x7, 0x0, "c96632088e9da8eb5182b72b249a5bc3775b4e01f76cb0a4af4040c3bbb56cf91ebd9e89612db143e43a36ac56b69af1d9f832119f0b883db3669fd3cbe4bb320a1e1174ab443dffbc865d9059496801"}, 0xd8) 2018/04/16 23:18:57 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000007ff6)='/dev/dsp#\x00', 0x2800000001, 0x400000041) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000006000)) 2018/04/16 23:18:57 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x258, 0x0, 0x3}]}) 2018/04/16 23:18:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f0000791000)={0x10}, 0xc, &(0x7f0000dd0ff0)={&(0x7f0000d3dc98)={0x14, 0xa, 0xa, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/16 23:18:57 executing program 3: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0xffff, 0x4) fallocate(r0, 0x0, 0x4b99, 0x5) fallocate(r0, 0x1, 0x0, 0x4000003) ioctl$fiemap(r0, 0xc020660b, &(0x7f00000000c0)={0x0, 0x1, 0x6}) 2018/04/16 23:18:58 executing program 1: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)="d8", 0x1) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) lseek(r0, 0x0, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x0) [ 828.264380] device bridge_slave_1 left promiscuous mode [ 828.270131] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:18:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f0000791000)={0x10}, 0xc, &(0x7f0000dd0ff0)={&(0x7f0000d3dc98)={0x14, 0xa, 0xa, 0x1}, 0x14}, 0x1}, 0x0) [ 828.309401] device bridge_slave_0 left promiscuous mode [ 828.315134] bridge0: port 1(bridge_slave_0) entered disabled state [ 828.437194] IPVS: ftp: loaded support on port[0] = 21 [ 828.473834] team0 (unregistering): Port device team_slave_1 removed [ 828.486752] team0 (unregistering): Port device team_slave_0 removed [ 828.499826] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 828.627396] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 828.796950] bond0 (unregistering): Released all slaves [ 829.576323] bridge0: port 1(bridge_slave_0) entered blocking state [ 829.582754] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.590136] device bridge_slave_0 entered promiscuous mode [ 829.629713] bridge0: port 2(bridge_slave_1) entered blocking state [ 829.636140] bridge0: port 2(bridge_slave_1) entered disabled state [ 829.644125] device bridge_slave_1 entered promiscuous mode [ 829.681491] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 829.719158] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 829.835858] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 829.876719] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 830.056462] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 830.063951] team0: Port device team_slave_0 added [ 830.123480] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 830.130938] team0: Port device team_slave_1 added [ 830.160587] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 830.199934] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 830.241160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 830.273755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 830.537671] bridge0: port 2(bridge_slave_1) entered blocking state [ 830.544074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 830.550734] bridge0: port 1(bridge_slave_0) entered blocking state [ 830.557099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 830.564433] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 831.327736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 831.382855] 8021q: adding VLAN 0 to HW filter on device bond0 [ 831.467487] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 831.549760] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 831.555968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 831.563746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 831.642380] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:01 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0x58) 2018/04/16 23:19:01 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x258, 0x0, 0x3}]}) 2018/04/16 23:19:01 executing program 3: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0xffff, 0x4) fallocate(r0, 0x0, 0x4b99, 0x5) fallocate(r0, 0x1, 0x0, 0x4000003) ioctl$fiemap(r0, 0xc020660b, &(0x7f00000000c0)={0x0, 0x1, 0x6}) 2018/04/16 23:19:01 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000240)={0x1}, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_wait(r1, &(0x7f000000affb)=[{}], 0xda, 0xfffffffffffffef7) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000200)=0x6) shutdown(r0, 0x1) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x7f, 0x9, 0x200, 0x4, 0x60000000, 0x800000000008, 0x6, 0x800, r2}, 0x20) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000140)={r2, 0x7ff, 0x7, 0x10000, 0x200, 0x3ff}, 0x14) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r2, 0xfff}, &(0x7f00000001c0)=0x8) 2018/04/16 23:19:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f0000791000)={0x10}, 0xc, &(0x7f0000dd0ff0)={&(0x7f0000d3dc98)={0x14, 0xa, 0xa, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/16 23:19:01 executing program 2: mkdir(&(0x7f0000fb3000)='./file0\x00', 0x0) mount(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='mqueue\x00', 0x0, &(0x7f0000e2ef53)) umount2(&(0x7f0000000040)='./file0\x00', 0x7) 2018/04/16 23:19:01 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000dc0fef)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x40096102, &(0x7f0000000180)) 2018/04/16 23:19:01 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="220000002000070700cbe6ff080007010a00001e000000000000040004001180ff41", 0x22) 2018/04/16 23:19:02 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000dc0fef)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x40096102, &(0x7f0000000180)) 2018/04/16 23:19:02 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x258, 0x0, 0x3}]}) 2018/04/16 23:19:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f0000791000)={0x10}, 0xc, &(0x7f0000dd0ff0)={&(0x7f0000d3dc98)={0x14, 0xa, 0xa, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/16 23:19:02 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="220000002000070700cbe6ff080007010a00001e000000000000040004001180ff41", 0x22) 2018/04/16 23:19:02 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0x58) [ 832.304547] IPVS: ftp: loaded support on port[0] = 21 2018/04/16 23:19:02 executing program 3: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0xffff, 0x4) fallocate(r0, 0x0, 0x4b99, 0x5) fallocate(r0, 0x1, 0x0, 0x4000003) ioctl$fiemap(r0, 0xc020660b, &(0x7f00000000c0)={0x0, 0x1, 0x6}) [ 832.434737] device bridge_slave_1 left promiscuous mode [ 832.440411] bridge0: port 2(bridge_slave_1) entered disabled state [ 832.476382] device bridge_slave_0 left promiscuous mode [ 832.482161] bridge0: port 1(bridge_slave_0) entered disabled state [ 832.540785] team0 (unregistering): Port device team_slave_1 removed [ 832.551170] team0 (unregistering): Port device team_slave_0 removed [ 832.560851] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 832.581364] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 832.611439] bond0 (unregistering): Released all slaves [ 833.192527] bridge0: port 1(bridge_slave_0) entered blocking state [ 833.198961] bridge0: port 1(bridge_slave_0) entered disabled state [ 833.206301] device bridge_slave_0 entered promiscuous mode [ 833.244047] bridge0: port 2(bridge_slave_1) entered blocking state [ 833.250468] bridge0: port 2(bridge_slave_1) entered disabled state [ 833.258509] device bridge_slave_1 entered promiscuous mode [ 833.295176] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 833.331381] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 833.438874] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 833.479604] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 833.517487] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 833.524667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 833.666773] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 833.675531] team0: Port device team_slave_0 added [ 833.712052] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 833.719736] team0: Port device team_slave_1 added [ 833.753926] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 833.791784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 833.830064] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 833.837401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 833.852856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 833.871220] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 833.878367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 833.889174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 834.137947] bridge0: port 2(bridge_slave_1) entered blocking state [ 834.144352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 834.150993] bridge0: port 1(bridge_slave_0) entered blocking state [ 834.157358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 834.164835] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 834.383129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 834.992670] 8021q: adding VLAN 0 to HW filter on device bond0 [ 835.073827] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 835.155619] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 835.161860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 835.168979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 835.247392] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:05 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0x58) 2018/04/16 23:19:05 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000dc0fef)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x40096102, &(0x7f0000000180)) 2018/04/16 23:19:05 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="220000002000070700cbe6ff080007010a00001e000000000000040004001180ff41", 0x22) 2018/04/16 23:19:05 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000001540)='./file0\x00', 0x0, 0x0, &(0x7f0000002580), 0x0, &(0x7f00000025c0)={'nouuid,'}) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) rmdir(&(0x7f0000000100)='./file0\x00') 2018/04/16 23:19:05 executing program 6: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100), &(0x7f0000000140)=0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) sync() getpid() getrusage(0x0, &(0x7f0000000480)) dup2(r1, r0) eventfd2(0x0, 0x0) 2018/04/16 23:19:05 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f}, 0x0) 2018/04/16 23:19:05 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000240)={0x1}, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_wait(r1, &(0x7f000000affb)=[{}], 0xda, 0xfffffffffffffef7) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000200)=0x6) shutdown(r0, 0x1) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x7f, 0x9, 0x200, 0x4, 0x60000000, 0x800000000008, 0x6, 0x800, r2}, 0x20) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000140)={r2, 0x7ff, 0x7, 0x10000, 0x200, 0x3ff}, 0x14) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r2, 0xfff}, &(0x7f00000001c0)=0x8) 2018/04/16 23:19:05 executing program 5: r0 = open(&(0x7f000001dff8)='./file0\x00', 0x80040, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000db4ff8)='./file0\x00', 0x12) close(r0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/27, 0x1b}], 0x1) 2018/04/16 23:19:05 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000dc0fef)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x40096102, &(0x7f0000000180)) 2018/04/16 23:19:05 executing program 5: r0 = open(&(0x7f000001dff8)='./file0\x00', 0x80040, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000db4ff8)='./file0\x00', 0x12) close(r0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/27, 0x1b}], 0x1) 2018/04/16 23:19:05 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="220000002000070700cbe6ff080007010a00001e000000000000040004001180ff41", 0x22) 2018/04/16 23:19:05 executing program 7: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_int(r0, 0x1, 0x38, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 835.942173] XFS (loop3): Invalid superblock magic number 2018/04/16 23:19:05 executing program 5: r0 = open(&(0x7f000001dff8)='./file0\x00', 0x80040, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000db4ff8)='./file0\x00', 0x12) close(r0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/27, 0x1b}], 0x1) 2018/04/16 23:19:05 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000180)={{&(0x7f0000000080)=""/133, 0x85}, &(0x7f0000000140)}, 0x1) 2018/04/16 23:19:05 executing program 1: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000003e000)='@&prockeyring\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000f36000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000030c000)={0x0, 0x0, 0x0, "98de7a8c5ae95ec8792c92150fc33a664f13eeab65c0322901ca6bd31bde2c51f06c5f0b014f9f91eeb7647c7240f476c8d75dd000aa8faf8fb5740200a6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x408c5333, &(0x7f0000044000)) 2018/04/16 23:19:05 executing program 3: clock_getres(0xfffffffffffffffd, &(0x7f00000000c0)) 2018/04/16 23:19:05 executing program 6: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100), &(0x7f0000000140)=0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) sync() getpid() getrusage(0x0, &(0x7f0000000480)) dup2(r1, r0) eventfd2(0x0, 0x0) [ 836.130276] device bridge_slave_1 left promiscuous mode [ 836.135961] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:19:06 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100), &(0x7f0000000140)=0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) sync() getpid() getrusage(0x0, &(0x7f0000000480)) dup2(r1, r0) eventfd2(0x0, 0x0) [ 836.210652] device bridge_slave_0 left promiscuous mode [ 836.216366] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.355935] team0 (unregistering): Port device team_slave_1 removed [ 836.370348] team0 (unregistering): Port device team_slave_0 removed [ 836.384355] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 836.413439] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 836.453053] bond0 (unregistering): Released all slaves [ 837.245215] IPVS: ftp: loaded support on port[0] = 21 [ 837.606766] bridge0: port 1(bridge_slave_0) entered blocking state [ 837.613156] bridge0: port 1(bridge_slave_0) entered disabled state [ 837.620341] device bridge_slave_0 entered promiscuous mode [ 837.647121] bridge0: port 2(bridge_slave_1) entered blocking state [ 837.653501] bridge0: port 2(bridge_slave_1) entered disabled state [ 837.660660] device bridge_slave_1 entered promiscuous mode [ 837.684920] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 837.709372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 837.778535] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 837.806437] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 837.832896] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 837.839783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 837.865979] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 837.872872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 837.941902] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 837.949112] team0: Port device team_slave_0 added [ 837.973590] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 837.980749] team0: Port device team_slave_1 added [ 838.006922] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 838.033452] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 838.058861] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 838.066098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 838.074177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 838.094923] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 838.102064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 838.109968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 838.325628] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.332059] bridge0: port 2(bridge_slave_1) entered forwarding state [ 838.338723] bridge0: port 1(bridge_slave_0) entered blocking state [ 838.345082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 838.352436] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 838.815499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 839.163842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 839.243225] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 839.326305] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 839.332538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 839.340186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 839.416687] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:09 executing program 5: r0 = open(&(0x7f000001dff8)='./file0\x00', 0x80040, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000db4ff8)='./file0\x00', 0x12) close(r0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/27, 0x1b}], 0x1) 2018/04/16 23:19:09 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100), &(0x7f0000000140)=0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) sync() getpid() getrusage(0x0, &(0x7f0000000480)) dup2(r1, r0) eventfd2(0x0, 0x0) 2018/04/16 23:19:09 executing program 6: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100), &(0x7f0000000140)=0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) sync() getpid() getrusage(0x0, &(0x7f0000000480)) dup2(r1, r0) eventfd2(0x0, 0x0) 2018/04/16 23:19:09 executing program 1: prctl$intptr(0x26, 0x1) seccomp(0x1, 0x3, &(0x7f0000007ff0)={0x1, &(0x7f000004dff0)=[{0x6}]}) 2018/04/16 23:19:09 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000180)={{&(0x7f0000000080)=""/133, 0x85}, &(0x7f0000000140)}, 0x1) 2018/04/16 23:19:09 executing program 2: perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160d49cb6cce76c27289a4f9d097354aaa5860d2383df87526baa184d90bb7729366c17bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)=0xfffffffffffffffd) 2018/04/16 23:19:09 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040)=0x7, 0x4) sendmsg(r0, &(0x7f0000001600)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f0000001540), 0x0, &(0x7f0000000000)}, 0x0) 2018/04/16 23:19:09 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000240)={0x1}, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_wait(r1, &(0x7f000000affb)=[{}], 0xda, 0xfffffffffffffef7) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000200)=0x6) shutdown(r0, 0x1) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x7f, 0x9, 0x200, 0x4, 0x60000000, 0x800000000008, 0x6, 0x800, r2}, 0x20) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000140)={r2, 0x7ff, 0x7, 0x10000, 0x200, 0x3ff}, 0x14) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r2, 0xfff}, &(0x7f00000001c0)=0x8) 2018/04/16 23:19:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000003000)=ANY=[@ANYRES32=0x0, @ANYBLOB='oHW'], 0x2) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000002ff0)) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000040)) [ 839.965610] audit: type=1326 audit(1523920749.731:11): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27824 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x0 2018/04/16 23:19:09 executing program 1: prctl$intptr(0x26, 0x1) seccomp(0x1, 0x3, &(0x7f0000007ff0)={0x1, &(0x7f000004dff0)=[{0x6}]}) 2018/04/16 23:19:09 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040)=0x7, 0x4) sendmsg(r0, &(0x7f0000001600)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f0000001540), 0x0, &(0x7f0000000000)}, 0x0) 2018/04/16 23:19:09 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000180)={{&(0x7f0000000080)=""/133, 0x85}, &(0x7f0000000140)}, 0x1) [ 840.075747] audit: type=1326 audit(1523920749.755:12): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27824 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x0 2018/04/16 23:19:09 executing program 6: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100), &(0x7f0000000140)=0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) sync() getpid() getrusage(0x0, &(0x7f0000000480)) dup2(r1, r0) eventfd2(0x0, 0x0) [ 840.165730] device bridge_slave_1 left promiscuous mode [ 840.171364] bridge0: port 2(bridge_slave_1) entered disabled state [ 840.233204] audit: type=1326 audit(1523920749.989:13): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27842 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x0 [ 840.252852] audit: type=1326 audit(1523920750.013:14): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27842 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=231 compat=0 ip=0x455329 code=0x0 [ 840.278257] device bridge_slave_0 left promiscuous mode 2018/04/16 23:19:10 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000180)={{&(0x7f0000000080)=""/133, 0x85}, &(0x7f0000000140)}, 0x1) 2018/04/16 23:19:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000003000)=ANY=[@ANYRES32=0x0, @ANYBLOB='oHW'], 0x2) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000002ff0)) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000040)) 2018/04/16 23:19:10 executing program 1: prctl$intptr(0x26, 0x1) seccomp(0x1, 0x3, &(0x7f0000007ff0)={0x1, &(0x7f000004dff0)=[{0x6}]}) [ 840.283978] bridge0: port 1(bridge_slave_0) entered disabled state [ 840.358690] IPVS: ftp: loaded support on port[0] = 21 [ 840.446745] audit: type=1326 audit(1523920750.121:15): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27856 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x0 [ 840.466708] audit: type=1326 audit(1523920750.145:16): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27856 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=231 compat=0 ip=0x455329 code=0x0 [ 840.491780] team0 (unregistering): Port device team_slave_1 removed [ 840.518808] team0 (unregistering): Port device team_slave_0 removed [ 840.531553] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 840.558973] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 840.586530] bond0 (unregistering): Released all slaves [ 840.981808] bridge0: port 1(bridge_slave_0) entered blocking state [ 840.988255] bridge0: port 1(bridge_slave_0) entered disabled state [ 840.995790] device bridge_slave_0 entered promiscuous mode [ 841.033042] bridge0: port 2(bridge_slave_1) entered blocking state [ 841.039489] bridge0: port 2(bridge_slave_1) entered disabled state [ 841.047049] device bridge_slave_1 entered promiscuous mode [ 841.084279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 841.121365] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 841.230586] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 841.269821] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 841.440363] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 841.447794] team0: Port device team_slave_0 added [ 841.484127] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 841.491740] team0: Port device team_slave_1 added [ 841.528802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 841.570521] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 841.608902] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 841.616214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 841.631728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 841.664789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 842.022457] bridge0: port 2(bridge_slave_1) entered blocking state [ 842.028889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 842.035572] bridge0: port 1(bridge_slave_0) entered blocking state [ 842.041943] bridge0: port 1(bridge_slave_0) entered forwarding state [ 842.050096] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 842.901900] 8021q: adding VLAN 0 to HW filter on device bond0 [ 842.975137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 842.984253] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 843.066666] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 843.072861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 843.080596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 843.158873] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:13 executing program 0: prctl$intptr(0x26, 0x1) seccomp(0x1, 0x3, &(0x7f0000007ff0)={0x1, &(0x7f000004dff0)=[{0x6}]}) 2018/04/16 23:19:13 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100), &(0x7f0000000140)=0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) sync() getpid() getrusage(0x0, &(0x7f0000000480)) dup2(r1, r0) eventfd2(0x0, 0x0) 2018/04/16 23:19:13 executing program 1: prctl$intptr(0x26, 0x1) seccomp(0x1, 0x3, &(0x7f0000007ff0)={0x1, &(0x7f000004dff0)=[{0x6}]}) 2018/04/16 23:19:13 executing program 6: r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) r3 = memfd_create(&(0x7f000003e000)='\t', 0x0) r4 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r4, r3) write$sndseq(r3, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) r5 = memfd_create(&(0x7f00008effff)='\t', 0x0) r6 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r6, r5) write$sndseq(r5, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 2018/04/16 23:19:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000003000)=ANY=[@ANYRES32=0x0, @ANYBLOB='oHW'], 0x2) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000002ff0)) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000040)) 2018/04/16 23:19:13 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000007000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000012000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)=@generic, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/249, 0xf9}, {&(0x7f00000001c0)=""/48, 0x30}, {&(0x7f0000000200)=""/142, 0x8e}], 0x3, &(0x7f0000000300)=""/115, 0xfdd5}, 0x0) sendmsg(r0, &(0x7f0000001980)={0x0, 0xfffffffffffffdf5, &(0x7f0000000080), 0x111}, 0x0) 2018/04/16 23:19:13 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040)=0x7, 0x4) sendmsg(r0, &(0x7f0000001600)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f0000001540), 0x0, &(0x7f0000000000)}, 0x0) 2018/04/16 23:19:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xa, 0x8, 0x6, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r0, &(0x7f0000eed000), &(0x7f0000b88000)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00006d6000)={r0, &(0x7f0000eef000)}, 0x10) [ 843.728334] audit: type=1326 audit(1523920753.494:17): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28128 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x0 2018/04/16 23:19:13 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040)=0x7, 0x4) sendmsg(r0, &(0x7f0000001600)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f0000001540), 0x0, &(0x7f0000000000)}, 0x0) [ 843.817507] audit: type=1326 audit(1523920753.521:18): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28127 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x0 [ 843.837394] audit: type=1326 audit(1523920753.522:19): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28127 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=231 compat=0 ip=0x455329 code=0x0 2018/04/16 23:19:13 executing program 0: prctl$intptr(0x26, 0x1) seccomp(0x1, 0x3, &(0x7f0000007ff0)={0x1, &(0x7f000004dff0)=[{0x6}]}) 2018/04/16 23:19:13 executing program 1: r0 = socket(0x100000001e, 0x1, 0x0) setsockopt(r0, 0x10f, 0x7f, &(0x7f0000f76ffa)="f1ffffff", 0x4) 2018/04/16 23:19:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000003000)=ANY=[@ANYRES32=0x0, @ANYBLOB='oHW'], 0x2) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000002ff0)) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000040)) [ 843.857215] audit: type=1326 audit(1523920753.526:20): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28128 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=231 compat=0 ip=0x455329 code=0x0 2018/04/16 23:19:13 executing program 6: r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) r3 = memfd_create(&(0x7f000003e000)='\t', 0x0) r4 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r4, r3) write$sndseq(r3, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) r5 = memfd_create(&(0x7f00008effff)='\t', 0x0) r6 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r6, r5) write$sndseq(r5, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 2018/04/16 23:19:13 executing program 7: r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) r3 = memfd_create(&(0x7f000003e000)='\t', 0x0) r4 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r4, r3) write$sndseq(r3, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) r5 = memfd_create(&(0x7f00008effff)='\t', 0x0) r6 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r6, r5) write$sndseq(r5, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 2018/04/16 23:19:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xa, 0x8, 0x6, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r0, &(0x7f0000eed000), &(0x7f0000b88000)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00006d6000)={r0, &(0x7f0000eef000)}, 0x10) [ 843.954907] Trying to set illegal importance in message [ 844.015335] device bridge_slave_1 left promiscuous mode [ 844.021103] bridge0: port 2(bridge_slave_1) entered disabled state [ 844.091365] device bridge_slave_0 left promiscuous mode [ 844.097173] bridge0: port 1(bridge_slave_0) entered disabled state [ 844.137072] IPVS: ftp: loaded support on port[0] = 21 [ 844.205793] team0 (unregistering): Port device team_slave_1 removed [ 844.221311] team0 (unregistering): Port device team_slave_0 removed [ 844.231162] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 844.246283] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 844.271092] bond0 (unregistering): Released all slaves [ 844.835272] bridge0: port 1(bridge_slave_0) entered blocking state [ 844.841721] bridge0: port 1(bridge_slave_0) entered disabled state [ 844.849127] device bridge_slave_0 entered promiscuous mode [ 844.887501] bridge0: port 2(bridge_slave_1) entered blocking state [ 844.893952] bridge0: port 2(bridge_slave_1) entered disabled state [ 844.901369] device bridge_slave_1 entered promiscuous mode [ 844.938874] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 844.976681] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 845.093798] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 845.187130] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 845.277303] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 845.284589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 845.462258] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 845.469543] team0: Port device team_slave_0 added [ 845.498535] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 845.505685] team0: Port device team_slave_1 added [ 845.541500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 845.581929] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 845.612234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 845.619339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 845.627957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 845.656083] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 845.663315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 845.674734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 845.910637] bridge0: port 2(bridge_slave_1) entered blocking state [ 845.917060] bridge0: port 2(bridge_slave_1) entered forwarding state [ 845.923716] bridge0: port 1(bridge_slave_0) entered blocking state [ 845.930075] bridge0: port 1(bridge_slave_0) entered forwarding state [ 845.937527] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 846.032162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 846.788641] 8021q: adding VLAN 0 to HW filter on device bond0 [ 846.875809] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 846.957737] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 846.963980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 846.971808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 847.052905] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:17 executing program 5: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) 2018/04/16 23:19:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xa, 0x8, 0x6, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r0, &(0x7f0000eed000), &(0x7f0000b88000)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00006d6000)={r0, &(0x7f0000eef000)}, 0x10) 2018/04/16 23:19:17 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/16 23:19:17 executing program 0: prctl$intptr(0x26, 0x1) seccomp(0x1, 0x3, &(0x7f0000007ff0)={0x1, &(0x7f000004dff0)=[{0x6}]}) 2018/04/16 23:19:17 executing program 7: r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) r3 = memfd_create(&(0x7f000003e000)='\t', 0x0) r4 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r4, r3) write$sndseq(r3, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) r5 = memfd_create(&(0x7f00008effff)='\t', 0x0) r6 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r6, r5) write$sndseq(r5, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 2018/04/16 23:19:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000100), 0x4) 2018/04/16 23:19:17 executing program 1: r0 = socket(0x100000001e, 0x1, 0x0) setsockopt(r0, 0x10f, 0x7f, &(0x7f0000f76ffa)="f1ffffff", 0x4) 2018/04/16 23:19:17 executing program 6: r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) r3 = memfd_create(&(0x7f000003e000)='\t', 0x0) r4 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r4, r3) write$sndseq(r3, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) r5 = memfd_create(&(0x7f00008effff)='\t', 0x0) r6 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r6, r5) write$sndseq(r5, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) [ 847.629946] Trying to set illegal importance in message [ 847.639964] kauditd_printk_skb: 2 callbacks suppressed [ 847.639975] audit: type=1326 audit(1523920757.405:23): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28415 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x0 2018/04/16 23:19:17 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./control\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000440)={[{@jqfmt_vfsold='jqfmt=vfsold', 0x2c}, {@commit={'commit', 0x3d, [0x7f]}, 0x2c}]}) [ 847.665199] audit: type=1326 audit(1523920757.405:24): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28415 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=231 compat=0 ip=0x455329 code=0x0 2018/04/16 23:19:17 executing program 1: r0 = socket(0x100000001e, 0x1, 0x0) setsockopt(r0, 0x10f, 0x7f, &(0x7f0000f76ffa)="f1ffffff", 0x4) 2018/04/16 23:19:17 executing program 5: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) 2018/04/16 23:19:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xa, 0x8, 0x6, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r0, &(0x7f0000eed000), &(0x7f0000b88000)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00006d6000)={r0, &(0x7f0000eef000)}, 0x10) 2018/04/16 23:19:17 executing program 7: r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) r3 = memfd_create(&(0x7f000003e000)='\t', 0x0) r4 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r4, r3) write$sndseq(r3, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) r5 = memfd_create(&(0x7f00008effff)='\t', 0x0) r6 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r6, r5) write$sndseq(r5, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 2018/04/16 23:19:17 executing program 6: r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) r3 = memfd_create(&(0x7f000003e000)='\t', 0x0) r4 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r4, r3) write$sndseq(r3, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) r5 = memfd_create(&(0x7f00008effff)='\t', 0x0) r6 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r6, r5) write$sndseq(r5, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 2018/04/16 23:19:17 executing program 5: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) [ 847.788653] REISERFS warning (device loop0): super-6508 reiserfs_parse_options: bad value  for -ocommit [ 847.788653] [ 847.838133] Trying to set illegal importance in message [ 847.873077] REISERFS warning (device loop0): super-6508 reiserfs_parse_options: bad value  for -ocommit [ 847.873077] [ 847.874250] device bridge_slave_1 left promiscuous mode [ 847.889889] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:19:17 executing program 5: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) 2018/04/16 23:19:17 executing program 1: r0 = socket(0x100000001e, 0x1, 0x0) setsockopt(r0, 0x10f, 0x7f, &(0x7f0000f76ffa)="f1ffffff", 0x4) 2018/04/16 23:19:17 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./control\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000440)={[{@jqfmt_vfsold='jqfmt=vfsold', 0x2c}, {@commit={'commit', 0x3d, [0x7f]}, 0x2c}]}) 2018/04/16 23:19:17 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x800000000000011, 0x800000002, 0x81) fchmod(r1, 0x80) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) r2 = getpgrp(0x0) process_vm_readv(r2, &(0x7f0000000580)=[{&(0x7f0000000040)=""/49, 0x31}, {&(0x7f00000000c0)=""/247, 0xf7}, {&(0x7f00000001c0)=""/245, 0xf5}, {&(0x7f00000002c0)=""/134, 0x86}, {&(0x7f0000000380)=""/213, 0xd5}, {&(0x7f0000000480)=""/118, 0x76}, {&(0x7f0000000500)=""/70, 0x46}], 0x7, &(0x7f0000000700)=[{&(0x7f0000000600)=""/10, 0xa}, {&(0x7f0000000640)=""/156, 0x9c}], 0x2, 0x0) syz_open_dev$loop(&(0x7f0000001480)='/dev/loop#\x00', 0x6, 0x0) getsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000740), &(0x7f0000000780)=0x4) [ 847.998873] device bridge_slave_0 left promiscuous mode [ 848.004482] bridge0: port 1(bridge_slave_0) entered disabled state [ 848.019201] Trying to set illegal importance in message [ 848.039755] IPVS: ftp: loaded support on port[0] = 21 [ 848.045801] REISERFS warning (device loop0): super-6508 reiserfs_parse_options: bad value  for -ocommit [ 848.045801] [ 848.129633] team0 (unregistering): Port device team_slave_1 removed [ 848.140914] team0 (unregistering): Port device team_slave_0 removed [ 848.152663] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 848.169809] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 848.197823] bond0 (unregistering): Released all slaves [ 848.232408] device lo entered promiscuous mode [ 848.247633] device lo left promiscuous mode [ 848.846357] bridge0: port 1(bridge_slave_0) entered blocking state [ 848.852789] bridge0: port 1(bridge_slave_0) entered disabled state [ 848.860627] device bridge_slave_0 entered promiscuous mode [ 848.898970] bridge0: port 2(bridge_slave_1) entered blocking state [ 848.905405] bridge0: port 2(bridge_slave_1) entered disabled state [ 848.913354] device bridge_slave_1 entered promiscuous mode [ 848.952803] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 848.990640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 849.103798] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 849.147477] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 849.323636] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 849.332681] team0: Port device team_slave_0 added [ 849.366671] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 849.374636] team0: Port device team_slave_1 added [ 849.413118] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 849.453807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 849.484493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 849.524337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 849.770400] bridge0: port 2(bridge_slave_1) entered blocking state [ 849.776801] bridge0: port 2(bridge_slave_1) entered forwarding state [ 849.783456] bridge0: port 1(bridge_slave_0) entered blocking state [ 849.789828] bridge0: port 1(bridge_slave_0) entered forwarding state [ 849.797180] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 850.619982] 8021q: adding VLAN 0 to HW filter on device bond0 [ 850.655129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 850.703734] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 850.786625] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 850.792929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 850.800151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 850.880046] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:21 executing program 1: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [0xff, 0xff], @rand_addr}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x800000000000001}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in, 0x0, 0x4, 0x0, 0x401}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) 2018/04/16 23:19:21 executing program 6: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r0, &(0x7f0000000200)=@listen={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$rdma_cm(r0, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r1}}, 0x48) 2018/04/16 23:19:21 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="cefaad1b99e75542a5fa08e7", 0xc}], 0x0, 0x0) 2018/04/16 23:19:21 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./control\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000440)={[{@jqfmt_vfsold='jqfmt=vfsold', 0x2c}, {@commit={'commit', 0x3d, [0x7f]}, 0x2c}]}) 2018/04/16 23:19:21 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x800000000000011, 0x800000002, 0x81) fchmod(r1, 0x80) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) r2 = getpgrp(0x0) process_vm_readv(r2, &(0x7f0000000580)=[{&(0x7f0000000040)=""/49, 0x31}, {&(0x7f00000000c0)=""/247, 0xf7}, {&(0x7f00000001c0)=""/245, 0xf5}, {&(0x7f00000002c0)=""/134, 0x86}, {&(0x7f0000000380)=""/213, 0xd5}, {&(0x7f0000000480)=""/118, 0x76}, {&(0x7f0000000500)=""/70, 0x46}], 0x7, &(0x7f0000000700)=[{&(0x7f0000000600)=""/10, 0xa}, {&(0x7f0000000640)=""/156, 0x9c}], 0x2, 0x0) syz_open_dev$loop(&(0x7f0000001480)='/dev/loop#\x00', 0x6, 0x0) getsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000740), &(0x7f0000000780)=0x4) 2018/04/16 23:19:21 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shutdown(r0, 0x0) r1 = dup2(r0, r0) clock_gettime(0x0, &(0x7f00000030c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003000)=[{{&(0x7f00000004c0)=@sco, 0x80, &(0x7f0000000800), 0x0, &(0x7f0000000840)=""/130, 0x82}}, {{&(0x7f0000000900)=@pptp={0x0, 0x0, {0x0, @multicast2}}, 0x80, &(0x7f0000002f00), 0x0, &(0x7f0000002fc0)=""/52, 0x34}}], 0x2, 0x0, &(0x7f0000003100)={0x0, r2+10000000}) 2018/04/16 23:19:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x800000000000011, 0x800000002, 0x81) fchmod(r1, 0x80) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) r2 = getpgrp(0x0) process_vm_readv(r2, &(0x7f0000000580)=[{&(0x7f0000000040)=""/49, 0x31}, {&(0x7f00000000c0)=""/247, 0xf7}, {&(0x7f00000001c0)=""/245, 0xf5}, {&(0x7f00000002c0)=""/134, 0x86}, {&(0x7f0000000380)=""/213, 0xd5}, {&(0x7f0000000480)=""/118, 0x76}, {&(0x7f0000000500)=""/70, 0x46}], 0x7, &(0x7f0000000700)=[{&(0x7f0000000600)=""/10, 0xa}, {&(0x7f0000000640)=""/156, 0x9c}], 0x2, 0x0) syz_open_dev$loop(&(0x7f0000001480)='/dev/loop#\x00', 0x6, 0x0) getsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000740), &(0x7f0000000780)=0x4) 2018/04/16 23:19:21 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x100000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000040)=[{r0, 0x4000}, {r0, 0x1000}], 0x2, 0x1) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x1) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000000c0)=0xab69, &(0x7f0000000100)=0x4) perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5}, 0x0, 0x0, r0, 0x0) 2018/04/16 23:19:21 executing program 1: sched_setattr(0x0, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x0, 0x2}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x81) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) close(r0) 2018/04/16 23:19:21 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x100000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000040)=[{r0, 0x4000}, {r0, 0x1000}], 0x2, 0x1) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x1) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000000c0)=0xab69, &(0x7f0000000100)=0x4) perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5}, 0x0, 0x0, r0, 0x0) [ 851.493667] REISERFS warning (device loop0): super-6508 reiserfs_parse_options: bad value  for -ocommit [ 851.493667] [ 851.505336] device lo entered promiscuous mode [ 851.516224] device lo left promiscuous mode 2018/04/16 23:19:21 executing program 6: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r0, &(0x7f0000000200)=@listen={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$rdma_cm(r0, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r1}}, 0x48) 2018/04/16 23:19:21 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shutdown(r0, 0x0) r1 = dup2(r0, r0) clock_gettime(0x0, &(0x7f00000030c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003000)=[{{&(0x7f00000004c0)=@sco, 0x80, &(0x7f0000000800), 0x0, &(0x7f0000000840)=""/130, 0x82}}, {{&(0x7f0000000900)=@pptp={0x0, 0x0, {0x0, @multicast2}}, 0x80, &(0x7f0000002f00), 0x0, &(0x7f0000002fc0)=""/52, 0x34}}], 0x2, 0x0, &(0x7f0000003100)={0x0, r2+10000000}) [ 851.556347] device lo entered promiscuous mode 2018/04/16 23:19:21 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./control\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000440)={[{@jqfmt_vfsold='jqfmt=vfsold', 0x2c}, {@commit={'commit', 0x3d, [0x7f]}, 0x2c}]}) 2018/04/16 23:19:21 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x800000000000011, 0x800000002, 0x81) fchmod(r1, 0x80) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) r2 = getpgrp(0x0) process_vm_readv(r2, &(0x7f0000000580)=[{&(0x7f0000000040)=""/49, 0x31}, {&(0x7f00000000c0)=""/247, 0xf7}, {&(0x7f00000001c0)=""/245, 0xf5}, {&(0x7f00000002c0)=""/134, 0x86}, {&(0x7f0000000380)=""/213, 0xd5}, {&(0x7f0000000480)=""/118, 0x76}, {&(0x7f0000000500)=""/70, 0x46}], 0x7, &(0x7f0000000700)=[{&(0x7f0000000600)=""/10, 0xa}, {&(0x7f0000000640)=""/156, 0x9c}], 0x2, 0x0) syz_open_dev$loop(&(0x7f0000001480)='/dev/loop#\x00', 0x6, 0x0) getsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000740), &(0x7f0000000780)=0x4) 2018/04/16 23:19:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x800000000000011, 0x800000002, 0x81) fchmod(r1, 0x80) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) r2 = getpgrp(0x0) process_vm_readv(r2, &(0x7f0000000580)=[{&(0x7f0000000040)=""/49, 0x31}, {&(0x7f00000000c0)=""/247, 0xf7}, {&(0x7f00000001c0)=""/245, 0xf5}, {&(0x7f00000002c0)=""/134, 0x86}, {&(0x7f0000000380)=""/213, 0xd5}, {&(0x7f0000000480)=""/118, 0x76}, {&(0x7f0000000500)=""/70, 0x46}], 0x7, &(0x7f0000000700)=[{&(0x7f0000000600)=""/10, 0xa}, {&(0x7f0000000640)=""/156, 0x9c}], 0x2, 0x0) syz_open_dev$loop(&(0x7f0000001480)='/dev/loop#\x00', 0x6, 0x0) getsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000740), &(0x7f0000000780)=0x4) 2018/04/16 23:19:21 executing program 6: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r0, &(0x7f0000000200)=@listen={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$rdma_cm(r0, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r1}}, 0x48) [ 851.673658] device bridge_slave_1 left promiscuous mode [ 851.679292] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.713536] REISERFS warning (device loop0): super-6508 reiserfs_parse_options: bad value  for -ocommit 2018/04/16 23:19:21 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shutdown(r0, 0x0) r1 = dup2(r0, r0) clock_gettime(0x0, &(0x7f00000030c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003000)=[{{&(0x7f00000004c0)=@sco, 0x80, &(0x7f0000000800), 0x0, &(0x7f0000000840)=""/130, 0x82}}, {{&(0x7f0000000900)=@pptp={0x0, 0x0, {0x0, @multicast2}}, 0x80, &(0x7f0000002f00), 0x0, &(0x7f0000002fc0)=""/52, 0x34}}], 0x2, 0x0, &(0x7f0000003100)={0x0, r2+10000000}) 2018/04/16 23:19:21 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x100000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000040)=[{r0, 0x4000}, {r0, 0x1000}], 0x2, 0x1) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x1) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000000c0)=0xab69, &(0x7f0000000100)=0x4) perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5}, 0x0, 0x0, r0, 0x0) [ 851.713536] [ 851.754331] device bridge_slave_0 left promiscuous mode [ 851.760088] bridge0: port 1(bridge_slave_0) entered disabled state [ 851.839749] IPVS: ftp: loaded support on port[0] = 21 [ 851.846923] team0 (unregistering): Port device team_slave_1 removed [ 851.876714] team0 (unregistering): Port device team_slave_0 removed [ 851.891108] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 851.908712] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 851.937380] bond0 (unregistering): Released all slaves [ 851.957937] device lo left promiscuous mode [ 851.964131] device lo left promiscuous mode [ 851.978931] device lo entered promiscuous mode [ 851.984772] device lo entered promiscuous mode [ 852.626630] bridge0: port 1(bridge_slave_0) entered blocking state [ 852.633081] bridge0: port 1(bridge_slave_0) entered disabled state [ 852.641254] device bridge_slave_0 entered promiscuous mode [ 852.680617] bridge0: port 2(bridge_slave_1) entered blocking state [ 852.687086] bridge0: port 2(bridge_slave_1) entered disabled state [ 852.694965] device bridge_slave_1 entered promiscuous mode [ 852.733898] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 852.772704] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 852.886535] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 852.928054] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 853.096128] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 853.104051] team0: Port device team_slave_0 added [ 853.140318] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 853.147715] team0: Port device team_slave_1 added [ 853.186744] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 853.215965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 853.254127] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 853.261322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 853.277180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 853.300411] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 853.307486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 853.315675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 853.540073] bridge0: port 2(bridge_slave_1) entered blocking state [ 853.546467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 853.553138] bridge0: port 1(bridge_slave_0) entered blocking state [ 853.559505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 853.566823] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 853.711254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 854.441239] 8021q: adding VLAN 0 to HW filter on device bond0 [ 854.528067] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 854.613875] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 854.620171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 854.628169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 854.707706] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:25 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x100000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000040)=[{r0, 0x4000}, {r0, 0x1000}], 0x2, 0x1) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x1) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000000c0)=0xab69, &(0x7f0000000100)=0x4) perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5}, 0x0, 0x0, r0, 0x0) 2018/04/16 23:19:25 executing program 1: add_key(&(0x7f0000000200)="6173796d6d65747269630000f623c165dbdd5da4e516feae1218931b7f62f1989e779cb3e199015e6f224dc786b78b696462c7dec58cd05fa42773a0af0a703d63e19620fd165b5d862cf735059c401152746037a51f9d035dcf4197d265f6f5d246b14212db69e767574420fb11a7308eb293967dbd5a729bb8c6833a854e2036d4e9270fef4cef270638e56c144263ecf69038c96c9d38f68668c21513e19c1311eea8ee94c59609987d033ca3c8ad624dbc5c8958aaa4e9158c5850c6228a22d0adaabe8bb566c069d5baa64e30af6d878c", &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000040)="1080", 0x2, 0xfffffffffffffffd) 2018/04/16 23:19:25 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x40000000003, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x6, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000060ffc), 0x0) 2018/04/16 23:19:25 executing program 6: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r0, &(0x7f0000000200)=@listen={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$rdma_cm(r0, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r1}}, 0x48) 2018/04/16 23:19:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x800000000000011, 0x800000002, 0x81) fchmod(r1, 0x80) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) r2 = getpgrp(0x0) process_vm_readv(r2, &(0x7f0000000580)=[{&(0x7f0000000040)=""/49, 0x31}, {&(0x7f00000000c0)=""/247, 0xf7}, {&(0x7f00000001c0)=""/245, 0xf5}, {&(0x7f00000002c0)=""/134, 0x86}, {&(0x7f0000000380)=""/213, 0xd5}, {&(0x7f0000000480)=""/118, 0x76}, {&(0x7f0000000500)=""/70, 0x46}], 0x7, &(0x7f0000000700)=[{&(0x7f0000000600)=""/10, 0xa}, {&(0x7f0000000640)=""/156, 0x9c}], 0x2, 0x0) syz_open_dev$loop(&(0x7f0000001480)='/dev/loop#\x00', 0x6, 0x0) getsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000740), &(0x7f0000000780)=0x4) 2018/04/16 23:19:25 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shutdown(r0, 0x0) r1 = dup2(r0, r0) clock_gettime(0x0, &(0x7f00000030c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003000)=[{{&(0x7f00000004c0)=@sco, 0x80, &(0x7f0000000800), 0x0, &(0x7f0000000840)=""/130, 0x82}}, {{&(0x7f0000000900)=@pptp={0x0, 0x0, {0x0, @multicast2}}, 0x80, &(0x7f0000002f00), 0x0, &(0x7f0000002fc0)=""/52, 0x34}}], 0x2, 0x0, &(0x7f0000003100)={0x0, r2+10000000}) 2018/04/16 23:19:25 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x800000000000011, 0x800000002, 0x81) fchmod(r1, 0x80) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) r2 = getpgrp(0x0) process_vm_readv(r2, &(0x7f0000000580)=[{&(0x7f0000000040)=""/49, 0x31}, {&(0x7f00000000c0)=""/247, 0xf7}, {&(0x7f00000001c0)=""/245, 0xf5}, {&(0x7f00000002c0)=""/134, 0x86}, {&(0x7f0000000380)=""/213, 0xd5}, {&(0x7f0000000480)=""/118, 0x76}, {&(0x7f0000000500)=""/70, 0x46}], 0x7, &(0x7f0000000700)=[{&(0x7f0000000600)=""/10, 0xa}, {&(0x7f0000000640)=""/156, 0x9c}], 0x2, 0x0) syz_open_dev$loop(&(0x7f0000001480)='/dev/loop#\x00', 0x6, 0x0) getsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000740), &(0x7f0000000780)=0x4) 2018/04/16 23:19:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000005ff7)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0xa, 0x0, 0xffffffffffffffff}) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000400)=[@textreal={0x8, &(0x7f0000000440)="66b8b7d2e5c50f23c80f21f866350c0070000f23f80f1f40000f323d00a0baf80c66b81c6a168e66efbafc0c66eddfaa070036260f0766b8000000000f23c00f21f86635010006000f23f8660fd088670066b97a0800000f32", 0x59}], 0x1, 0x0, &(0x7f0000000000), 0x0) 2018/04/16 23:19:25 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x0, 0x0) syz_open_dev$tun(&(0x7f0000589000)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00005ad000)) unshare(0x40600) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) timerfd_create(0x0, 0x0) syz_open_procfs(0x0, &(0x7f00006c6ff7)='net/igmp\x00') syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') pselect6(0x40, &(0x7f00003e0000), &(0x7f0000000000), &(0x7f0000e90000), &(0x7f0000000000)={0x77359400}, &(0x7f0000e85ff0)={&(0x7f0000c71ff8), 0x8}) [ 855.305391] device lo left promiscuous mode 2018/04/16 23:19:25 executing program 1: add_key(&(0x7f0000000200)="6173796d6d65747269630000f623c165dbdd5da4e516feae1218931b7f62f1989e779cb3e199015e6f224dc786b78b696462c7dec58cd05fa42773a0af0a703d63e19620fd165b5d862cf735059c401152746037a51f9d035dcf4197d265f6f5d246b14212db69e767574420fb11a7308eb293967dbd5a729bb8c6833a854e2036d4e9270fef4cef270638e56c144263ecf69038c96c9d38f68668c21513e19c1311eea8ee94c59609987d033ca3c8ad624dbc5c8958aaa4e9158c5850c6228a22d0adaabe8bb566c069d5baa64e30af6d878c", &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000040)="1080", 0x2, 0xfffffffffffffffd) [ 855.331798] device lo left promiscuous mode 2018/04/16 23:19:25 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000180)=0x600214) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xfffffdaa) readv(r0, &(0x7f0000001f00)=[{&(0x7f0000001e80)=""/120, 0x78}], 0x1) pwritev(r0, &(0x7f0000ed8f70)=[{&(0x7f00007d7f41)='k', 0x1}], 0x1, 0x0) 2018/04/16 23:19:25 executing program 5: clock_nanosleep(0x10002, 0x0, &(0x7f0000000140), &(0x7f0000000180)) [ 855.363240] device lo entered promiscuous mode [ 855.388464] device lo entered promiscuous mode 2018/04/16 23:19:25 executing program 1: add_key(&(0x7f0000000200)="6173796d6d65747269630000f623c165dbdd5da4e516feae1218931b7f62f1989e779cb3e199015e6f224dc786b78b696462c7dec58cd05fa42773a0af0a703d63e19620fd165b5d862cf735059c401152746037a51f9d035dcf4197d265f6f5d246b14212db69e767574420fb11a7308eb293967dbd5a729bb8c6833a854e2036d4e9270fef4cef270638e56c144263ecf69038c96c9d38f68668c21513e19c1311eea8ee94c59609987d033ca3c8ad624dbc5c8958aaa4e9158c5850c6228a22d0adaabe8bb566c069d5baa64e30af6d878c", &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000040)="1080", 0x2, 0xfffffffffffffffd) 2018/04/16 23:19:25 executing program 5: clock_nanosleep(0x10002, 0x0, &(0x7f0000000140), &(0x7f0000000180)) [ 855.441491] device bridge_slave_1 left promiscuous mode [ 855.447232] bridge0: port 2(bridge_slave_1) entered disabled state [ 855.498882] device bridge_slave_0 left promiscuous mode [ 855.504535] bridge0: port 1(bridge_slave_0) entered disabled state [ 855.572557] IPVS: ftp: loaded support on port[0] = 21 [ 855.599733] team0 (unregistering): Port device team_slave_1 removed [ 855.612588] team0 (unregistering): Port device team_slave_0 removed [ 855.625404] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 855.643445] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 855.738911] bond0 (unregistering): Released all slaves [ 856.335985] bridge0: port 1(bridge_slave_0) entered blocking state [ 856.342491] bridge0: port 1(bridge_slave_0) entered disabled state [ 856.349946] device bridge_slave_0 entered promiscuous mode [ 856.388809] bridge0: port 2(bridge_slave_1) entered blocking state [ 856.395276] bridge0: port 2(bridge_slave_1) entered disabled state [ 856.402640] device bridge_slave_1 entered promiscuous mode [ 856.440076] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 856.478578] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 856.597947] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 856.638242] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 856.814734] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 856.822175] team0: Port device team_slave_0 added [ 856.858713] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 856.866781] team0: Port device team_slave_1 added [ 856.904376] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 856.940833] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 856.971735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 857.013009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 857.310641] bridge0: port 2(bridge_slave_1) entered blocking state [ 857.317075] bridge0: port 2(bridge_slave_1) entered forwarding state [ 857.323739] bridge0: port 1(bridge_slave_0) entered blocking state [ 857.330122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 857.337616] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 858.173553] 8021q: adding VLAN 0 to HW filter on device bond0 [ 858.254965] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 858.271632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 858.342305] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 858.348531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 858.356217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 858.433985] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:28 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x0, 0x0) syz_open_dev$tun(&(0x7f0000589000)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00005ad000)) unshare(0x40600) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) timerfd_create(0x0, 0x0) syz_open_procfs(0x0, &(0x7f00006c6ff7)='net/igmp\x00') syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') pselect6(0x40, &(0x7f00003e0000), &(0x7f0000000000), &(0x7f0000e90000), &(0x7f0000000000)={0x77359400}, &(0x7f0000e85ff0)={&(0x7f0000c71ff8), 0x8}) 2018/04/16 23:19:28 executing program 5: clock_nanosleep(0x10002, 0x0, &(0x7f0000000140), &(0x7f0000000180)) 2018/04/16 23:19:28 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000002180)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) syz_open_dev$sndseq(&(0x7f0000001080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f00000000c0)={{}, {0x0, 0xde0000000000000}}) 2018/04/16 23:19:28 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x40000000003, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x6, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000060ffc), 0x0) 2018/04/16 23:19:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="98"], 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000025000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000240)="0f08360f30ba430066edbaf80c66b8ac525a8566efbafc0c66b80010000066efba4200ec0f2257b80a008ed0f426650fc71866b95009000066b80800000066ba000000000f30", 0x46}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:19:28 executing program 1: add_key(&(0x7f0000000200)="6173796d6d65747269630000f623c165dbdd5da4e516feae1218931b7f62f1989e779cb3e199015e6f224dc786b78b696462c7dec58cd05fa42773a0af0a703d63e19620fd165b5d862cf735059c401152746037a51f9d035dcf4197d265f6f5d246b14212db69e767574420fb11a7308eb293967dbd5a729bb8c6833a854e2036d4e9270fef4cef270638e56c144263ecf69038c96c9d38f68668c21513e19c1311eea8ee94c59609987d033ca3c8ad624dbc5c8958aaa4e9158c5850c6228a22d0adaabe8bb566c069d5baa64e30af6d878c", &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000040)="1080", 0x2, 0xfffffffffffffffd) 2018/04/16 23:19:28 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000180)=0x600214) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xfffffdaa) readv(r0, &(0x7f0000001f00)=[{&(0x7f0000001e80)=""/120, 0x78}], 0x1) pwritev(r0, &(0x7f0000ed8f70)=[{&(0x7f00007d7f41)='k', 0x1}], 0x1, 0x0) 2018/04/16 23:19:28 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000140), 0x10000000000001c6) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000013c0)=@ioapic={0x0, 0x1000, 0x0, 0x649b9d38}) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x0, @loopback={0x0, 0x1}}}}, 0x98) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:19:28 executing program 5: clock_nanosleep(0x10002, 0x0, &(0x7f0000000140), &(0x7f0000000180)) 2018/04/16 23:19:28 executing program 1: r0 = mq_open(&(0x7f00000003c0)='tmpfs\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x4, 0x5}) mq_timedsend(r0, &(0x7f0000e71fff), 0x0, 0x0, 0x0) mq_timedsend(r0, &(0x7f0000000040), 0x0, 0x800, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(r0, &(0x7f0000000280)=""/131, 0x83, 0x0, 0x0) 2018/04/16 23:19:28 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x0, 0x0) syz_open_dev$tun(&(0x7f0000589000)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00005ad000)) unshare(0x40600) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) timerfd_create(0x0, 0x0) syz_open_procfs(0x0, &(0x7f00006c6ff7)='net/igmp\x00') syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') pselect6(0x40, &(0x7f00003e0000), &(0x7f0000000000), &(0x7f0000e90000), &(0x7f0000000000)={0x77359400}, &(0x7f0000e85ff0)={&(0x7f0000c71ff8), 0x8}) 2018/04/16 23:19:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="98"], 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000025000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000240)="0f08360f30ba430066edbaf80c66b8ac525a8566efbafc0c66b80010000066efba4200ec0f2257b80a008ed0f426650fc71866b95009000066b80800000066ba000000000f30", 0x46}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:19:28 executing program 1: r0 = mq_open(&(0x7f00000003c0)='tmpfs\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x4, 0x5}) mq_timedsend(r0, &(0x7f0000e71fff), 0x0, 0x0, 0x0) mq_timedsend(r0, &(0x7f0000000040), 0x0, 0x800, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(r0, &(0x7f0000000280)=""/131, 0x83, 0x0, 0x0) [ 859.198597] device bridge_slave_1 left promiscuous mode [ 859.204327] bridge0: port 2(bridge_slave_1) entered disabled state [ 859.261279] device bridge_slave_0 left promiscuous mode [ 859.266948] bridge0: port 1(bridge_slave_0) entered disabled state [ 859.360115] IPVS: ftp: loaded support on port[0] = 21 [ 859.407954] team0 (unregistering): Port device team_slave_1 removed [ 859.434623] team0 (unregistering): Port device team_slave_0 removed [ 859.458529] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 859.481358] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 859.530780] bond0 (unregistering): Released all slaves [ 860.240268] bridge0: port 1(bridge_slave_0) entered blocking state [ 860.246745] bridge0: port 1(bridge_slave_0) entered disabled state [ 860.254146] device bridge_slave_0 entered promiscuous mode [ 860.293504] bridge0: port 2(bridge_slave_1) entered blocking state [ 860.299990] bridge0: port 2(bridge_slave_1) entered disabled state [ 860.307379] device bridge_slave_1 entered promiscuous mode [ 860.345108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 860.383551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 860.496714] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 860.538651] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 860.577997] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 860.584973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 860.622943] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 860.629866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 860.734157] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 860.741632] team0: Port device team_slave_0 added [ 860.780636] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 860.788210] team0: Port device team_slave_1 added [ 860.825369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 860.853650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 860.880125] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 860.887230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 860.895833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 860.917012] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 860.924307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 860.932824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 861.163357] bridge0: port 2(bridge_slave_1) entered blocking state [ 861.169772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 861.176415] bridge0: port 1(bridge_slave_0) entered blocking state [ 861.182788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 861.190300] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 861.599179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 862.035607] 8021q: adding VLAN 0 to HW filter on device bond0 [ 862.121509] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 862.203917] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 862.210177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 862.217892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 862.295364] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:32 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x40000000003, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x6, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000060ffc), 0x0) 2018/04/16 23:19:32 executing program 1: r0 = mq_open(&(0x7f00000003c0)='tmpfs\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x4, 0x5}) mq_timedsend(r0, &(0x7f0000e71fff), 0x0, 0x0, 0x0) mq_timedsend(r0, &(0x7f0000000040), 0x0, 0x800, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(r0, &(0x7f0000000280)=""/131, 0x83, 0x0, 0x0) 2018/04/16 23:19:32 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x0, 0x0) syz_open_dev$tun(&(0x7f0000589000)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00005ad000)) unshare(0x40600) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) timerfd_create(0x0, 0x0) syz_open_procfs(0x0, &(0x7f00006c6ff7)='net/igmp\x00') syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') pselect6(0x40, &(0x7f00003e0000), &(0x7f0000000000), &(0x7f0000e90000), &(0x7f0000000000)={0x77359400}, &(0x7f0000e85ff0)={&(0x7f0000c71ff8), 0x8}) 2018/04/16 23:19:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="98"], 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000025000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000240)="0f08360f30ba430066edbaf80c66b8ac525a8566efbafc0c66b80010000066efba4200ec0f2257b80a008ed0f426650fc71866b95009000066b80800000066ba000000000f30", 0x46}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:19:32 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000180)=0x600214) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xfffffdaa) readv(r0, &(0x7f0000001f00)=[{&(0x7f0000001e80)=""/120, 0x78}], 0x1) pwritev(r0, &(0x7f0000ed8f70)=[{&(0x7f00007d7f41)='k', 0x1}], 0x1, 0x0) 2018/04/16 23:19:32 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000140), 0x10000000000001c6) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000013c0)=@ioapic={0x0, 0x1000, 0x0, 0x649b9d38}) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x0, @loopback={0x0, 0x1}}}}, 0x98) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:19:32 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x40000141042, 0x0) fallocate(r0, 0x0, 0x0, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x5, 0x2053, r1, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x80000001) 2018/04/16 23:19:32 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d7a000)={&(0x7f0000aeaff4)={0x10}, 0xc, &(0x7f00004e2000)={&(0x7f000007afe0)=ANY=[@ANYBLOB="200000000c06010000000000000000000100000000000000"], 0x18}, 0x1}, 0x0) 2018/04/16 23:19:32 executing program 1: r0 = mq_open(&(0x7f00000003c0)='tmpfs\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x4, 0x5}) mq_timedsend(r0, &(0x7f0000e71fff), 0x0, 0x0, 0x0) mq_timedsend(r0, &(0x7f0000000040), 0x0, 0x800, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(r0, &(0x7f0000000280)=""/131, 0x83, 0x0, 0x0) 2018/04/16 23:19:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000016ff8)='keyring\x00', &(0x7f000000b000)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x80004) keyctl$join(0x1, &(0x7f0000019ffb)={0x73, 0x79, 0x7a, 0x0}) keyctl$join(0x1, &(0x7f0000017000)={0x73, 0x79, 0x7a, 0x0}) 2018/04/16 23:19:32 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x1000000010, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/16 23:19:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="98"], 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000025000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000240)="0f08360f30ba430066edbaf80c66b8ac525a8566efbafc0c66b80010000066efba4200ec0f2257b80a008ed0f426650fc71866b95009000066b80800000066ba000000000f30", 0x46}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:19:32 executing program 1: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r0, r1, 0x0) [ 863.055224] device bridge_slave_1 left promiscuous mode [ 863.060907] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:19:32 executing program 5: unshare(0x40600) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x203}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x4c02, 0x6f2000, &(0x7f00000003c0)) [ 863.122156] device bridge_slave_0 left promiscuous mode [ 863.127757] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:19:32 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x1000000010, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 863.246727] IPVS: ftp: loaded support on port[0] = 21 [ 863.273522] team0 (unregistering): Port device team_slave_1 removed [ 863.305748] team0 (unregistering): Port device team_slave_0 removed [ 863.319744] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 863.348297] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 863.409824] bond0 (unregistering): Released all slaves [ 864.131428] bridge0: port 1(bridge_slave_0) entered blocking state [ 864.137881] bridge0: port 1(bridge_slave_0) entered disabled state [ 864.145793] device bridge_slave_0 entered promiscuous mode [ 864.185493] bridge0: port 2(bridge_slave_1) entered blocking state [ 864.191950] bridge0: port 2(bridge_slave_1) entered disabled state [ 864.199906] device bridge_slave_1 entered promiscuous mode [ 864.238176] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 864.277149] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 864.390902] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 864.431317] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 864.608072] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 864.617763] team0: Port device team_slave_0 added [ 864.655385] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 864.662779] team0: Port device team_slave_1 added [ 864.700353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 864.737791] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 864.776942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 864.809896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 865.043654] bridge0: port 2(bridge_slave_1) entered blocking state [ 865.050071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 865.056727] bridge0: port 1(bridge_slave_0) entered blocking state [ 865.063097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 865.070800] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 865.887120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 865.924572] 8021q: adding VLAN 0 to HW filter on device bond0 [ 866.009220] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 866.105126] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 866.111363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 866.119376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 866.199865] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:36 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000140), 0x10000000000001c6) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000013c0)=@ioapic={0x0, 0x1000, 0x0, 0x649b9d38}) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x0, @loopback={0x0, 0x1}}}}, 0x98) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:19:36 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x40000000003, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x6, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000060ffc), 0x0) 2018/04/16 23:19:36 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000180)=0x600214) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xfffffdaa) readv(r0, &(0x7f0000001f00)=[{&(0x7f0000001e80)=""/120, 0x78}], 0x1) pwritev(r0, &(0x7f0000ed8f70)=[{&(0x7f00007d7f41)='k', 0x1}], 0x1, 0x0) 2018/04/16 23:19:36 executing program 5: unshare(0x40600) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x203}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x4c02, 0x6f2000, &(0x7f00000003c0)) 2018/04/16 23:19:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x1000000010, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/16 23:19:36 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0xc1205531, &(0x7f0000000040)) 2018/04/16 23:19:36 executing program 2: r0 = syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0xa000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 2018/04/16 23:19:36 executing program 1: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r0, r1, 0x0) 2018/04/16 23:19:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x1000000010, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/16 23:19:36 executing program 5: unshare(0x40600) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x203}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x4c02, 0x6f2000, &(0x7f00000003c0)) 2018/04/16 23:19:36 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0xc1205531, &(0x7f0000000040)) 2018/04/16 23:19:36 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c50400aeb995298992ea5400c2", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$can_raw(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000240)={&(0x7f0000000140)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "b5a419fb5df128c83ad9430362a22a5abf1e4123efccc641602c2da3630b58d04766c58b254ff2a965ccb226c8c7355c33306c99adaa0aa59006f8dc9b01b737"}, 0xfffffff0}, 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003340)=[{{&(0x7f00000000c0)=@sco, 0x48, &(0x7f0000000100), 0x0, &(0x7f0000000540)=""/94, 0x5e}}, {{&(0x7f00000003c0)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x20, &(0x7f0000003200)=[{&(0x7f0000003100)=""/226, 0xffffff4a}], 0x1, &(0x7f0000000440)=""/239, 0xef}}], 0x2, 0x0, 0x0) 2018/04/16 23:19:36 executing program 5: unshare(0x40600) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x203}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x4c02, 0x6f2000, &(0x7f00000003c0)) [ 866.980070] device bridge_slave_1 left promiscuous mode [ 866.985771] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:19:36 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0xc1205531, &(0x7f0000000040)) [ 867.040489] device bridge_slave_0 left promiscuous mode [ 867.046240] bridge0: port 1(bridge_slave_0) entered disabled state [ 867.099416] IPVS: ftp: loaded support on port[0] = 21 [ 867.176677] team0 (unregistering): Port device team_slave_1 removed [ 867.224390] team0 (unregistering): Port device team_slave_0 removed [ 867.255919] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 867.284337] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 867.342575] bond0 (unregistering): Released all slaves [ 868.026830] bridge0: port 1(bridge_slave_0) entered blocking state [ 868.033332] bridge0: port 1(bridge_slave_0) entered disabled state [ 868.041253] device bridge_slave_0 entered promiscuous mode [ 868.081427] bridge0: port 2(bridge_slave_1) entered blocking state [ 868.088076] bridge0: port 2(bridge_slave_1) entered disabled state [ 868.096766] device bridge_slave_1 entered promiscuous mode [ 868.134669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 868.172789] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 868.286658] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 868.327868] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 868.500154] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 868.508239] team0: Port device team_slave_0 added [ 868.545640] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 868.553739] team0: Port device team_slave_1 added [ 868.586740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 868.623829] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 868.665715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 868.695202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 868.928751] bridge0: port 2(bridge_slave_1) entered blocking state [ 868.935177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 868.941927] bridge0: port 1(bridge_slave_0) entered blocking state [ 868.948297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 869.795157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 869.880300] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 869.964905] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 869.971140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 869.978818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 870.058200] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:40 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f00000001c0)={'ip6tnl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 2018/04/16 23:19:40 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0xc1205531, &(0x7f0000000040)) 2018/04/16 23:19:40 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000140), 0x10000000000001c6) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000013c0)=@ioapic={0x0, 0x1000, 0x0, 0x649b9d38}) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x0, @loopback={0x0, 0x1}}}}, 0x98) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:19:40 executing program 1: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r0, r1, 0x0) 2018/04/16 23:19:40 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c50400aeb995298992ea5400c2", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$can_raw(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000240)={&(0x7f0000000140)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "b5a419fb5df128c83ad9430362a22a5abf1e4123efccc641602c2da3630b58d04766c58b254ff2a965ccb226c8c7355c33306c99adaa0aa59006f8dc9b01b737"}, 0xfffffff0}, 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003340)=[{{&(0x7f00000000c0)=@sco, 0x48, &(0x7f0000000100), 0x0, &(0x7f0000000540)=""/94, 0x5e}}, {{&(0x7f00000003c0)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x20, &(0x7f0000003200)=[{&(0x7f0000003100)=""/226, 0xffffff4a}], 0x1, &(0x7f0000000440)=""/239, 0xef}}], 0x2, 0x0, 0x0) 2018/04/16 23:19:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='comm\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) ftruncate(r0, 0x3d) 2018/04/16 23:19:40 executing program 2: mkdir(&(0x7f000052aff8)='./file0\x00', 0x0) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000033ff8)='./file0\x00', 0x0) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f0000a16ff8)='./file0\x00', &(0x7f0000df2ffd)='\x00v\t', 0x1001, &(0x7f0000a06000)) unlinkat(r0, &(0x7f000057d000)='./file0\x00', 0x200) open$dir(&(0x7f0000000080)='./file0\x00', 0x410102, 0x0) 2018/04/16 23:19:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000140)="0200", &(0x7f0000000040)='/\x00', 0x0, 0x0, &(0x7f00000000c0), 0x28020, &(0x7f0000000000)={[{@data_err_ignore='data_err=ignore', 0x2c}]}) 2018/04/16 23:19:40 executing program 5: syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1, 0x4000) 2018/04/16 23:19:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='comm\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) ftruncate(r0, 0x3d) 2018/04/16 23:19:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000240)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/16 23:19:40 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f00000001c0)={'ip6tnl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) [ 870.780923] device bridge_slave_1 left promiscuous mode [ 870.786611] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:19:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='comm\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) ftruncate(r0, 0x3d) 2018/04/16 23:19:40 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xffffffffffffff6e) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00006e8000)=0x2, 0x4) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x1fd) close(r0) 2018/04/16 23:19:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000240)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) [ 870.853192] device bridge_slave_0 left promiscuous mode [ 870.858848] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.875927] IPVS: ftp: loaded support on port[0] = 21 2018/04/16 23:19:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='comm\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) ftruncate(r0, 0x3d) [ 870.956687] team0 (unregistering): Port device team_slave_1 removed [ 870.981443] team0 (unregistering): Port device team_slave_0 removed [ 871.004226] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 871.031507] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 871.085597] bond0 (unregistering): Released all slaves [ 871.812540] bridge0: port 1(bridge_slave_0) entered blocking state [ 871.818991] bridge0: port 1(bridge_slave_0) entered disabled state [ 871.826352] device bridge_slave_0 entered promiscuous mode [ 871.865140] bridge0: port 2(bridge_slave_1) entered blocking state [ 871.871579] bridge0: port 2(bridge_slave_1) entered disabled state [ 871.878942] device bridge_slave_1 entered promiscuous mode [ 871.917039] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 871.954805] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 872.066945] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 872.111808] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 872.150409] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 872.157377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 872.197277] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 872.204223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 872.306168] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 872.313727] team0: Port device team_slave_0 added [ 872.349421] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 872.356557] team0: Port device team_slave_1 added [ 872.384647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 872.424285] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 872.460791] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 872.467895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 872.476632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 872.497387] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 872.504483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 872.512574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 872.746890] bridge0: port 2(bridge_slave_1) entered blocking state [ 872.753304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 872.759943] bridge0: port 1(bridge_slave_0) entered blocking state [ 872.766305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 872.773662] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 873.183153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 873.624780] 8021q: adding VLAN 0 to HW filter on device bond0 [ 873.708064] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 873.830543] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 873.836840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 873.844482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 873.921352] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x10, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x3fffa, 0x0) writev(r0, &(0x7f0000002680)=[{&(0x7f0000001680)="790f9d17963700aa4082562422245ef033755bfd7bcff6fcabc20f98c15baad5287101b43d0724b75e0e1cb75c8c028f52e0e4bb2b6cf94919c8e705b8ffd932fb808b5446851814cd0fb10f73e36b9ab4a282af7be43d03fd2b5870ab9a6bb27a8ce252cbc9671ffe920c2ae03ed436bb89d4e3c3421b0a6d0333161d42e8e6a83565f64dc581d19f4e0249aed4e3820670223e82ba7028c4b7baacc92b89fa6e516c8f8bdbf098e69d7cbc462e28b4c84d18641ff2ae3a3b7858abf610d08ae3359ba0d36f0230fc49ebf19968f17383c6d90c52c3730ca9c7c949df435361fe1719bdc215d8ab1f03c4531d05b431d5663cf0015e01e4f52e0e58c6f5f9c2d51b9113675cded2d2c643e5f073c5b15c31d3af3216684bf126e5f0b93da5c2d8e8cf134aaac08b82543bf8eed39064b8705fb8044b21f2aceef91dd11c87515abbccf2940b5bd926fc929bcff29d710c44eac27bc0d699de9b2b794234d70339aac098f02d1a6432c6742fc220b167a698f261013db70cbd321d6791ccbce3fd52c9fd860e45fada2e65d4a9fcbe209a6a47f27b1e6fa110a932b61891664f5ae03b22eb57402529dd8d0b9eb58620c54f79ada1671e3659c5698f49c028976b13e4d8d788aba4be40f649b78579fe7b7ff37f4676a14fa52fd29d8df76c11e4ae271dfc7715cbcf04a3f2fbd77729f12abc7b8c347c1d10ed6b6dae8ccb2b55f3f32f5620776cfdfd4560c8936000d97f0bf88384d36fd9a0f606185d8e535f8e4c5cb536ed58f7b3ed86ab247663313eecd7ae4b4169b9008616fa77bc74a87c126a345e20e89a72c4f259951ebef004f778586471cb708e794d97fa121780aa5c80f97c6b171c34bf4e9da0250a7994a73c68e62ac527425e358b6df5d9d8a74d306826f5151bd9e979f4935b0ec3e10df56980585fc3c2331dd4832fb9a026bf8e7894323cb1c1b8a599832b1af2dd90b607295a3d50824e39a6096800aca8a2447608861cc966ef49cd1ef6e3213ff6a81af39319a8f257138c9f6c2134e1764144c847409ea7788072717a728207edaad86d9fd98289b16c1d85d2e57b5eba47577dcc62bb8ca9b19bd64094796d581322055bb2e555a83b71981d44357520df6786b5d0b9c592906f09d1121a389b9f202943971fc0fdccc9fe86747b4bfcafed86f6606c7e54a41caea992dbe56c13c836421516a9ca8ae85357f3d982185ed537374391b37469c05cac6e49535a8f9762c75c3e0225788b4362fef348a8f2e72872ac1a623b4c081bd1ad493760517b8a19a20414f7bb967be4b5c990d4a201c45a7e5c565d031072f43cfe8ae83a4f4f2d11d7dc3bfbda718764c4b37680e4218e8c04c4b2105957700e999f0aa4822d15444fe6cd81168a01f435eb3d7db760ee6e470dc701104ac0068c7cd4f15fb46a58e9d05e9112d8c1d552be29d9011992c9b710944f21a4a59835f40b5baf75b42627241cf371c36eaca85d462f9ccda91af3dc9e5fc1ea9798c329f4665509d65aff8b621f88db1ab6c04256971635f4129bc2b3f8a44028789f37c788e369a4074ed7eb0231e8dafe85cf14c33440a23f135c09921e49543173e47a9ce3a8a710e387ba8cc74eb00bfd96af0fc684babf102b88d09d01a7943de01f563d28912bada17935c4c4907a2a5ca295af9b72b314c8065051b439d5bac0082d067290ca0dd5a3f4fe238a75e65a0ae2b6ba664a45972ad99b007b00f96cefde660fe7b5cf63fa3d7e4f3149b6e6cf73ca7843301d3960c1147198c5d643e0a7fd0fbfb1307b2b9b843f03602d4b0a4c8692f01c19a275f8153df3b3b2e27430035b57e34b05493b598aa55241d738826336927d8c176ee91168a68feb9e06612330e6510c4af02aff2d0ccb7a396a382f9d497402780cd590024e9dbeaeec2f04b60f779b4c2ed17d7726a3d7597f1f06b0cb5f94f78987d9717c536cdde237c98ff28894bc987a2b3b8d89a693c4e222987960d6751829969961ca449836cf38091cd97f0df851cf247622df398f0cdd3489feaa024595e46e576b5f966f6acbf1b1895dde53efa4a9a81357d31fdd643db5217e823f6451aa92d3c940eaa1447e17a54c6a0fb61cfefe6f48a25fd607d8bc01180ab002594ffd7b8116374afde31a484515f4f63df9276255aae5e16b578e1b088e7e3b0d797b02ea1585599bb3a3c8f9549d50699ca2b8672963595292e85ba8fe16a293c9983ef14b7bbbb0797ae2645a998474125cdc7b291bbdc1119e2e5fd44c0074bf3498474e2bcaed99f5334460091ead52d7a15be888ee48967fc687309c5075220f5b98e3b42e94bad6f384b0ebfa4a481e24b1b30d7f0472aae664331b5965c2d451b39bfa19ecf9f278ec3995a005b04f210d9a2f4c052d1bb79b33069d91f79d1659a7c27375823cd8d69505767ebf6cdc3a745aa3aa6e31c4e567717138f8da1bf8d26f02860c4e99a9380e07b201b68f6a7850b026fe3d27d1d43badb8c4923b4f68f99dff990469a3913f74c7e9c927d723ace7e670972e104c6646ab77cee2225dd8eb54fc219bf1ab837d5e97ee625df5f73c1402fde95f232d3950e59c9c245608ca683948b7bfa23b94f2c4134f24c1be4633f3a9981bc41badf60cd7321f5bd019cc80c3cfa98b6fd040782061e3529ab15cddb50ed6ba581e5ca1068a84d0198b4aa07acbcbd16cf5da1b745033d16518652738630bf39afc62f1d80ac3b81431afebc4b731545d1b87718d4e8b1dd429b6366ef5f0f80e26a2534e0dd0faca340314a4b704ca048314b89b746fd9c6c82341e1d0d05f1cdee8fb13d9ba1dab23339df6c5817ee19cadc58281afbcb5929aff6d240fc162a4a013ccfa28a04889b943d7bd35ca260ad12fe67274", 0x801}], 0x1) 2018/04/16 23:19:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000240)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/16 23:19:44 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f00000001c0)={'ip6tnl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 2018/04/16 23:19:44 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xffffffffffffff6e) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00006e8000)=0x2, 0x4) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x1fd) close(r0) 2018/04/16 23:19:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000002fc0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000002f80)={0xffffffff}, 0x111}}, 0x20) write$rdma_cm(r0, &(0x7f0000000200)=@set_option={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000240), r1, 0x0, 0x2, 0x20000244}}, 0x20) 2018/04/16 23:19:44 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c50400aeb995298992ea5400c2", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$can_raw(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000240)={&(0x7f0000000140)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "b5a419fb5df128c83ad9430362a22a5abf1e4123efccc641602c2da3630b58d04766c58b254ff2a965ccb226c8c7355c33306c99adaa0aa59006f8dc9b01b737"}, 0xfffffff0}, 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003340)=[{{&(0x7f00000000c0)=@sco, 0x48, &(0x7f0000000100), 0x0, &(0x7f0000000540)=""/94, 0x5e}}, {{&(0x7f00000003c0)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x20, &(0x7f0000003200)=[{&(0x7f0000003100)=""/226, 0xffffff4a}], 0x1, &(0x7f0000000440)=""/239, 0xef}}], 0x2, 0x0, 0x0) 2018/04/16 23:19:44 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xffffffffffffff6e) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00006e8000)=0x2, 0x4) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x1fd) close(r0) 2018/04/16 23:19:44 executing program 1: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r0, r1, 0x0) 2018/04/16 23:19:44 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xffffffffffffff6e) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00006e8000)=0x2, 0x4) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x1fd) close(r0) 2018/04/16 23:19:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000240)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/16 23:19:44 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f00000001c0)={'ip6tnl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 2018/04/16 23:19:44 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xffffffffffffff6e) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00006e8000)=0x2, 0x4) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x1fd) close(r0) 2018/04/16 23:19:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x10, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x3fffa, 0x0) writev(r0, &(0x7f0000002680)=[{&(0x7f0000001680)="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", 0x801}], 0x1) 2018/04/16 23:19:44 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xffffffffffffff6e) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00006e8000)=0x2, 0x4) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x1fd) close(r0) [ 874.615963] device bridge_slave_1 left promiscuous mode [ 874.621613] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:19:44 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xffffffffffffff6e) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00006e8000)=0x2, 0x4) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x1fd) close(r0) 2018/04/16 23:19:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x1c}, 0xfffffffffffffee9) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x401000, 0x2, 0xc, &(0x7f0000000000)) socketpair$inet_icmp(0x400000, 0x2, 0xc, &(0x7f0000000080)) [ 874.680629] device bridge_slave_0 left promiscuous mode [ 874.686308] bridge0: port 1(bridge_slave_0) entered disabled state [ 874.785532] IPVS: ftp: loaded support on port[0] = 21 [ 874.823271] team0 (unregistering): Port device team_slave_1 removed [ 874.836955] team0 (unregistering): Port device team_slave_0 removed [ 874.860961] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 874.880673] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 874.909931] bond0 (unregistering): Released all slaves [ 875.610116] bridge0: port 1(bridge_slave_0) entered blocking state [ 875.616562] bridge0: port 1(bridge_slave_0) entered disabled state [ 875.623965] device bridge_slave_0 entered promiscuous mode [ 875.661984] bridge0: port 2(bridge_slave_1) entered blocking state [ 875.668424] bridge0: port 2(bridge_slave_1) entered disabled state [ 875.675788] device bridge_slave_1 entered promiscuous mode [ 875.712698] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 875.751862] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 875.863901] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 875.903802] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 876.070465] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 876.077614] team0: Port device team_slave_0 added [ 876.114240] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 876.121673] team0: Port device team_slave_1 added [ 876.158544] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 876.188598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 876.229316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 876.268597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 876.503047] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.509447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 876.516123] bridge0: port 1(bridge_slave_0) entered blocking state [ 876.522495] bridge0: port 1(bridge_slave_0) entered forwarding state [ 876.530190] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 877.369490] 8021q: adding VLAN 0 to HW filter on device bond0 [ 877.455867] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 877.472113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 877.545473] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 877.551732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 877.559407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 877.639457] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x1c}, 0xfffffffffffffee9) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x401000, 0x2, 0xc, &(0x7f0000000000)) socketpair$inet_icmp(0x400000, 0x2, 0xc, &(0x7f0000000080)) 2018/04/16 23:19:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x1c}, 0xfffffffffffffee9) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x401000, 0x2, 0xc, &(0x7f0000000000)) socketpair$inet_icmp(0x400000, 0x2, 0xc, &(0x7f0000000080)) 2018/04/16 23:19:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000140)={[0x1, 0x0, 0x2000], 0x5922, 0x1, 0x9}) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000240)={[0x10000, 0x112000, 0x2000, 0x5004], 0x4, 0x62}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000200)) getsockname$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x3, 0x39522c8c, 0x3, 0x0, 0x4, [{0x5, 0x0, 0x3}, {0x3, 0x3ff8000, 0x0, 0x0, 0x0, 0x2201}, {0x6, 0xfffffffffffffff7}, {}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:19:47 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x10, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x3fffa, 0x0) writev(r0, &(0x7f0000002680)=[{&(0x7f0000001680)="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", 0x801}], 0x1) 2018/04/16 23:19:47 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200010000500010005000000001c08108f13", 0x12, 0x400}], 0x0, 0x0) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x80026) 2018/04/16 23:19:47 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c50400aeb995298992ea5400c2", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$can_raw(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000240)={&(0x7f0000000140)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "b5a419fb5df128c83ad9430362a22a5abf1e4123efccc641602c2da3630b58d04766c58b254ff2a965ccb226c8c7355c33306c99adaa0aa59006f8dc9b01b737"}, 0xfffffff0}, 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003340)=[{{&(0x7f00000000c0)=@sco, 0x48, &(0x7f0000000100), 0x0, &(0x7f0000000540)=""/94, 0x5e}}, {{&(0x7f00000003c0)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x20, &(0x7f0000003200)=[{&(0x7f0000003100)=""/226, 0xffffff4a}], 0x1, &(0x7f0000000440)=""/239, 0xef}}], 0x2, 0x0, 0x0) 2018/04/16 23:19:47 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000400)="51e9b75da045e67a49f02896199a752b83898cd7f662ca9c95a342fe265e4c5f92fa687381bd07777a04526d90cbb69444715a676c3e93feb81551d5995bda429f83c93022ba3cfc708a1b2c292870389bba12c48228dcd6347759424942da009b200db38c215035c53c39a91f4cf3d4cc27b3f3c8f693d7c713a0e156aa319bc2e325d7ac145de0fb4c9479f093e24a30b4f35ba5f591f92c566cdf5d6060ee2446dbd42898c1c64017376983e7c4433d40a5a132b421acdae6a50a1947c74315f81d8a131609", 0xc7, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000500)='rxrpc_s\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a}, &(0x7f0000000940)='rxrpc_s\x00', 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000740)={r1, r2, r3}, &(0x7f0000000780)=""/201, 0xc9, &(0x7f0000000900)={&(0x7f0000000880)={'md4\x00'}, &(0x7f00000008c0)="2adbe5d38cec3f3358f4543592718af7", 0x10}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r5 = socket$nl_xfrm(0x11, 0x3, 0x6) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)) sendmsg(r5, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x3, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1000000000000000291b0000d81b0000"], 0x10}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000c97ff8)) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000001140)='/dev/audio\x00', 0x0, 0x0) close(r6) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000000)=0x200000000) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001300)=""/81, &(0x7f0000001380)=""/21, &(0x7f00000013c0)=""/143}) mkdir(&(0x7f0000000140)='./file0/bus\x00', 0x1) r7 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) r8 = accept$ipx(0xffffffffffffffff, 0x0, &(0x7f0000000480)) mknod(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) sendto$ipx(r8, &(0x7f0000000180)="1720de61212728946270de68f761f1de177f34492ad49a50073302ee8524f51a95940e26404d199c85055439fcaf96548ccc51648170026cff6041465f75097d20fa84a9d30fd994b6926d6a4069a0bbc23d9830c2fcc45d65b20bbdd8b3", 0x5e, 0x20000880, &(0x7f00000000c0)={0x4, 0x9, 0x0, "e83853f9b8a9", 0x1}, 0x10) clock_settime(0x0, &(0x7f0000000300)={0x77359400}) r9 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000200)={'security\x00'}, &(0x7f0000000440)=0x54) socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x8011, r9, 0x0) 2018/04/16 23:19:47 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt(r0, 0x114, 0x1d, &(0x7f0000000080)="2a8e339c", 0x4) 2018/04/16 23:19:48 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r0, 0x65, 0x2, &(0x7f000000a000)=""/244, &(0x7f0000000040)=0xf4) 2018/04/16 23:19:48 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x10, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x3fffa, 0x0) writev(r0, &(0x7f0000002680)=[{&(0x7f0000001680)="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", 0x801}], 0x1) 2018/04/16 23:19:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x1c}, 0xfffffffffffffee9) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x401000, 0x2, 0xc, &(0x7f0000000000)) socketpair$inet_icmp(0x400000, 0x2, 0xc, &(0x7f0000000080)) 2018/04/16 23:19:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x1c}, 0xfffffffffffffee9) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x401000, 0x2, 0xc, &(0x7f0000000000)) socketpair$inet_icmp(0x400000, 0x2, 0xc, &(0x7f0000000080)) [ 878.321012] pic_ioport_write: 4 callbacks suppressed [ 878.326279] kvm: pic: single mode not supported [ 878.326308] pic_ioport_write: 4 callbacks suppressed 2018/04/16 23:19:48 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000400)="51e9b75da045e67a49f02896199a752b83898cd7f662ca9c95a342fe265e4c5f92fa687381bd07777a04526d90cbb69444715a676c3e93feb81551d5995bda429f83c93022ba3cfc708a1b2c292870389bba12c48228dcd6347759424942da009b200db38c215035c53c39a91f4cf3d4cc27b3f3c8f693d7c713a0e156aa319bc2e325d7ac145de0fb4c9479f093e24a30b4f35ba5f591f92c566cdf5d6060ee2446dbd42898c1c64017376983e7c4433d40a5a132b421acdae6a50a1947c74315f81d8a131609", 0xc7, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000500)='rxrpc_s\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a}, &(0x7f0000000940)='rxrpc_s\x00', 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000740)={r1, r2, r3}, &(0x7f0000000780)=""/201, 0xc9, &(0x7f0000000900)={&(0x7f0000000880)={'md4\x00'}, &(0x7f00000008c0)="2adbe5d38cec3f3358f4543592718af7", 0x10}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r5 = socket$nl_xfrm(0x11, 0x3, 0x6) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)) sendmsg(r5, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x3, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1000000000000000291b0000d81b0000"], 0x10}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000c97ff8)) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000001140)='/dev/audio\x00', 0x0, 0x0) close(r6) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000000)=0x200000000) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001300)=""/81, &(0x7f0000001380)=""/21, &(0x7f00000013c0)=""/143}) mkdir(&(0x7f0000000140)='./file0/bus\x00', 0x1) r7 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) r8 = accept$ipx(0xffffffffffffffff, 0x0, &(0x7f0000000480)) mknod(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) sendto$ipx(r8, &(0x7f0000000180)="1720de61212728946270de68f761f1de177f34492ad49a50073302ee8524f51a95940e26404d199c85055439fcaf96548ccc51648170026cff6041465f75097d20fa84a9d30fd994b6926d6a4069a0bbc23d9830c2fcc45d65b20bbdd8b3", 0x5e, 0x20000880, &(0x7f00000000c0)={0x4, 0x9, 0x0, "e83853f9b8a9", 0x1}, 0x10) clock_settime(0x0, &(0x7f0000000300)={0x77359400}) r9 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000200)={'security\x00'}, &(0x7f0000000440)=0x54) socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x8011, r9, 0x0) [ 878.326314] kvm: pic: level sensitive irq not supported [ 878.384249] device bridge_slave_1 left promiscuous mode [ 878.395375] bridge0: port 2(bridge_slave_1) entered disabled state [ 878.402963] kvm: pic: single mode not supported [ 878.402975] kvm: pic: level sensitive irq not supported [ 878.445214] device bridge_slave_0 left promiscuous mode [ 878.456471] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:19:48 executing program 7: r0 = socket(0x40000000015, 0x5, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000400)="51e9b75da045e67a49f02896199a752b83898cd7f662ca9c95a342fe265e4c5f92fa687381bd07777a04526d90cbb69444715a676c3e93feb81551d5995bda429f83c93022ba3cfc708a1b2c292870389bba12c48228dcd6347759424942da009b200db38c215035c53c39a91f4cf3d4cc27b3f3c8f693d7c713a0e156aa319bc2e325d7ac145de0fb4c9479f093e24a30b4f35ba5f591f92c566cdf5d6060ee2446dbd42898c1c64017376983e7c4433d40a5a132b421acdae6a50a1947c74315f81d8a131609", 0xc7, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000500)='rxrpc_s\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a}, &(0x7f0000000940)='rxrpc_s\x00', 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000740)={r1, r2, r3}, &(0x7f0000000780)=""/201, 0xc9, &(0x7f0000000900)={&(0x7f0000000880)={'md4\x00'}, &(0x7f00000008c0)="2adbe5d38cec3f3358f4543592718af7", 0x10}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r5 = socket$nl_xfrm(0x11, 0x3, 0x6) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)) sendmsg(r5, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x3, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1000000000000000291b0000d81b0000"], 0x10}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000c97ff8)) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000001140)='/dev/audio\x00', 0x0, 0x0) close(r6) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000000)=0x200000000) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001300)=""/81, &(0x7f0000001380)=""/21, &(0x7f00000013c0)=""/143}) mkdir(&(0x7f0000000140)='./file0/bus\x00', 0x1) r7 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) r8 = accept$ipx(0xffffffffffffffff, 0x0, &(0x7f0000000480)) mknod(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) sendto$ipx(r8, &(0x7f0000000180)="1720de61212728946270de68f761f1de177f34492ad49a50073302ee8524f51a95940e26404d199c85055439fcaf96548ccc51648170026cff6041465f75097d20fa84a9d30fd994b6926d6a4069a0bbc23d9830c2fcc45d65b20bbdd8b3", 0x5e, 0x20000880, &(0x7f00000000c0)={0x4, 0x9, 0x0, "e83853f9b8a9", 0x1}, 0x10) clock_settime(0x0, &(0x7f0000000300)={0x77359400}) r9 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000200)={'security\x00'}, &(0x7f0000000440)=0x54) socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x8011, r9, 0x0) 2018/04/16 23:19:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x1c}, 0xfffffffffffffee9) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x401000, 0x2, 0xc, &(0x7f0000000000)) socketpair$inet_icmp(0x400000, 0x2, 0xc, &(0x7f0000000080)) 2018/04/16 23:19:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000140)={[0x1, 0x0, 0x2000], 0x5922, 0x1, 0x9}) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000240)={[0x10000, 0x112000, 0x2000, 0x5004], 0x4, 0x62}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000200)) getsockname$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x3, 0x39522c8c, 0x3, 0x0, 0x4, [{0x5, 0x0, 0x3}, {0x3, 0x3ff8000, 0x0, 0x0, 0x0, 0x2201}, {0x6, 0xfffffffffffffff7}, {}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:19:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x1c}, 0xfffffffffffffee9) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x401000, 0x2, 0xc, &(0x7f0000000000)) socketpair$inet_icmp(0x400000, 0x2, 0xc, &(0x7f0000000080)) 2018/04/16 23:19:48 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000400)="51e9b75da045e67a49f02896199a752b83898cd7f662ca9c95a342fe265e4c5f92fa687381bd07777a04526d90cbb69444715a676c3e93feb81551d5995bda429f83c93022ba3cfc708a1b2c292870389bba12c48228dcd6347759424942da009b200db38c215035c53c39a91f4cf3d4cc27b3f3c8f693d7c713a0e156aa319bc2e325d7ac145de0fb4c9479f093e24a30b4f35ba5f591f92c566cdf5d6060ee2446dbd42898c1c64017376983e7c4433d40a5a132b421acdae6a50a1947c74315f81d8a131609", 0xc7, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000500)='rxrpc_s\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a}, &(0x7f0000000940)='rxrpc_s\x00', 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000740)={r1, r2, r3}, &(0x7f0000000780)=""/201, 0xc9, &(0x7f0000000900)={&(0x7f0000000880)={'md4\x00'}, &(0x7f00000008c0)="2adbe5d38cec3f3358f4543592718af7", 0x10}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r5 = socket$nl_xfrm(0x11, 0x3, 0x6) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)) sendmsg(r5, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x3, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1000000000000000291b0000d81b0000"], 0x10}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000c97ff8)) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000001140)='/dev/audio\x00', 0x0, 0x0) close(r6) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000000)=0x200000000) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001300)=""/81, &(0x7f0000001380)=""/21, &(0x7f00000013c0)=""/143}) mkdir(&(0x7f0000000140)='./file0/bus\x00', 0x1) r7 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) r8 = accept$ipx(0xffffffffffffffff, 0x0, &(0x7f0000000480)) mknod(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) sendto$ipx(r8, &(0x7f0000000180)="1720de61212728946270de68f761f1de177f34492ad49a50073302ee8524f51a95940e26404d199c85055439fcaf96548ccc51648170026cff6041465f75097d20fa84a9d30fd994b6926d6a4069a0bbc23d9830c2fcc45d65b20bbdd8b3", 0x5e, 0x20000880, &(0x7f00000000c0)={0x4, 0x9, 0x0, "e83853f9b8a9", 0x1}, 0x10) clock_settime(0x0, &(0x7f0000000300)={0x77359400}) r9 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000200)={'security\x00'}, &(0x7f0000000440)=0x54) socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x8011, r9, 0x0) [ 878.625656] team0 (unregistering): Port device team_slave_1 removed 2018/04/16 23:19:48 executing program 7: r0 = socket(0x40000000015, 0x5, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000400)="51e9b75da045e67a49f02896199a752b83898cd7f662ca9c95a342fe265e4c5f92fa687381bd07777a04526d90cbb69444715a676c3e93feb81551d5995bda429f83c93022ba3cfc708a1b2c292870389bba12c48228dcd6347759424942da009b200db38c215035c53c39a91f4cf3d4cc27b3f3c8f693d7c713a0e156aa319bc2e325d7ac145de0fb4c9479f093e24a30b4f35ba5f591f92c566cdf5d6060ee2446dbd42898c1c64017376983e7c4433d40a5a132b421acdae6a50a1947c74315f81d8a131609", 0xc7, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000500)='rxrpc_s\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a}, &(0x7f0000000940)='rxrpc_s\x00', 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000740)={r1, r2, r3}, &(0x7f0000000780)=""/201, 0xc9, &(0x7f0000000900)={&(0x7f0000000880)={'md4\x00'}, &(0x7f00000008c0)="2adbe5d38cec3f3358f4543592718af7", 0x10}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r5 = socket$nl_xfrm(0x11, 0x3, 0x6) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)) sendmsg(r5, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x3, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1000000000000000291b0000d81b0000"], 0x10}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000c97ff8)) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000001140)='/dev/audio\x00', 0x0, 0x0) close(r6) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000000)=0x200000000) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001300)=""/81, &(0x7f0000001380)=""/21, &(0x7f00000013c0)=""/143}) mkdir(&(0x7f0000000140)='./file0/bus\x00', 0x1) r7 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) r8 = accept$ipx(0xffffffffffffffff, 0x0, &(0x7f0000000480)) mknod(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) sendto$ipx(r8, &(0x7f0000000180)="1720de61212728946270de68f761f1de177f34492ad49a50073302ee8524f51a95940e26404d199c85055439fcaf96548ccc51648170026cff6041465f75097d20fa84a9d30fd994b6926d6a4069a0bbc23d9830c2fcc45d65b20bbdd8b3", 0x5e, 0x20000880, &(0x7f00000000c0)={0x4, 0x9, 0x0, "e83853f9b8a9", 0x1}, 0x10) clock_settime(0x0, &(0x7f0000000300)={0x77359400}) r9 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000200)={'security\x00'}, &(0x7f0000000440)=0x54) socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x8011, r9, 0x0) 2018/04/16 23:19:48 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000400)="51e9b75da045e67a49f02896199a752b83898cd7f662ca9c95a342fe265e4c5f92fa687381bd07777a04526d90cbb69444715a676c3e93feb81551d5995bda429f83c93022ba3cfc708a1b2c292870389bba12c48228dcd6347759424942da009b200db38c215035c53c39a91f4cf3d4cc27b3f3c8f693d7c713a0e156aa319bc2e325d7ac145de0fb4c9479f093e24a30b4f35ba5f591f92c566cdf5d6060ee2446dbd42898c1c64017376983e7c4433d40a5a132b421acdae6a50a1947c74315f81d8a131609", 0xc7, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000500)='rxrpc_s\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a}, &(0x7f0000000940)='rxrpc_s\x00', 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000740)={r1, r2, r3}, &(0x7f0000000780)=""/201, 0xc9, &(0x7f0000000900)={&(0x7f0000000880)={'md4\x00'}, &(0x7f00000008c0)="2adbe5d38cec3f3358f4543592718af7", 0x10}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r5 = socket$nl_xfrm(0x11, 0x3, 0x6) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)) sendmsg(r5, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x3, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1000000000000000291b0000d81b0000"], 0x10}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000c97ff8)) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000001140)='/dev/audio\x00', 0x0, 0x0) close(r6) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000000)=0x200000000) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001300)=""/81, &(0x7f0000001380)=""/21, &(0x7f00000013c0)=""/143}) mkdir(&(0x7f0000000140)='./file0/bus\x00', 0x1) r7 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) r8 = accept$ipx(0xffffffffffffffff, 0x0, &(0x7f0000000480)) mknod(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) sendto$ipx(r8, &(0x7f0000000180)="1720de61212728946270de68f761f1de177f34492ad49a50073302ee8524f51a95940e26404d199c85055439fcaf96548ccc51648170026cff6041465f75097d20fa84a9d30fd994b6926d6a4069a0bbc23d9830c2fcc45d65b20bbdd8b3", 0x5e, 0x20000880, &(0x7f00000000c0)={0x4, 0x9, 0x0, "e83853f9b8a9", 0x1}, 0x10) clock_settime(0x0, &(0x7f0000000300)={0x77359400}) r9 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000200)={'security\x00'}, &(0x7f0000000440)=0x54) socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x8011, r9, 0x0) [ 878.671399] team0 (unregistering): Port device team_slave_0 removed [ 878.704160] kvm: pic: single mode not supported [ 878.704175] kvm: pic: level sensitive irq not supported [ 878.709899] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 878.724301] kvm: pic: single mode not supported [ 878.724313] kvm: pic: level sensitive irq not supported [ 878.779183] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 878.842014] bond0 (unregistering): Released all slaves [ 879.638560] IPVS: ftp: loaded support on port[0] = 21 [ 880.018519] bridge0: port 1(bridge_slave_0) entered blocking state [ 880.024926] bridge0: port 1(bridge_slave_0) entered disabled state [ 880.032849] device bridge_slave_0 entered promiscuous mode [ 880.059346] bridge0: port 2(bridge_slave_1) entered blocking state [ 880.065824] bridge0: port 2(bridge_slave_1) entered disabled state [ 880.072931] device bridge_slave_1 entered promiscuous mode [ 880.098970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 880.125181] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 880.199182] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 880.227858] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 880.340546] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 880.347734] team0: Port device team_slave_0 added [ 880.373166] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 880.380545] team0: Port device team_slave_1 added [ 880.406098] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 880.432936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 880.461344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 880.489712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 880.728399] bridge0: port 2(bridge_slave_1) entered blocking state [ 880.734796] bridge0: port 2(bridge_slave_1) entered forwarding state [ 880.741447] bridge0: port 1(bridge_slave_0) entered blocking state [ 880.747838] bridge0: port 1(bridge_slave_0) entered forwarding state [ 881.612455] 8021q: adding VLAN 0 to HW filter on device bond0 [ 881.699567] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 881.785687] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 881.791912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 881.799605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 881.889676] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:52 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000400)="51e9b75da045e67a49f02896199a752b83898cd7f662ca9c95a342fe265e4c5f92fa687381bd07777a04526d90cbb69444715a676c3e93feb81551d5995bda429f83c93022ba3cfc708a1b2c292870389bba12c48228dcd6347759424942da009b200db38c215035c53c39a91f4cf3d4cc27b3f3c8f693d7c713a0e156aa319bc2e325d7ac145de0fb4c9479f093e24a30b4f35ba5f591f92c566cdf5d6060ee2446dbd42898c1c64017376983e7c4433d40a5a132b421acdae6a50a1947c74315f81d8a131609", 0xc7, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000500)='rxrpc_s\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a}, &(0x7f0000000940)='rxrpc_s\x00', 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000740)={r1, r2, r3}, &(0x7f0000000780)=""/201, 0xc9, &(0x7f0000000900)={&(0x7f0000000880)={'md4\x00'}, &(0x7f00000008c0)="2adbe5d38cec3f3358f4543592718af7", 0x10}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r5 = socket$nl_xfrm(0x11, 0x3, 0x6) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)) sendmsg(r5, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x3, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1000000000000000291b0000d81b0000"], 0x10}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000c97ff8)) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000001140)='/dev/audio\x00', 0x0, 0x0) close(r6) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000000)=0x200000000) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001300)=""/81, &(0x7f0000001380)=""/21, &(0x7f00000013c0)=""/143}) mkdir(&(0x7f0000000140)='./file0/bus\x00', 0x1) r7 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) r8 = accept$ipx(0xffffffffffffffff, 0x0, &(0x7f0000000480)) mknod(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) sendto$ipx(r8, &(0x7f0000000180)="1720de61212728946270de68f761f1de177f34492ad49a50073302ee8524f51a95940e26404d199c85055439fcaf96548ccc51648170026cff6041465f75097d20fa84a9d30fd994b6926d6a4069a0bbc23d9830c2fcc45d65b20bbdd8b3", 0x5e, 0x20000880, &(0x7f00000000c0)={0x4, 0x9, 0x0, "e83853f9b8a9", 0x1}, 0x10) clock_settime(0x0, &(0x7f0000000300)={0x77359400}) r9 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000200)={'security\x00'}, &(0x7f0000000440)=0x54) socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x8011, r9, 0x0) 2018/04/16 23:19:52 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$cont(0x11, r1, 0x0, 0x0) 2018/04/16 23:19:52 executing program 7: r0 = socket(0x40000000015, 0x5, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000400)="51e9b75da045e67a49f02896199a752b83898cd7f662ca9c95a342fe265e4c5f92fa687381bd07777a04526d90cbb69444715a676c3e93feb81551d5995bda429f83c93022ba3cfc708a1b2c292870389bba12c48228dcd6347759424942da009b200db38c215035c53c39a91f4cf3d4cc27b3f3c8f693d7c713a0e156aa319bc2e325d7ac145de0fb4c9479f093e24a30b4f35ba5f591f92c566cdf5d6060ee2446dbd42898c1c64017376983e7c4433d40a5a132b421acdae6a50a1947c74315f81d8a131609", 0xc7, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000500)='rxrpc_s\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a}, &(0x7f0000000940)='rxrpc_s\x00', 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000740)={r1, r2, r3}, &(0x7f0000000780)=""/201, 0xc9, &(0x7f0000000900)={&(0x7f0000000880)={'md4\x00'}, &(0x7f00000008c0)="2adbe5d38cec3f3358f4543592718af7", 0x10}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r5 = socket$nl_xfrm(0x11, 0x3, 0x6) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)) sendmsg(r5, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x3, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1000000000000000291b0000d81b0000"], 0x10}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000c97ff8)) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000001140)='/dev/audio\x00', 0x0, 0x0) close(r6) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000000)=0x200000000) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001300)=""/81, &(0x7f0000001380)=""/21, &(0x7f00000013c0)=""/143}) mkdir(&(0x7f0000000140)='./file0/bus\x00', 0x1) r7 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) r8 = accept$ipx(0xffffffffffffffff, 0x0, &(0x7f0000000480)) mknod(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) sendto$ipx(r8, &(0x7f0000000180)="1720de61212728946270de68f761f1de177f34492ad49a50073302ee8524f51a95940e26404d199c85055439fcaf96548ccc51648170026cff6041465f75097d20fa84a9d30fd994b6926d6a4069a0bbc23d9830c2fcc45d65b20bbdd8b3", 0x5e, 0x20000880, &(0x7f00000000c0)={0x4, 0x9, 0x0, "e83853f9b8a9", 0x1}, 0x10) clock_settime(0x0, &(0x7f0000000300)={0x77359400}) r9 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000200)={'security\x00'}, &(0x7f0000000440)=0x54) socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x8011, r9, 0x0) 2018/04/16 23:19:52 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) close(r1) syz_open_dev$tun(&(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x1, 0x0, &(0x7f0000000040)=""/254, &(0x7f0000000140)=""/119, &(0x7f00000001c0)=""/150}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'dummy0\x00', 0x1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x1, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x1, r1}) 2018/04/16 23:19:52 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000ea4fdc)="240000001a0025f00018000400ed040f020b00000004bf0202ffffeb0800100048186be0", 0x24) clock_gettime(0x0, &(0x7f0000000100)) 2018/04/16 23:19:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000140)={[0x1, 0x0, 0x2000], 0x5922, 0x1, 0x9}) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000240)={[0x10000, 0x112000, 0x2000, 0x5004], 0x4, 0x62}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000200)) getsockname$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x3, 0x39522c8c, 0x3, 0x0, 0x4, [{0x5, 0x0, 0x3}, {0x3, 0x3ff8000, 0x0, 0x0, 0x0, 0x2201}, {0x6, 0xfffffffffffffff7}, {}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:19:52 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000400)="51e9b75da045e67a49f02896199a752b83898cd7f662ca9c95a342fe265e4c5f92fa687381bd07777a04526d90cbb69444715a676c3e93feb81551d5995bda429f83c93022ba3cfc708a1b2c292870389bba12c48228dcd6347759424942da009b200db38c215035c53c39a91f4cf3d4cc27b3f3c8f693d7c713a0e156aa319bc2e325d7ac145de0fb4c9479f093e24a30b4f35ba5f591f92c566cdf5d6060ee2446dbd42898c1c64017376983e7c4433d40a5a132b421acdae6a50a1947c74315f81d8a131609", 0xc7, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000500)='rxrpc_s\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a}, &(0x7f0000000940)='rxrpc_s\x00', 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000740)={r1, r2, r3}, &(0x7f0000000780)=""/201, 0xc9, &(0x7f0000000900)={&(0x7f0000000880)={'md4\x00'}, &(0x7f00000008c0)="2adbe5d38cec3f3358f4543592718af7", 0x10}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r5 = socket$nl_xfrm(0x11, 0x3, 0x6) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)) sendmsg(r5, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x3, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1000000000000000291b0000d81b0000"], 0x10}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000c97ff8)) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000001140)='/dev/audio\x00', 0x0, 0x0) close(r6) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000000)=0x200000000) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001300)=""/81, &(0x7f0000001380)=""/21, &(0x7f00000013c0)=""/143}) mkdir(&(0x7f0000000140)='./file0/bus\x00', 0x1) r7 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) r8 = accept$ipx(0xffffffffffffffff, 0x0, &(0x7f0000000480)) mknod(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) sendto$ipx(r8, &(0x7f0000000180)="1720de61212728946270de68f761f1de177f34492ad49a50073302ee8524f51a95940e26404d199c85055439fcaf96548ccc51648170026cff6041465f75097d20fa84a9d30fd994b6926d6a4069a0bbc23d9830c2fcc45d65b20bbdd8b3", 0x5e, 0x20000880, &(0x7f00000000c0)={0x4, 0x9, 0x0, "e83853f9b8a9", 0x1}, 0x10) clock_settime(0x0, &(0x7f0000000300)={0x77359400}) r9 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000200)={'security\x00'}, &(0x7f0000000440)=0x54) socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x8011, r9, 0x0) 2018/04/16 23:19:52 executing program 3: pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) fcntl$setpipe(r0, 0x407, 0x0) write$eventfd(r1, &(0x7f0000000000), 0x8) dup2(r0, r2) 2018/04/16 23:19:52 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000ea4fdc)="240000001a0025f00018000400ed040f020b00000004bf0202ffffeb0800100048186be0", 0x24) clock_gettime(0x0, &(0x7f0000000100)) [ 882.565580] kvm: pic: single mode not supported 2018/04/16 23:19:52 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$cont(0x11, r1, 0x0, 0x0) 2018/04/16 23:19:52 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$cont(0x11, r1, 0x0, 0x0) 2018/04/16 23:19:52 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000400)="51e9b75da045e67a49f02896199a752b83898cd7f662ca9c95a342fe265e4c5f92fa687381bd07777a04526d90cbb69444715a676c3e93feb81551d5995bda429f83c93022ba3cfc708a1b2c292870389bba12c48228dcd6347759424942da009b200db38c215035c53c39a91f4cf3d4cc27b3f3c8f693d7c713a0e156aa319bc2e325d7ac145de0fb4c9479f093e24a30b4f35ba5f591f92c566cdf5d6060ee2446dbd42898c1c64017376983e7c4433d40a5a132b421acdae6a50a1947c74315f81d8a131609", 0xc7, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000500)='rxrpc_s\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a}, &(0x7f0000000940)='rxrpc_s\x00', 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000740)={r1, r2, r3}, &(0x7f0000000780)=""/201, 0xc9, &(0x7f0000000900)={&(0x7f0000000880)={'md4\x00'}, &(0x7f00000008c0)="2adbe5d38cec3f3358f4543592718af7", 0x10}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r5 = socket$nl_xfrm(0x11, 0x3, 0x6) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)) sendmsg(r5, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x3, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1000000000000000291b0000d81b0000"], 0x10}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000c97ff8)) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000001140)='/dev/audio\x00', 0x0, 0x0) close(r6) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000000)=0x200000000) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001300)=""/81, &(0x7f0000001380)=""/21, &(0x7f00000013c0)=""/143}) mkdir(&(0x7f0000000140)='./file0/bus\x00', 0x1) r7 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) r8 = accept$ipx(0xffffffffffffffff, 0x0, &(0x7f0000000480)) mknod(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) sendto$ipx(r8, &(0x7f0000000180)="1720de61212728946270de68f761f1de177f34492ad49a50073302ee8524f51a95940e26404d199c85055439fcaf96548ccc51648170026cff6041465f75097d20fa84a9d30fd994b6926d6a4069a0bbc23d9830c2fcc45d65b20bbdd8b3", 0x5e, 0x20000880, &(0x7f00000000c0)={0x4, 0x9, 0x0, "e83853f9b8a9", 0x1}, 0x10) clock_settime(0x0, &(0x7f0000000300)={0x77359400}) r9 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000200)={'security\x00'}, &(0x7f0000000440)=0x54) socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x1000001, 0x8011, r9, 0x0) 2018/04/16 23:19:52 executing program 7: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mount(&(0x7f0000000280)='./control\x00', &(0x7f00000002c0)='./control\x00', &(0x7f0000000300)='autofs\x00', 0x9000, &(0x7f0000001440)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000680)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000010000/0x4000)=nil, 0x4000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) r2 = getpgid(0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000100)=0x5) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') rmdir(&(0x7f000015dff6)='./control\x00') unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 882.565594] kvm: pic: level sensitive irq not supported [ 882.590421] kvm: pic: single mode not supported [ 882.596307] kvm: pic: level sensitive irq not supported [ 882.632243] device bridge_slave_1 left promiscuous mode [ 882.643282] bridge0: port 2(bridge_slave_1) entered disabled state [ 882.709839] device bridge_slave_0 left promiscuous mode [ 882.715491] bridge0: port 1(bridge_slave_0) entered disabled state [ 882.785392] IPVS: ftp: loaded support on port[0] = 21 [ 882.813478] team0 (unregistering): Port device team_slave_1 removed [ 882.823686] team0 (unregistering): Port device team_slave_0 removed [ 882.834103] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 882.847386] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 882.872860] bond0 (unregistering): Released all slaves [ 883.514847] bridge0: port 1(bridge_slave_0) entered blocking state [ 883.521321] bridge0: port 1(bridge_slave_0) entered disabled state [ 883.529520] device bridge_slave_0 entered promiscuous mode [ 883.567688] bridge0: port 2(bridge_slave_1) entered blocking state [ 883.574129] bridge0: port 2(bridge_slave_1) entered disabled state [ 883.582128] device bridge_slave_1 entered promiscuous mode [ 883.621634] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 883.660446] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 883.773294] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 883.815128] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 883.998342] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 884.005602] team0: Port device team_slave_0 added [ 884.043332] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 884.052547] team0: Port device team_slave_1 added [ 884.094336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 884.135152] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 884.177860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 884.209599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 884.491659] bridge0: port 2(bridge_slave_1) entered blocking state [ 884.498073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 884.504747] bridge0: port 1(bridge_slave_0) entered blocking state [ 884.511131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 884.518582] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 885.387674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 885.471180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 885.482313] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 885.568785] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 885.575000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 885.582290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 885.664626] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:56 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$cont(0x11, r1, 0x0, 0x0) 2018/04/16 23:19:56 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000ea4fdc)="240000001a0025f00018000400ed040f020b00000004bf0202ffffeb0800100048186be0", 0x24) clock_gettime(0x0, &(0x7f0000000100)) 2018/04/16 23:19:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000140)={[0x1, 0x0, 0x2000], 0x5922, 0x1, 0x9}) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000240)={[0x10000, 0x112000, 0x2000, 0x5004], 0x4, 0x62}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000200)) getsockname$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x3, 0x39522c8c, 0x3, 0x0, 0x4, [{0x5, 0x0, 0x3}, {0x3, 0x3ff8000, 0x0, 0x0, 0x0, 0x2201}, {0x6, 0xfffffffffffffff7}, {}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:19:56 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000380)={r1, 0x1, 0x0, r1}) close(r1) syz_open_dev$tun(&(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x240185) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000333f88)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) delete_module(&(0x7f0000000440)='dev ', 0x200) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x1, 0x0, &(0x7f0000000040)=""/254, &(0x7f0000000140)=""/119, &(0x7f00000001c0)=""/150}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'dummy0\x00', 0x1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x1, r1}) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=0x0, @ANYBLOB="cf000000f453936a64768c4d8d687b2549dd4093ae3ef12ce13709e621cad6e4a493fabd8b935e0af0291a0a519bb68defc5f4d99125dd9d1043531d9c2dfb21ce456575979dfc76a4f5b93b6d1fea75dc5407e5f6a30131adc77d9f4328d79aa242289d5c56d2ebc103af35988c2921041950b5fcbad297915208ca8a99a8c3537d1361d693469a475f6d3a270153b84743c9924396f944a2b12c736f5702cd8609000000b225fb7ada3c78b3c7e844c3acfaea90d252175bf24b03c463a6b5687a82f8f83a3c41882e7681c594ac6a800bd062746bb9965a09b8f47e518a2780c311bff7deea32e3dca3dc022b"], &(0x7f0000000600)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000680)={r5, 0x3c, &(0x7f0000000640)=[@in={0x2, 0x4e22, @broadcast=0xffffffff}, @in6={0xa, 0x4e23, 0x29e, @empty, 0x79}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}]}, &(0x7f00000006c0)=0x10) fallocate(r4, 0x0, 0x0, 0x1) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000080)={0x0, 0x1}) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_sctp(0x2, 0x4000000000005, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) io_setup(0x1f, &(0x7f0000000400)) r7 = add_key(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500), 0x0, 0xfffffffffffffffb) keyctl$reject(0x13, r7, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r6, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xfffffffffffffffd, {0x2, 0x0, @broadcast=0xffffffff}, 'syz_tun\x00'}) setsockopt$inet_int(r3, 0x0, 0xd, &(0x7f00000000c0)=0x5, 0x4) accept$inet(r6, &(0x7f0000000100)={0x0, 0x0, @rand_addr}, &(0x7f00000003c0)=0xffffffffffffff54) 2018/04/16 23:19:56 executing program 0: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000a3b000)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000007000)="ea306b0073192ed165e0ff2679b65abb1023f81e00dc30b8e587d928226b70da7d922af9c36e7e5c3fcab589ec", 0x2d}], 0x1, &(0x7f0000c7b000)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000997ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/16 23:19:56 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$cont(0x11, r1, 0x0, 0x0) 2018/04/16 23:19:56 executing program 3: pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) fcntl$setpipe(r0, 0x407, 0x0) write$eventfd(r1, &(0x7f0000000000), 0x8) dup2(r0, r2) 2018/04/16 23:19:56 executing program 7: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mount(&(0x7f0000000280)='./control\x00', &(0x7f00000002c0)='./control\x00', &(0x7f0000000300)='autofs\x00', 0x9000, &(0x7f0000001440)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000680)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000010000/0x4000)=nil, 0x4000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) r2 = getpgid(0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000100)=0x5) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') rmdir(&(0x7f000015dff6)='./control\x00') unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/04/16 23:19:56 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$cont(0x11, r1, 0x0, 0x0) 2018/04/16 23:19:56 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000ea4fdc)="240000001a0025f00018000400ed040f020b00000004bf0202ffffeb0800100048186be0", 0x24) clock_gettime(0x0, &(0x7f0000000100)) 2018/04/16 23:19:56 executing program 0: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000a3b000)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000007000)="ea306b0073192ed165e0ff2679b65abb1023f81e00dc30b8e587d928226b70da7d922af9c36e7e5c3fcab589ec", 0x2d}], 0x1, &(0x7f0000c7b000)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000997ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/16 23:19:56 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$cont(0x11, r1, 0x0, 0x0) [ 886.393268] kvm: pic: single mode not supported [ 886.393282] kvm: pic: level sensitive irq not supported [ 886.399438] device bridge_slave_1 left promiscuous mode [ 886.410474] bridge0: port 2(bridge_slave_1) entered disabled state [ 886.434382] kvm: pic: single mode not supported 2018/04/16 23:19:56 executing program 0: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000a3b000)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000007000)="ea306b0073192ed165e0ff2679b65abb1023f81e00dc30b8e587d928226b70da7d922af9c36e7e5c3fcab589ec", 0x2d}], 0x1, &(0x7f0000c7b000)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000997ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/16 23:19:56 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet(0x1e, 0x1, 0x0, &(0x7f00001b6ff8)={0x0, 0x0}) connect$inet(r0, &(0x7f0000000180)={0x2}, 0x10) [ 886.434396] kvm: pic: level sensitive irq not supported [ 886.462123] device bridge_slave_0 left promiscuous mode [ 886.473217] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:19:56 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) 2018/04/16 23:19:56 executing program 1: ioprio_set$pid(0x2, 0x0, 0x7eab) ioprio_get$pid(0x3, 0x0) 2018/04/16 23:19:56 executing program 6: remap_file_pages(&(0x7f0000008000/0x4000)=nil, 0x500, 0x0, 0x0, 0x0) [ 886.593380] IPVS: ftp: loaded support on port[0] = 21 [ 886.654012] team0 (unregistering): Port device team_slave_1 removed [ 886.676451] team0 (unregistering): Port device team_slave_0 removed [ 886.689515] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 886.705871] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 886.738659] bond0 (unregistering): Released all slaves [ 887.428537] bridge0: port 1(bridge_slave_0) entered blocking state [ 887.435005] bridge0: port 1(bridge_slave_0) entered disabled state [ 887.442979] device bridge_slave_0 entered promiscuous mode [ 887.482666] bridge0: port 2(bridge_slave_1) entered blocking state [ 887.489158] bridge0: port 2(bridge_slave_1) entered disabled state [ 887.497206] device bridge_slave_1 entered promiscuous mode [ 887.535370] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 887.574662] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 887.692734] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 887.735458] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 887.776655] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 887.783752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 887.822121] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 887.829125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 887.929620] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 887.937119] team0: Port device team_slave_0 added [ 887.973245] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 887.981276] team0: Port device team_slave_1 added [ 888.008703] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 888.050321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 888.087791] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 888.094929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 888.105606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 888.126225] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 888.133579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 888.142459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 888.387694] bridge0: port 2(bridge_slave_1) entered blocking state [ 888.394282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 888.400949] bridge0: port 1(bridge_slave_0) entered blocking state [ 888.407340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 888.414711] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 888.799333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 889.335610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 889.424117] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 889.512137] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 889.518351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 889.526171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 889.609568] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:19:59 executing program 1: ioprio_set$pid(0x2, 0x0, 0x7eab) ioprio_get$pid(0x3, 0x0) 2018/04/16 23:19:59 executing program 0: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000a3b000)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000007000)="ea306b0073192ed165e0ff2679b65abb1023f81e00dc30b8e587d928226b70da7d922af9c36e7e5c3fcab589ec", 0x2d}], 0x1, &(0x7f0000c7b000)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000997ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/16 23:19:59 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffffffffffff) mmap(&(0x7f00003f5000/0x2000)=nil, 0x2000, 0x0, 0x1011, r0, 0x0) 2018/04/16 23:19:59 executing program 3: pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) fcntl$setpipe(r0, 0x407, 0x0) write$eventfd(r1, &(0x7f0000000000), 0x8) dup2(r0, r2) 2018/04/16 23:19:59 executing program 6: remap_file_pages(&(0x7f0000008000/0x4000)=nil, 0x500, 0x0, 0x0, 0x0) 2018/04/16 23:19:59 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x29, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffbfd, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) sched_setattr(0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x3e}, 0x0) mknod(&(0x7f0000b75ff8)='./file0\x00', 0x2001001, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$TCSETSW(r1, 0x5402, &(0x7f00009dc000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}) r2 = syz_open_pts(r1, 0x0) readv(r2, &(0x7f00001aa000)=[{&(0x7f00006aaf01)=""/255, 0xff}], 0x1) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x2) r4 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000540)="4d84333445eca8a951986a846c5c47b685ce9ea05c41720355959e784903d6fce785e33be7c12ba8fda1307fecc9f8c7791333cef05561e77184f6920469125dd6534188635f0fd4ff36c33c473ebdfc2e8724e4149292718a5206d3457ed46367fc6bc14aa01c63e0ae71", 0x6b, r4) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) r5 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x7fffffff, 0x2880) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f00000000c0)={0xffffffffffffffe1, 0x0, 0x6, 0x0, 0xcbbe}) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x6, 0x10000000, 0x4, 0x9, 0x0, 0x1, 0x0, 0x800, 0x8, 0x40, 0x1, 0x1}) r6 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7636}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r5, &(0x7f0000000380)="8281f22d00259f3966a7515e1811fe7fc41282e89a92cab2af256880da31befd8098854e3028ff8ee02be574edc779c0f77d04cff5846ff9448e996d881793a2faa725df2bec8092d2141f34c753b7973f10cd5920c4febf2805baeb4505e69a5068", &(0x7f0000000480)=""/31}, 0x18) close(r1) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000640)={0x3, 0x6}) getsockopt$inet6_mreq(r3, 0x29, 0x1f, &(0x7f0000000180)={@mcast1, 0x0}, &(0x7f0000000500)=0x14) bind$can_raw(r5, &(0x7f0000000600)={0x1d, r7}, 0x10) 2018/04/16 23:19:59 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet(0x1e, 0x1, 0x0, &(0x7f00001b6ff8)={0x0, 0x0}) connect$inet(r0, &(0x7f0000000180)={0x2}, 0x10) 2018/04/16 23:19:59 executing program 7: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mount(&(0x7f0000000280)='./control\x00', &(0x7f00000002c0)='./control\x00', &(0x7f0000000300)='autofs\x00', 0x9000, &(0x7f0000001440)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000680)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000010000/0x4000)=nil, 0x4000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) r2 = getpgid(0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000100)=0x5) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') rmdir(&(0x7f000015dff6)='./control\x00') unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/04/16 23:20:00 executing program 6: remap_file_pages(&(0x7f0000008000/0x4000)=nil, 0x500, 0x0, 0x0, 0x0) 2018/04/16 23:20:00 executing program 1: ioprio_set$pid(0x2, 0x0, 0x7eab) ioprio_get$pid(0x3, 0x0) 2018/04/16 23:20:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000140)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffff}, 0x13f}}, 0x20) write$rdma_cm(r0, &(0x7f0000000a40)=@set_option={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000940)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) 2018/04/16 23:20:00 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffffffffffff) mmap(&(0x7f00003f5000/0x2000)=nil, 0x2000, 0x0, 0x1011, r0, 0x0) 2018/04/16 23:20:00 executing program 6: remap_file_pages(&(0x7f0000008000/0x4000)=nil, 0x500, 0x0, 0x0, 0x0) 2018/04/16 23:20:00 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet(0x1e, 0x1, 0x0, &(0x7f00001b6ff8)={0x0, 0x0}) connect$inet(r0, &(0x7f0000000180)={0x2}, 0x10) 2018/04/16 23:20:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000140)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffff}, 0x13f}}, 0x20) write$rdma_cm(r0, &(0x7f0000000a40)=@set_option={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000940)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) 2018/04/16 23:20:00 executing program 1: ioprio_set$pid(0x2, 0x0, 0x7eab) ioprio_get$pid(0x3, 0x0) 2018/04/16 23:20:00 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffffffffffff) mmap(&(0x7f00003f5000/0x2000)=nil, 0x2000, 0x0, 0x1011, r0, 0x0) [ 890.417349] device bridge_slave_1 left promiscuous mode [ 890.423095] bridge0: port 2(bridge_slave_1) entered disabled state [ 890.425645] IPVS: ftp: loaded support on port[0] = 21 [ 890.471244] device bridge_slave_0 left promiscuous mode [ 890.476943] bridge0: port 1(bridge_slave_0) entered disabled state [ 890.571366] team0 (unregistering): Port device team_slave_1 removed [ 890.582326] team0 (unregistering): Port device team_slave_0 removed [ 890.593073] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 890.610903] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 890.642526] bond0 (unregistering): Released all slaves [ 891.326008] bridge0: port 1(bridge_slave_0) entered blocking state [ 891.332461] bridge0: port 1(bridge_slave_0) entered disabled state [ 891.340737] device bridge_slave_0 entered promiscuous mode [ 891.380117] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.386626] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.393984] device bridge_slave_1 entered promiscuous mode [ 891.433335] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 891.472733] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 891.588290] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 891.630820] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 891.808955] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 891.816627] team0: Port device team_slave_0 added [ 891.854323] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 891.862827] team0: Port device team_slave_1 added [ 891.902060] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 891.932922] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 891.972289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 892.010939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 892.265819] bridge0: port 2(bridge_slave_1) entered blocking state [ 892.272221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 892.278883] bridge0: port 1(bridge_slave_0) entered blocking state [ 892.285255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 892.292617] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 893.212991] 8021q: adding VLAN 0 to HW filter on device bond0 [ 893.219551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 893.309111] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 893.396876] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 893.403183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 893.411130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 893.495778] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:03 executing program 7: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mount(&(0x7f0000000280)='./control\x00', &(0x7f00000002c0)='./control\x00', &(0x7f0000000300)='autofs\x00', 0x9000, &(0x7f0000001440)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000680)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000010000/0x4000)=nil, 0x4000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) r2 = getpgid(0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000100)=0x5) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') rmdir(&(0x7f000015dff6)='./control\x00') unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/04/16 23:20:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000400)=@getlink={0x28, 0x12, 0x209, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0xf}]}, 0x28}, 0x1}, 0x0) 2018/04/16 23:20:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000140)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffff}, 0x13f}}, 0x20) write$rdma_cm(r0, &(0x7f0000000a40)=@set_option={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000940)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) 2018/04/16 23:20:03 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet(0x1e, 0x1, 0x0, &(0x7f00001b6ff8)={0x0, 0x0}) connect$inet(r0, &(0x7f0000000180)={0x2}, 0x10) 2018/04/16 23:20:03 executing program 3: pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) fcntl$setpipe(r0, 0x407, 0x0) write$eventfd(r1, &(0x7f0000000000), 0x8) dup2(r0, r2) 2018/04/16 23:20:03 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffffffffffff) mmap(&(0x7f00003f5000/0x2000)=nil, 0x2000, 0x0, 0x1011, r0, 0x0) 2018/04/16 23:20:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="81081800001d000000010054409d0954", 0x10) r1 = accept(r0, 0x0, &(0x7f0000000180)) sendmsg$nl_crypto(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@get={0xe8, 0x13, 0x0, 0x0, 0x0, {{'ecb(des3_ede)\x00'}}, [{0x8, 0x1}]}, 0xe8}, 0x1}, 0x0) 2018/04/16 23:20:03 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x1, &(0x7f0000527000)="828159920897e8d6962418a58ba2e695114678bb31bcf902c00b8025f1956bac9e53661832d3683c00a3bd136abdd85cd9c8d2e2cfd0c148", 0x38) 2018/04/16 23:20:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000140)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffff}, 0x13f}}, 0x20) write$rdma_cm(r0, &(0x7f0000000a40)=@set_option={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000940)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) 2018/04/16 23:20:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000400)=@getlink={0x28, 0x12, 0x209, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0xf}]}, 0x28}, 0x1}, 0x0) 2018/04/16 23:20:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0xea, 0x2}) 2018/04/16 23:20:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="120000004e001f0014f9f400000000000300", 0x12) [ 894.266383] device bridge_slave_1 left promiscuous mode [ 894.272167] bridge0: port 2(bridge_slave_1) entered disabled state [ 894.304475] device bridge_slave_0 left promiscuous mode [ 894.310203] bridge0: port 1(bridge_slave_0) entered disabled state [ 894.356704] team0 (unregistering): Port device team_slave_1 removed [ 894.368826] team0 (unregistering): Port device team_slave_0 removed [ 894.379376] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 894.399060] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 894.428856] bond0 (unregistering): Released all slaves [ 895.502434] IPVS: ftp: loaded support on port[0] = 21 [ 895.899906] bridge0: port 1(bridge_slave_0) entered blocking state [ 895.906490] bridge0: port 1(bridge_slave_0) entered disabled state [ 895.913701] device bridge_slave_0 entered promiscuous mode [ 895.940747] bridge0: port 2(bridge_slave_1) entered blocking state [ 895.947170] bridge0: port 2(bridge_slave_1) entered disabled state [ 895.954688] device bridge_slave_1 entered promiscuous mode [ 895.984462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 896.012411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 896.098741] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 896.127784] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 896.244848] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 896.252078] team0: Port device team_slave_0 added [ 896.277239] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 896.284597] team0: Port device team_slave_1 added [ 896.309298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 896.316205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 896.324782] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 896.347141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 896.354172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 896.362653] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 896.383431] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 896.390548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 896.399179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 896.420913] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 896.428085] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 896.436160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 896.674355] bridge0: port 2(bridge_slave_1) entered blocking state [ 896.680739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 896.687386] bridge0: port 1(bridge_slave_0) entered blocking state [ 896.693921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 896.701277] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 897.311157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 897.586247] 8021q: adding VLAN 0 to HW filter on device bond0 [ 897.673441] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 897.758832] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 897.765223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 897.772667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 897.857100] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:08 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="120000004e001f0014f9f400000000000300", 0x12) 2018/04/16 23:20:08 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) 2018/04/16 23:20:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000400)=@getlink={0x28, 0x12, 0x209, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0xf}]}, 0x28}, 0x1}, 0x0) 2018/04/16 23:20:08 executing program 2: pipe2(&(0x7f0000edeff8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x80000000004) write(r4, &(0x7f000058bfe4)="29000000140003b7ff000000040860eb0100100006a40e07fff00fd57f25ffffff0100002a00f3ff09", 0x29) recvmsg(r4, &(0x7f0000000300)={&(0x7f0000000100)=@rc, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/199, 0xc7}, 0x0) fcntl$setstatus(r0, 0x408, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)) dup2(r0, r2) 2018/04/16 23:20:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0xea, 0x2}) 2018/04/16 23:20:08 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[{0x3}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92f4", 0x2, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/16 23:20:08 executing program 6: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x7}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x52, r1, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x4) 2018/04/16 23:20:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0xea, 0x2}) 2018/04/16 23:20:08 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[{0x3}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92f4", 0x2, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/16 23:20:08 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="120000004e001f0014f9f400000000000300", 0x12) 2018/04/16 23:20:08 executing program 6: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x7}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x52, r1, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x4) 2018/04/16 23:20:08 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) 2018/04/16 23:20:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0xea, 0x2}) 2018/04/16 23:20:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000400)=@getlink={0x28, 0x12, 0x209, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0xf}]}, 0x28}, 0x1}, 0x0) 2018/04/16 23:20:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0xea, 0x2}) 2018/04/16 23:20:08 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="120000004e001f0014f9f400000000000300", 0x12) [ 898.650258] device bridge_slave_1 left promiscuous mode [ 898.655986] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:20:08 executing program 6: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x7}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x52, r1, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x4) [ 898.711762] device bridge_slave_0 left promiscuous mode [ 898.717550] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:20:08 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[{0x3}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92f4", 0x2, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/16 23:20:08 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) [ 898.833454] IPVS: ftp: loaded support on port[0] = 21 [ 898.870541] team0 (unregistering): Port device team_slave_1 removed [ 898.899681] team0 (unregistering): Port device team_slave_0 removed [ 898.924607] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 898.943348] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 898.971399] bond0 (unregistering): Released all slaves [ 899.612388] bridge0: port 1(bridge_slave_0) entered blocking state [ 899.618894] bridge0: port 1(bridge_slave_0) entered disabled state [ 899.627074] device bridge_slave_0 entered promiscuous mode [ 899.666309] bridge0: port 2(bridge_slave_1) entered blocking state [ 899.672763] bridge0: port 2(bridge_slave_1) entered disabled state [ 899.680701] device bridge_slave_1 entered promiscuous mode [ 899.720295] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 899.761235] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 899.877732] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 899.919279] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 900.091887] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 900.099994] team0: Port device team_slave_0 added [ 900.137629] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 900.145963] team0: Port device team_slave_1 added [ 900.183319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 900.223813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 900.252488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 900.280755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 900.535680] bridge0: port 2(bridge_slave_1) entered blocking state [ 900.542109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 900.548779] bridge0: port 1(bridge_slave_0) entered blocking state [ 900.555184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 900.562603] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 901.472188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 901.485434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 901.575517] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 901.663357] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 901.669583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 901.677560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 901.762229] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0xea, 0x2}) 2018/04/16 23:20:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000080), &(0x7f0000000040)=0x4) 2018/04/16 23:20:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[{0x3}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92f4", 0x2, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/16 23:20:12 executing program 6: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x7}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x52, r1, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x4) 2018/04/16 23:20:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0xea, 0x2}) 2018/04/16 23:20:12 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[{0x3}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92f4", 0x2, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/16 23:20:12 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) 2018/04/16 23:20:12 executing program 5: keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f0000000040)=""/4, 0x4) 2018/04/16 23:20:12 executing program 5: keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f0000000040)=""/4, 0x4) 2018/04/16 23:20:12 executing program 6: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000527ff8), 0x1b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00007efff6)='numa_maps\x00') pread64(r0, &(0x7f0000aab000)=""/41, 0x29, 0x40000000000000) 2018/04/16 23:20:12 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000aa9fb6)={@link_local={0x1, 0x80, 0xc2}, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1=0xe0000001, {[@ssrr={0x89, 0x3, 0xb4a3}, @ssrr={0x89, 0x3, 0x80}]}}, @icmp=@address_reply={0x12}}}}}, &(0x7f0000e76000)) 2018/04/16 23:20:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x40c, 0x1, &(0x7f0000000000)) 2018/04/16 23:20:12 executing program 7: io_setup(0x20, &(0x7f000086a000)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r0, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000bcf3f)}]) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x5, 0x31, 0xffffffffffffffff, 0x0) io_getevents(r0, 0x0, 0x1, &(0x7f0000e72fe0)=[{}], &(0x7f00009ca000)) 2018/04/16 23:20:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[{0x3}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92f4", 0x2, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/16 23:20:12 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x40086310}], 0x0, 0x0, &(0x7f0000000f4d)}) 2018/04/16 23:20:12 executing program 5: keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f0000000040)=""/4, 0x4) 2018/04/16 23:20:12 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000aa9fb6)={@link_local={0x1, 0x80, 0xc2}, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1=0xe0000001, {[@ssrr={0x89, 0x3, 0xb4a3}, @ssrr={0x89, 0x3, 0x80}]}}, @icmp=@address_reply={0x12}}}}}, &(0x7f0000e76000)) [ 902.569417] device bridge_slave_1 left promiscuous mode [ 902.575090] bridge0: port 2(bridge_slave_1) entered disabled state [ 902.627884] binder: 32724:32728 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 902.651550] device bridge_slave_0 left promiscuous mode [ 902.657256] bridge0: port 1(bridge_slave_0) entered disabled state [ 902.673935] binder: 32724:32730 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 902.750094] IPVS: ftp: loaded support on port[0] = 21 [ 902.790108] team0 (unregistering): Port device team_slave_1 removed [ 902.800376] team0 (unregistering): Port device team_slave_0 removed [ 902.811396] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 902.827447] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 902.856150] bond0 (unregistering): Released all slaves [ 903.453723] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.460181] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.467630] device bridge_slave_0 entered promiscuous mode [ 903.507486] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.514063] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.522306] device bridge_slave_1 entered promiscuous mode [ 903.561896] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 903.601335] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 903.718683] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 903.760664] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 903.941788] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 903.948977] team0: Port device team_slave_0 added [ 903.980811] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 903.988244] team0: Port device team_slave_1 added [ 904.026428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 904.062766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 904.105138] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 904.112450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 904.128695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 904.156917] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 904.164200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 904.173245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 904.414941] bridge0: port 2(bridge_slave_1) entered blocking state [ 904.421382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 904.428085] bridge0: port 1(bridge_slave_0) entered blocking state [ 904.434466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 904.441808] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 904.535143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 905.463301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 905.550599] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 905.635749] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 905.642083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 905.650115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 905.733187] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:16 executing program 6: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000527ff8), 0x1b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00007efff6)='numa_maps\x00') pread64(r0, &(0x7f0000aab000)=""/41, 0x29, 0x40000000000000) 2018/04/16 23:20:16 executing program 7: io_setup(0x20, &(0x7f000086a000)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r0, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000bcf3f)}]) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x5, 0x31, 0xffffffffffffffff, 0x0) io_getevents(r0, 0x0, 0x1, &(0x7f0000e72fe0)=[{}], &(0x7f00009ca000)) 2018/04/16 23:20:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[{0x3}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92f4", 0x2, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/16 23:20:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x10, &(0x7f0000000500)="17000000020001000003be8c5ee17688a3000008010100ec1fda1e0336030000000000000098fc75eb485bbb6a8800000000dba67e0600000000000200df018000000000f5009cee4a5acb3da400001fb700670000c88ebbff060115003901000000000000000000ffffffffffff02df9eebe7ec7ee87cccebf6ba000840024f0298e9e90554022a80e605007f71174aa9512cbf360ec39f02d47c59cc16268b6026eb4bf6ba2112ce68bf17a6e019b7487067c12f652cdc", 0xb8) 2018/04/16 23:20:16 executing program 5: keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f0000000040)=""/4, 0x4) 2018/04/16 23:20:16 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x40086310}], 0x0, 0x0, &(0x7f0000000f4d)}) 2018/04/16 23:20:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x40c, 0x1, &(0x7f0000000000)) 2018/04/16 23:20:16 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000aa9fb6)={@link_local={0x1, 0x80, 0xc2}, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1=0xe0000001, {[@ssrr={0x89, 0x3, 0xb4a3}, @ssrr={0x89, 0x3, 0x80}]}}, @icmp=@address_reply={0x12}}}}}, &(0x7f0000e76000)) [ 906.333236] binder: 530:531 BC_DEAD_BINDER_DONE 0000000000000000 not found 2018/04/16 23:20:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f00000000c0)="ea00280000b30082d6540f30ea030000002c0066b850000f00d066ba4200b802000000efc74424000a000000c7442402acc70000c7442406000000000f0114240f20e035100000000f22e03e64360f01cf0f22c7", 0x54}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:20:16 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x40086310}], 0x0, 0x0, &(0x7f0000000f4d)}) 2018/04/16 23:20:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x40c, 0x1, &(0x7f0000000000)) 2018/04/16 23:20:16 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000aa9fb6)={@link_local={0x1, 0x80, 0xc2}, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1=0xe0000001, {[@ssrr={0x89, 0x3, 0xb4a3}, @ssrr={0x89, 0x3, 0x80}]}}, @icmp=@address_reply={0x12}}}}}, &(0x7f0000e76000)) 2018/04/16 23:20:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000efdffc)=0x1, 0xd2) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x20020004, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000f8e000)={0x0, 0x6, 0x3f}, 0x14) sendto$inet(r0, &(0x7f00006e2000)='!', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:20:16 executing program 7: io_setup(0x20, &(0x7f000086a000)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r0, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000bcf3f)}]) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x5, 0x31, 0xffffffffffffffff, 0x0) io_getevents(r0, 0x0, 0x1, &(0x7f0000e72fe0)=[{}], &(0x7f00009ca000)) [ 906.457188] device bridge_slave_1 left promiscuous mode [ 906.462860] bridge0: port 2(bridge_slave_1) entered disabled state [ 906.477622] binder: 542:544 BC_DEAD_BINDER_DONE 0000000000000000 not found 2018/04/16 23:20:16 executing program 6: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000527ff8), 0x1b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00007efff6)='numa_maps\x00') pread64(r0, &(0x7f0000aab000)=""/41, 0x29, 0x40000000000000) [ 906.542651] device bridge_slave_0 left promiscuous mode [ 906.548408] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:20:16 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x40086310}], 0x0, 0x0, &(0x7f0000000f4d)}) [ 906.673774] binder: 565:566 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 906.697867] IPVS: ftp: loaded support on port[0] = 21 [ 906.712509] team0 (unregistering): Port device team_slave_1 removed [ 906.743715] team0 (unregistering): Port device team_slave_0 removed [ 906.755982] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 906.771441] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 906.798935] bond0 (unregistering): Released all slaves [ 907.383554] bridge0: port 1(bridge_slave_0) entered blocking state [ 907.390050] bridge0: port 1(bridge_slave_0) entered disabled state [ 907.401691] device bridge_slave_0 entered promiscuous mode [ 907.440579] bridge0: port 2(bridge_slave_1) entered blocking state [ 907.447067] bridge0: port 2(bridge_slave_1) entered disabled state [ 907.454969] device bridge_slave_1 entered promiscuous mode [ 907.494100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 907.531892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 907.648452] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 907.689230] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 907.873278] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 907.880809] team0: Port device team_slave_0 added [ 907.909370] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 907.916549] team0: Port device team_slave_1 added [ 907.953691] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 907.961078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 907.976965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 908.009317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 908.047257] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 908.054790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 908.070537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 908.103929] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 908.111243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 908.119332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 908.370086] bridge0: port 2(bridge_slave_1) entered blocking state [ 908.376502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 908.383203] bridge0: port 1(bridge_slave_0) entered blocking state [ 908.389581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 908.396881] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 908.831266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 909.300191] 8021q: adding VLAN 0 to HW filter on device bond0 [ 909.388787] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 909.476956] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 909.483222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 909.490441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 909.576625] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:19 executing program 7: io_setup(0x20, &(0x7f000086a000)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r0, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000bcf3f)}]) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x5, 0x31, 0xffffffffffffffff, 0x0) io_getevents(r0, 0x0, 0x1, &(0x7f0000e72fe0)=[{}], &(0x7f00009ca000)) 2018/04/16 23:20:19 executing program 6: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000527ff8), 0x1b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00007efff6)='numa_maps\x00') pread64(r0, &(0x7f0000aab000)=""/41, 0x29, 0x40000000000000) 2018/04/16 23:20:19 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000700)='/dev/input/mice\x00', 0x0, 0x2000) close(r0) 2018/04/16 23:20:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f00000000c0)="ea00280000b30082d6540f30ea030000002c0066b850000f00d066ba4200b802000000efc74424000a000000c7442402acc70000c7442406000000000f0114240f20e035100000000f22e03e64360f01cf0f22c7", 0x54}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:20:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000efdffc)=0x1, 0xd2) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x20020004, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000f8e000)={0x0, 0x6, 0x3f}, 0x14) sendto$inet(r0, &(0x7f00006e2000)='!', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:20:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0xaea2, &(0x7f0000000240)) 2018/04/16 23:20:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x40c, 0x1, &(0x7f0000000000)) 2018/04/16 23:20:19 executing program 0: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4f}]}, &(0x7f0000f91ffc)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xe, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0x1018}], {0x95}}, &(0x7f00005fc000)='GPL\x00', 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x25) 2018/04/16 23:20:20 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000280)=""/11, &(0x7f00000002c0)=0xb) 2018/04/16 23:20:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000efdffc)=0x1, 0xd2) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x20020004, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000f8e000)={0x0, 0x6, 0x3f}, 0x14) sendto$inet(r0, &(0x7f00006e2000)='!', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:20:20 executing program 0: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4f}]}, &(0x7f0000f91ffc)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xe, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0x1018}], {0x95}}, &(0x7f00005fc000)='GPL\x00', 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x25) 2018/04/16 23:20:20 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x0, &(0x7f0000000340)=""/116) 2018/04/16 23:20:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f00000000c0)="ea00280000b30082d6540f30ea030000002c0066b850000f00d066ba4200b802000000efc74424000a000000c7442402acc70000c7442406000000000f0114240f20e035100000000f22e03e64360f01cf0f22c7", 0x54}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 910.343650] device bridge_slave_1 left promiscuous mode [ 910.349322] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:20:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0xaea2, &(0x7f0000000240)) 2018/04/16 23:20:20 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x80000028, 0xaff, 0x0, 0x0, {0x1}, [@typed={0xc, 0x0, @u64=0x1}]}, 0x20}, 0x1}, 0x0) 2018/04/16 23:20:20 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000280)=""/11, &(0x7f00000002c0)=0xb) 2018/04/16 23:20:20 executing program 0: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4f}]}, &(0x7f0000f91ffc)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xe, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0x1018}], {0x95}}, &(0x7f00005fc000)='GPL\x00', 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x25) [ 910.461158] device bridge_slave_0 left promiscuous mode [ 910.466798] bridge0: port 1(bridge_slave_0) entered disabled state [ 910.589457] IPVS: ftp: loaded support on port[0] = 21 [ 910.634586] team0 (unregistering): Port device team_slave_1 removed [ 910.649316] team0 (unregistering): Port device team_slave_0 removed [ 910.659720] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 910.672584] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 910.700270] bond0 (unregistering): Released all slaves [ 911.325897] bridge0: port 1(bridge_slave_0) entered blocking state [ 911.332425] bridge0: port 1(bridge_slave_0) entered disabled state [ 911.340612] device bridge_slave_0 entered promiscuous mode [ 911.380269] bridge0: port 2(bridge_slave_1) entered blocking state [ 911.386796] bridge0: port 2(bridge_slave_1) entered disabled state [ 911.394729] device bridge_slave_1 entered promiscuous mode [ 911.434073] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 911.474545] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 911.592906] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 911.635150] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 911.812845] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 911.820116] team0: Port device team_slave_0 added [ 911.857254] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 911.864814] team0: Port device team_slave_1 added [ 911.902997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 911.931815] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 911.972732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 912.014712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 912.275255] bridge0: port 2(bridge_slave_1) entered blocking state [ 912.281691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 912.288367] bridge0: port 1(bridge_slave_0) entered blocking state [ 912.294776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 912.302444] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 913.183139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 913.235484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 913.324568] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 913.415167] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 913.421402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 913.429455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 913.513960] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:23 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x0, &(0x7f0000000340)=""/116) 2018/04/16 23:20:23 executing program 0: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4f}]}, &(0x7f0000f91ffc)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xe, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0x1018}], {0x95}}, &(0x7f00005fc000)='GPL\x00', 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x25) 2018/04/16 23:20:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000efdffc)=0x1, 0xd2) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x20020004, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000f8e000)={0x0, 0x6, 0x3f}, 0x14) sendto$inet(r0, &(0x7f00006e2000)='!', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:20:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0xaea2, &(0x7f0000000240)) 2018/04/16 23:20:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000280)=""/11, &(0x7f00000002c0)=0xb) 2018/04/16 23:20:23 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x80000028, 0xaff, 0x0, 0x0, {0x1}, [@typed={0xc, 0x0, @u64=0x1}]}, 0x20}, 0x1}, 0x0) 2018/04/16 23:20:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f00000000c0)="ea00280000b30082d6540f30ea030000002c0066b850000f00d066ba4200b802000000efc74424000a000000c7442402acc70000c7442406000000000f0114240f20e035100000000f22e03e64360f01cf0f22c7", 0x54}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:20:23 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) io_setup(0x400, &(0x7f0000000080)=0x0) io_submit(r3, 0x0, &(0x7f00000004c0)) sendfile(r2, r2, &(0x7f0000000040), 0x1) 2018/04/16 23:20:23 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x80000028, 0xaff, 0x0, 0x0, {0x1}, [@typed={0xc, 0x0, @u64=0x1}]}, 0x20}, 0x1}, 0x0) 2018/04/16 23:20:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0xaea2, &(0x7f0000000240)) 2018/04/16 23:20:24 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000280)=""/11, &(0x7f00000002c0)=0xb) 2018/04/16 23:20:24 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x0, &(0x7f0000000340)=""/116) 2018/04/16 23:20:24 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000004c0)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000b80)) stat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) getegid() r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x20) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000400)="480000001400190d76a81014aed182f302844700809d79acdfffe00600000000000000a2bc5603ca0016087f890000002000002ef774a99de48b143500d5413da836d48a566e8ef9", 0x48}], 0x1) 2018/04/16 23:20:24 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000157ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000149fe0)=ANY=[]}, 0x1}, 0x0) 2018/04/16 23:20:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00009c7000)=0x40000000, 0x400000ff) 2018/04/16 23:20:24 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x80000028, 0xaff, 0x0, 0x0, {0x1}, [@typed={0xc, 0x0, @u64=0x1}]}, 0x20}, 0x1}, 0x0) [ 914.365290] device bridge_slave_1 left promiscuous mode [ 914.370966] bridge0: port 2(bridge_slave_1) entered disabled state [ 914.419268] device bridge_slave_0 left promiscuous mode [ 914.424915] bridge0: port 1(bridge_slave_0) entered disabled state [ 914.512674] IPVS: ftp: loaded support on port[0] = 21 [ 914.535176] team0 (unregistering): Port device team_slave_1 removed [ 914.545467] team0 (unregistering): Port device team_slave_0 removed [ 914.555514] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 914.572466] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 914.600267] bond0 (unregistering): Released all slaves [ 915.198721] bridge0: port 1(bridge_slave_0) entered blocking state [ 915.205178] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.213238] device bridge_slave_0 entered promiscuous mode [ 915.253366] bridge0: port 2(bridge_slave_1) entered blocking state [ 915.259866] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.267947] device bridge_slave_1 entered promiscuous mode [ 915.307465] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 915.346980] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 915.465061] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 915.506511] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 915.686506] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 915.693657] team0: Port device team_slave_0 added [ 915.722455] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 915.729876] team0: Port device team_slave_1 added [ 915.769448] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 915.808354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 915.848254] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 915.855452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 915.871831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 915.902121] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 915.909280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 915.917969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 916.165544] bridge0: port 2(bridge_slave_1) entered blocking state [ 916.171971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 916.178647] bridge0: port 1(bridge_slave_0) entered blocking state [ 916.185092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 916.192424] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 916.239132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 917.085999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 917.171686] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 917.256742] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 917.263769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 917.271485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 917.356221] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:27 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000004c0)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000b80)) stat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) getegid() r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x20) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000400)="480000001400190d76a81014aed182f302844700809d79acdfffe00600000000000000a2bc5603ca0016087f890000002000002ef774a99de48b143500d5413da836d48a566e8ef9", 0x48}], 0x1) 2018/04/16 23:20:27 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x0, &(0x7f0000000340)=""/116) 2018/04/16 23:20:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x14, &(0x7f0000000000)="ff55d36cffb9ffffef00000000070c0401000000", 0x14) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client1\x00', 0x2, "a3c58d874375db72", "f12b211abfc68e2d9175edb926f377e06c9193a93fa3f4c4de0e903f6b0da577", 0x5}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x2, 0x8, 0x7f5, 0x9, 0xfffffffffffffffb, 0x5, 0x100000000, 0x1, 0xff, 0xfffffffffffffffa, 0x20}) close(r0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) socket(0x11, 0x0, 0x3) 2018/04/16 23:20:27 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000157ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000149fe0)=ANY=[]}, 0x1}, 0x0) 2018/04/16 23:20:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_route(r0, &(0x7f00000fa000)={&(0x7f0000c1b000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@mpls_newroute={0x1c, 0x18, 0xf09, 0x0, 0x0, {0x1c}}, 0x1c}, 0x1}, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x8000000000000001, 0x0) r2 = accept4(r1, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={0x0, 0xffff, 0x0, 0x8001}, &(0x7f0000000440)=0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) gettid() ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[0x1ff, 0x6, 0x4]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x80000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000714fe0)={{0x0, 0x989680}, {0x0, 0x6}}, &(0x7f0000000fe0)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000200)={0x7001, 0x8000}) r3 = getpid() sched_setattr(r3, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r4, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r4, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f0000000040)) r6 = dup3(r5, r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000240)={{0x0, 0x2, 0x9, 0x0, 0xfff}}) ioctl$EVIOCGBITSND(r6, 0x80404532, &(0x7f00000000c0)=""/64) 2018/04/16 23:20:27 executing program 6: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 2018/04/16 23:20:27 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) syz_open_procfs(0x0, &(0x7f0000000300)='map_files\x00') 2018/04/16 23:20:27 executing program 2: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) [ 917.953132] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 917.962615] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/16 23:20:27 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) syz_open_procfs(0x0, &(0x7f0000000300)='map_files\x00') 2018/04/16 23:20:27 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000004c0)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000b80)) stat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) getegid() r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x20) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000400)="480000001400190d76a81014aed182f302844700809d79acdfffe00600000000000000a2bc5603ca0016087f890000002000002ef774a99de48b143500d5413da836d48a566e8ef9", 0x48}], 0x1) 2018/04/16 23:20:27 executing program 6: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 2018/04/16 23:20:27 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={0x2}, 0x8, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000000c0)=@ioapic) 2018/04/16 23:20:27 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000157ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000149fe0)=ANY=[]}, 0x1}, 0x0) 2018/04/16 23:20:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x14, &(0x7f0000000000)="ff55d36cffb9ffffef00000000070c0401000000", 0x14) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client1\x00', 0x2, "a3c58d874375db72", "f12b211abfc68e2d9175edb926f377e06c9193a93fa3f4c4de0e903f6b0da577", 0x5}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x2, 0x8, 0x7f5, 0x9, 0xfffffffffffffffb, 0x5, 0x100000000, 0x1, 0xff, 0xfffffffffffffffa, 0x20}) close(r0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) socket(0x11, 0x0, 0x3) [ 918.124349] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. [ 918.133615] device bridge_slave_1 left promiscuous mode [ 918.139306] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:20:28 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000004c0)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000b80)) stat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) getegid() r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x20) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000400)="480000001400190d76a81014aed182f302844700809d79acdfffe00600000000000000a2bc5603ca0016087f890000002000002ef774a99de48b143500d5413da836d48a566e8ef9", 0x48}], 0x1) [ 918.214147] device bridge_slave_0 left promiscuous mode [ 918.220116] bridge0: port 1(bridge_slave_0) entered disabled state [ 918.278840] IPVS: ftp: loaded support on port[0] = 21 [ 918.334237] team0 (unregistering): Port device team_slave_1 removed [ 918.349260] team0 (unregistering): Port device team_slave_0 removed [ 918.359889] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 918.378515] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 918.410267] bond0 (unregistering): Released all slaves [ 918.760016] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 919.099356] bridge0: port 1(bridge_slave_0) entered blocking state [ 919.106057] bridge0: port 1(bridge_slave_0) entered disabled state [ 919.114450] device bridge_slave_0 entered promiscuous mode [ 919.153633] bridge0: port 2(bridge_slave_1) entered blocking state [ 919.160119] bridge0: port 2(bridge_slave_1) entered disabled state [ 919.168151] device bridge_slave_1 entered promiscuous mode [ 919.207317] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 919.246279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 919.363120] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 919.404957] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 919.478851] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 919.485823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 919.592617] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 919.600952] team0: Port device team_slave_0 added [ 919.634876] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 919.643097] team0: Port device team_slave_1 added [ 919.682895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 919.712756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 919.739814] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 919.746977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 919.755112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 919.777409] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 919.784570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 919.792661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 920.035452] bridge0: port 2(bridge_slave_1) entered blocking state [ 920.041878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 920.048524] bridge0: port 1(bridge_slave_0) entered blocking state [ 920.054907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 920.062275] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 920.479309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 920.983986] 8021q: adding VLAN 0 to HW filter on device bond0 [ 921.074287] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 921.162614] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 921.168832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 921.176181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 921.261970] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_route(r0, &(0x7f00000fa000)={&(0x7f0000c1b000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@mpls_newroute={0x1c, 0x18, 0xf09, 0x0, 0x0, {0x1c}}, 0x1c}, 0x1}, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x8000000000000001, 0x0) r2 = accept4(r1, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={0x0, 0xffff, 0x0, 0x8001}, &(0x7f0000000440)=0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) gettid() ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[0x1ff, 0x6, 0x4]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x80000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000714fe0)={{0x0, 0x989680}, {0x0, 0x6}}, &(0x7f0000000fe0)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000200)={0x7001, 0x8000}) r3 = getpid() sched_setattr(r3, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r4, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r4, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f0000000040)) r6 = dup3(r5, r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000240)={{0x0, 0x2, 0x9, 0x0, 0xfff}}) ioctl$EVIOCGBITSND(r6, 0x80404532, &(0x7f00000000c0)=""/64) 2018/04/16 23:20:31 executing program 6: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 2018/04/16 23:20:31 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) syz_open_procfs(0x0, &(0x7f0000000300)='map_files\x00') 2018/04/16 23:20:31 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={0x2}, 0x8, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000000c0)=@ioapic) 2018/04/16 23:20:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x14, &(0x7f0000000000)="ff55d36cffb9ffffef00000000070c0401000000", 0x14) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client1\x00', 0x2, "a3c58d874375db72", "f12b211abfc68e2d9175edb926f377e06c9193a93fa3f4c4de0e903f6b0da577", 0x5}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x2, 0x8, 0x7f5, 0x9, 0xfffffffffffffffb, 0x5, 0x100000000, 0x1, 0xff, 0xfffffffffffffffa, 0x20}) close(r0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) socket(0x11, 0x0, 0x3) 2018/04/16 23:20:31 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000157ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000149fe0)=ANY=[]}, 0x1}, 0x0) 2018/04/16 23:20:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x14, &(0x7f0000000000)="ff55d36cffb9ffffef00000000070c0401000000", 0x14) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client1\x00', 0x2, "a3c58d874375db72", "f12b211abfc68e2d9175edb926f377e06c9193a93fa3f4c4de0e903f6b0da577", 0x5}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x2, 0x8, 0x7f5, 0x9, 0xfffffffffffffffb, 0x5, 0x100000000, 0x1, 0xff, 0xfffffffffffffffa, 0x20}) close(r0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) socket(0x11, 0x0, 0x3) 2018/04/16 23:20:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_route(r0, &(0x7f00000fa000)={&(0x7f0000c1b000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@mpls_newroute={0x1c, 0x18, 0xf09, 0x0, 0x0, {0x1c}}, 0x1c}, 0x1}, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x8000000000000001, 0x0) r2 = accept4(r1, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={0x0, 0xffff, 0x0, 0x8001}, &(0x7f0000000440)=0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) gettid() ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[0x1ff, 0x6, 0x4]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x80000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000714fe0)={{0x0, 0x989680}, {0x0, 0x6}}, &(0x7f0000000fe0)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000200)={0x7001, 0x8000}) r3 = getpid() sched_setattr(r3, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r4, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r4, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f0000000040)) r6 = dup3(r5, r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000240)={{0x0, 0x2, 0x9, 0x0, 0xfff}}) ioctl$EVIOCGBITSND(r6, 0x80404532, &(0x7f00000000c0)=""/64) [ 921.865775] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. [ 921.874480] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 2018/04/16 23:20:31 executing program 6: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 2018/04/16 23:20:31 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={0x2}, 0x8, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000000c0)=@ioapic) 2018/04/16 23:20:31 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) syz_open_procfs(0x0, &(0x7f0000000300)='map_files\x00') 2018/04/16 23:20:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x14, &(0x7f0000000000)="ff55d36cffb9ffffef00000000070c0401000000", 0x14) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client1\x00', 0x2, "a3c58d874375db72", "f12b211abfc68e2d9175edb926f377e06c9193a93fa3f4c4de0e903f6b0da577", 0x5}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x2, 0x8, 0x7f5, 0x9, 0xfffffffffffffffb, 0x5, 0x100000000, 0x1, 0xff, 0xfffffffffffffffa, 0x20}) close(r0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) socket(0x11, 0x0, 0x3) 2018/04/16 23:20:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x14, &(0x7f0000000000)="ff55d36cffb9ffffef00000000070c0401000000", 0x14) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client1\x00', 0x2, "a3c58d874375db72", "f12b211abfc68e2d9175edb926f377e06c9193a93fa3f4c4de0e903f6b0da577", 0x5}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x2, 0x8, 0x7f5, 0x9, 0xfffffffffffffffb, 0x5, 0x100000000, 0x1, 0xff, 0xfffffffffffffffa, 0x20}) close(r0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) socket(0x11, 0x0, 0x3) 2018/04/16 23:20:31 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x80287010, &(0x7f0000000080)) [ 922.042551] device bridge_slave_1 left promiscuous mode [ 922.048208] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:20:31 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x6}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, &(0x7f0000000500)=ANY=[]}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f000081e000)={0x0, 0x2, 0x80000000000000d5, [0x0]}, 0x2de) [ 922.119984] device bridge_slave_0 left promiscuous mode [ 922.125722] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:20:31 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x80287010, &(0x7f0000000080)) [ 922.160338] IPVS: ftp: loaded support on port[0] = 21 [ 922.252332] team0 (unregistering): Port device team_slave_1 removed [ 922.278909] team0 (unregistering): Port device team_slave_0 removed [ 922.291331] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 922.307945] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 922.336096] bond0 (unregistering): Released all slaves [ 922.358526] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. [ 923.034178] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.040736] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.048607] device bridge_slave_0 entered promiscuous mode [ 923.088632] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.095229] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.102565] device bridge_slave_1 entered promiscuous mode [ 923.140669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 923.178870] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 923.293364] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 923.334786] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 923.515451] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 923.522888] team0: Port device team_slave_0 added [ 923.551410] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 923.558881] team0: Port device team_slave_1 added [ 923.596812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 923.639103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 923.668716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 923.709307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 923.969794] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.976217] bridge0: port 2(bridge_slave_1) entered forwarding state [ 923.982903] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.989304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 923.996712] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 924.895253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 924.917465] 8021q: adding VLAN 0 to HW filter on device bond0 [ 925.008165] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 925.097965] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 925.104237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 925.111968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 925.196457] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:35 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x6}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, &(0x7f0000000500)=ANY=[]}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f000081e000)={0x0, 0x2, 0x80000000000000d5, [0x0]}, 0x2de) 2018/04/16 23:20:35 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000000000001"]) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x48a}]}) 2018/04/16 23:20:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_route(r0, &(0x7f00000fa000)={&(0x7f0000c1b000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@mpls_newroute={0x1c, 0x18, 0xf09, 0x0, 0x0, {0x1c}}, 0x1c}, 0x1}, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x8000000000000001, 0x0) r2 = accept4(r1, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={0x0, 0xffff, 0x0, 0x8001}, &(0x7f0000000440)=0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) gettid() ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[0x1ff, 0x6, 0x4]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x80000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000714fe0)={{0x0, 0x989680}, {0x0, 0x6}}, &(0x7f0000000fe0)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000200)={0x7001, 0x8000}) r3 = getpid() sched_setattr(r3, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r4, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r4, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f0000000040)) r6 = dup3(r5, r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000240)={{0x0, 0x2, 0x9, 0x0, 0xfff}}) ioctl$EVIOCGBITSND(r6, 0x80404532, &(0x7f00000000c0)=""/64) 2018/04/16 23:20:35 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x80287010, &(0x7f0000000080)) 2018/04/16 23:20:35 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x14, &(0x7f0000000000)="ff55d36cffb9ffffef00000000070c0401000000", 0x14) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client1\x00', 0x2, "a3c58d874375db72", "f12b211abfc68e2d9175edb926f377e06c9193a93fa3f4c4de0e903f6b0da577", 0x5}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x2, 0x8, 0x7f5, 0x9, 0xfffffffffffffffb, 0x5, 0x100000000, 0x1, 0xff, 0xfffffffffffffffa, 0x20}) close(r0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) socket(0x11, 0x0, 0x3) 2018/04/16 23:20:35 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0x40086607, &(0x7f0000000080)={0x0, &(0x7f0000000540)}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@loopback, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a40)={{{@in6, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000003b40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003b80)={0x0, @local, @dev}, &(0x7f0000003bc0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000003ec0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000007700)=0xe8) 2018/04/16 23:20:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_route(r0, &(0x7f00000fa000)={&(0x7f0000c1b000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@mpls_newroute={0x1c, 0x18, 0xf09, 0x0, 0x0, {0x1c}}, 0x1c}, 0x1}, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x8000000000000001, 0x0) r2 = accept4(r1, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={0x0, 0xffff, 0x0, 0x8001}, &(0x7f0000000440)=0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) gettid() ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[0x1ff, 0x6, 0x4]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x80000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000714fe0)={{0x0, 0x989680}, {0x0, 0x6}}, &(0x7f0000000fe0)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000200)={0x7001, 0x8000}) r3 = getpid() sched_setattr(r3, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r4, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r4, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f0000000040)) r6 = dup3(r5, r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000240)={{0x0, 0x2, 0x9, 0x0, 0xfff}}) ioctl$EVIOCGBITSND(r6, 0x80404532, &(0x7f00000000c0)=""/64) 2018/04/16 23:20:35 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={0x2}, 0x8, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000000c0)=@ioapic) [ 925.835415] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 2018/04/16 23:20:35 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x80287010, &(0x7f0000000080)) 2018/04/16 23:20:35 executing program 7: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x18, 0xb, 0x100000000000006, 0x1, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/16 23:20:35 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0x40086607, &(0x7f0000000080)={0x0, &(0x7f0000000540)}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@loopback, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a40)={{{@in6, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000003b40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003b80)={0x0, @local, @dev}, &(0x7f0000003bc0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000003ec0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000007700)=0xe8) 2018/04/16 23:20:35 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x2, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000540)) r1 = perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f00000004c0)=0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) mkdir(&(0x7f0000efa000)='./file0\x00', 0x0) rmdir(&(0x7f0000000080)='./file0\x00') r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0xf7, "686a37c7e018dc0c92b8d82f108a27e7f828bcb11b07437bdc12e4034c701e5b25decfde33389c2dc3f323541d5fae9fa27b472813f1f7994db18b60830951686689bbc250098187a85d77942e7a9dcea1fba9869abd4021b59f1d06b7a05f72ab078a0322e8ba15f17a00690131afb5826ef9727f7ed42e521b8bf44c4242a3e53882b216919c53c692d9620f909ae5e29cce4ba0b12d5b1f05ee5b90c3541665d752ee06b105170ad030f41cd4abd3ac127626ff4e0624c686d8ac53420738bbb92e7acaa40b2386a04990f4f962402a3850b93a9f89dc5e788e8eafba2c0ad34d7e6e700912580a16f9ff881d4127c660b3b2c93417"}, &(0x7f0000000180)=0xff) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00004a001996ed12c3cb86a1b0a8065173426b88d318250866239cbe421b70cd03eb44a0a7b73d9348b24a597f829ceee8cb4ae07b9f991c49bc8f8562cd4c9f098569fb2ea6e2030000002e47f2"], 0x2) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) socket$inet(0x2, 0x80004, 0x200) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000000000)=@pic={0x1, 0x8001, 0x57, 0x256, 0x73, 0x3, 0xffffffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x77, 0x0, 0x6}) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000002ff0)=@ioapic={0x2, 0x0, 0x0, 0x0, 0x0, [{0xfffffffffffffffb}]}) ioctl$KVM_IRQ_LINE(r8, 0x4008ae61, &(0x7f0000000280)={0x0, 0x3}) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f0000000140)={&(0x7f0000ffb000/0x3000)=nil, 0x46a9, 0x4, 0x4, &(0x7f0000ffc000/0x3000)=nil, 0x1000}) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r9) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000100)={0xffffffff00000000, 0x0, 0x5, 0x200}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/16 23:20:35 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x6}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, &(0x7f0000000500)=ANY=[]}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f000081e000)={0x0, 0x2, 0x80000000000000d5, [0x0]}, 0x2de) [ 926.027255] device bridge_slave_1 left promiscuous mode [ 926.032939] bridge0: port 2(bridge_slave_1) entered disabled state [ 926.111668] netlink: 'syz-executor7': attribute type 1 has an invalid length. [ 926.119911] device bridge_slave_0 left promiscuous mode [ 926.125807] bridge0: port 1(bridge_slave_0) entered disabled state [ 926.125901] IPVS: ftp: loaded support on port[0] = 21 2018/04/16 23:20:35 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='wchan\x00') read(r0, &(0x7f0000000040)=""/205, 0xcd) 2018/04/16 23:20:35 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000000000001"]) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x48a}]}) 2018/04/16 23:20:36 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x6}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, &(0x7f0000000500)=ANY=[]}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f000081e000)={0x0, 0x2, 0x80000000000000d5, [0x0]}, 0x2de) 2018/04/16 23:20:36 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0x40086607, &(0x7f0000000080)={0x0, &(0x7f0000000540)}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@loopback, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a40)={{{@in6, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000003b40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003b80)={0x0, @local, @dev}, &(0x7f0000003bc0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000003ec0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000007700)=0xe8) [ 926.213748] netlink: 'syz-executor7': attribute type 1 has an invalid length. 2018/04/16 23:20:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='wchan\x00') read(r0, &(0x7f0000000040)=""/205, 0xcd) [ 926.368071] team0 (unregistering): Port device team_slave_1 removed [ 926.389933] team0 (unregistering): Port device team_slave_0 removed [ 926.407716] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 926.450866] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 926.513438] bond0 (unregistering): Released all slaves [ 927.139310] bridge0: port 1(bridge_slave_0) entered blocking state [ 927.145764] bridge0: port 1(bridge_slave_0) entered disabled state [ 927.153179] device bridge_slave_0 entered promiscuous mode [ 927.192505] bridge0: port 2(bridge_slave_1) entered blocking state [ 927.199088] bridge0: port 2(bridge_slave_1) entered disabled state [ 927.206669] device bridge_slave_1 entered promiscuous mode [ 927.244978] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 927.283160] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 927.398571] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 927.439944] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 927.614926] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 927.622180] team0: Port device team_slave_0 added [ 927.657679] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 927.665208] team0: Port device team_slave_1 added [ 927.703070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 927.735608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 927.776908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 927.813820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 928.050818] bridge0: port 2(bridge_slave_1) entered blocking state [ 928.057226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 928.063986] bridge0: port 1(bridge_slave_0) entered blocking state [ 928.070515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 928.077850] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 928.968954] 8021q: adding VLAN 0 to HW filter on device bond0 [ 928.991150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 929.062779] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 929.156384] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 929.162601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 929.170369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 929.254274] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:39 executing program 7: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x18, 0xb, 0x100000000000006, 0x1, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/16 23:20:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='wchan\x00') read(r0, &(0x7f0000000040)=""/205, 0xcd) 2018/04/16 23:20:39 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0x40086607, &(0x7f0000000080)={0x0, &(0x7f0000000540)}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@loopback, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a40)={{{@in6, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000003b40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003b80)={0x0, @local, @dev}, &(0x7f0000003bc0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000003ec0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000007700)=0xe8) 2018/04/16 23:20:39 executing program 4: open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4}) fcntl$lock(r1, 0x25, &(0x7f0000000080)={0x0, 0x0, 0x10001}) 2018/04/16 23:20:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_route(r0, &(0x7f00000fa000)={&(0x7f0000c1b000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@mpls_newroute={0x1c, 0x18, 0xf09, 0x0, 0x0, {0x1c}}, 0x1c}, 0x1}, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x8000000000000001, 0x0) r2 = accept4(r1, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={0x0, 0xffff, 0x0, 0x8001}, &(0x7f0000000440)=0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) gettid() ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[0x1ff, 0x6, 0x4]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x80000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000714fe0)={{0x0, 0x989680}, {0x0, 0x6}}, &(0x7f0000000fe0)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000200)={0x7001, 0x8000}) r3 = getpid() sched_setattr(r3, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r4, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r4, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f0000000040)) r6 = dup3(r5, r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000240)={{0x0, 0x2, 0x9, 0x0, 0xfff}}) ioctl$EVIOCGBITSND(r6, 0x80404532, &(0x7f00000000c0)=""/64) 2018/04/16 23:20:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_route(r0, &(0x7f00000fa000)={&(0x7f0000c1b000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@mpls_newroute={0x1c, 0x18, 0xf09, 0x0, 0x0, {0x1c}}, 0x1c}, 0x1}, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x8000000000000001, 0x0) r2 = accept4(r1, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={0x0, 0xffff, 0x0, 0x8001}, &(0x7f0000000440)=0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) gettid() ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[0x1ff, 0x6, 0x4]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x80000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000714fe0)={{0x0, 0x989680}, {0x0, 0x6}}, &(0x7f0000000fe0)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000200)={0x7001, 0x8000}) r3 = getpid() sched_setattr(r3, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r4, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r4, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f0000000040)) r6 = dup3(r5, r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000240)={{0x0, 0x2, 0x9, 0x0, 0xfff}}) ioctl$EVIOCGBITSND(r6, 0x80404532, &(0x7f00000000c0)=""/64) 2018/04/16 23:20:39 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000000000001"]) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x48a}]}) 2018/04/16 23:20:39 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x2, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000540)) r1 = perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f00000004c0)=0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) mkdir(&(0x7f0000efa000)='./file0\x00', 0x0) rmdir(&(0x7f0000000080)='./file0\x00') r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0xf7, "686a37c7e018dc0c92b8d82f108a27e7f828bcb11b07437bdc12e4034c701e5b25decfde33389c2dc3f323541d5fae9fa27b472813f1f7994db18b60830951686689bbc250098187a85d77942e7a9dcea1fba9869abd4021b59f1d06b7a05f72ab078a0322e8ba15f17a00690131afb5826ef9727f7ed42e521b8bf44c4242a3e53882b216919c53c692d9620f909ae5e29cce4ba0b12d5b1f05ee5b90c3541665d752ee06b105170ad030f41cd4abd3ac127626ff4e0624c686d8ac53420738bbb92e7acaa40b2386a04990f4f962402a3850b93a9f89dc5e788e8eafba2c0ad34d7e6e700912580a16f9ff881d4127c660b3b2c93417"}, &(0x7f0000000180)=0xff) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00004a001996ed12c3cb86a1b0a8065173426b88d318250866239cbe421b70cd03eb44a0a7b73d9348b24a597f829ceee8cb4ae07b9f991c49bc8f8562cd4c9f098569fb2ea6e2030000002e47f2"], 0x2) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) socket$inet(0x2, 0x80004, 0x200) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000000000)=@pic={0x1, 0x8001, 0x57, 0x256, 0x73, 0x3, 0xffffffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x77, 0x0, 0x6}) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000002ff0)=@ioapic={0x2, 0x0, 0x0, 0x0, 0x0, [{0xfffffffffffffffb}]}) ioctl$KVM_IRQ_LINE(r8, 0x4008ae61, &(0x7f0000000280)={0x0, 0x3}) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f0000000140)={&(0x7f0000ffb000/0x3000)=nil, 0x46a9, 0x4, 0x4, &(0x7f0000ffc000/0x3000)=nil, 0x1000}) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r9) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000100)={0xffffffff00000000, 0x0, 0x5, 0x200}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/16 23:20:39 executing program 4: open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4}) fcntl$lock(r1, 0x25, &(0x7f0000000080)={0x0, 0x0, 0x10001}) [ 929.886552] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 929.897910] netlink: 'syz-executor7': attribute type 1 has an invalid length. 2018/04/16 23:20:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='wchan\x00') read(r0, &(0x7f0000000040)=""/205, 0xcd) 2018/04/16 23:20:39 executing program 4: open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4}) fcntl$lock(r1, 0x25, &(0x7f0000000080)={0x0, 0x0, 0x10001}) 2018/04/16 23:20:39 executing program 7: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x18, 0xb, 0x100000000000006, 0x1, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) [ 930.045283] device bridge_slave_1 left promiscuous mode [ 930.050988] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:20:39 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x2, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000540)) r1 = perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f00000004c0)=0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) mkdir(&(0x7f0000efa000)='./file0\x00', 0x0) rmdir(&(0x7f0000000080)='./file0\x00') r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0xf7, "686a37c7e018dc0c92b8d82f108a27e7f828bcb11b07437bdc12e4034c701e5b25decfde33389c2dc3f323541d5fae9fa27b472813f1f7994db18b60830951686689bbc250098187a85d77942e7a9dcea1fba9869abd4021b59f1d06b7a05f72ab078a0322e8ba15f17a00690131afb5826ef9727f7ed42e521b8bf44c4242a3e53882b216919c53c692d9620f909ae5e29cce4ba0b12d5b1f05ee5b90c3541665d752ee06b105170ad030f41cd4abd3ac127626ff4e0624c686d8ac53420738bbb92e7acaa40b2386a04990f4f962402a3850b93a9f89dc5e788e8eafba2c0ad34d7e6e700912580a16f9ff881d4127c660b3b2c93417"}, &(0x7f0000000180)=0xff) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00004a001996ed12c3cb86a1b0a8065173426b88d318250866239cbe421b70cd03eb44a0a7b73d9348b24a597f829ceee8cb4ae07b9f991c49bc8f8562cd4c9f098569fb2ea6e2030000002e47f2"], 0x2) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) socket$inet(0x2, 0x80004, 0x200) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000000000)=@pic={0x1, 0x8001, 0x57, 0x256, 0x73, 0x3, 0xffffffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x77, 0x0, 0x6}) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000002ff0)=@ioapic={0x2, 0x0, 0x0, 0x0, 0x0, [{0xfffffffffffffffb}]}) ioctl$KVM_IRQ_LINE(r8, 0x4008ae61, &(0x7f0000000280)={0x0, 0x3}) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f0000000140)={&(0x7f0000ffb000/0x3000)=nil, 0x46a9, 0x4, 0x4, &(0x7f0000ffc000/0x3000)=nil, 0x1000}) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r9) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000100)={0xffffffff00000000, 0x0, 0x5, 0x200}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/16 23:20:39 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x2, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000540)) r1 = perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f00000004c0)=0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) mkdir(&(0x7f0000efa000)='./file0\x00', 0x0) rmdir(&(0x7f0000000080)='./file0\x00') r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0xf7, "686a37c7e018dc0c92b8d82f108a27e7f828bcb11b07437bdc12e4034c701e5b25decfde33389c2dc3f323541d5fae9fa27b472813f1f7994db18b60830951686689bbc250098187a85d77942e7a9dcea1fba9869abd4021b59f1d06b7a05f72ab078a0322e8ba15f17a00690131afb5826ef9727f7ed42e521b8bf44c4242a3e53882b216919c53c692d9620f909ae5e29cce4ba0b12d5b1f05ee5b90c3541665d752ee06b105170ad030f41cd4abd3ac127626ff4e0624c686d8ac53420738bbb92e7acaa40b2386a04990f4f962402a3850b93a9f89dc5e788e8eafba2c0ad34d7e6e700912580a16f9ff881d4127c660b3b2c93417"}, &(0x7f0000000180)=0xff) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00004a001996ed12c3cb86a1b0a8065173426b88d318250866239cbe421b70cd03eb44a0a7b73d9348b24a597f829ceee8cb4ae07b9f991c49bc8f8562cd4c9f098569fb2ea6e2030000002e47f2"], 0x2) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) socket$inet(0x2, 0x80004, 0x200) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000000000)=@pic={0x1, 0x8001, 0x57, 0x256, 0x73, 0x3, 0xffffffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x77, 0x0, 0x6}) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000002ff0)=@ioapic={0x2, 0x0, 0x0, 0x0, 0x0, [{0xfffffffffffffffb}]}) ioctl$KVM_IRQ_LINE(r8, 0x4008ae61, &(0x7f0000000280)={0x0, 0x3}) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f0000000140)={&(0x7f0000ffb000/0x3000)=nil, 0x46a9, 0x4, 0x4, &(0x7f0000ffc000/0x3000)=nil, 0x1000}) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r9) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000100)={0xffffffff00000000, 0x0, 0x5, 0x200}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/16 23:20:39 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000000000001"]) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x48a}]}) [ 930.093261] device bridge_slave_0 left promiscuous mode [ 930.099208] bridge0: port 1(bridge_slave_0) entered disabled state [ 930.156717] netlink: 'syz-executor7': attribute type 1 has an invalid length. [ 930.276501] IPVS: ftp: loaded support on port[0] = 21 [ 930.285354] team0 (unregistering): Port device team_slave_1 removed [ 930.302619] team0 (unregistering): Port device team_slave_0 removed [ 930.316620] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 930.337544] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 930.377224] bond0 (unregistering): Released all slaves [ 931.005088] bridge0: port 1(bridge_slave_0) entered blocking state [ 931.011547] bridge0: port 1(bridge_slave_0) entered disabled state [ 931.019212] device bridge_slave_0 entered promiscuous mode [ 931.059361] bridge0: port 2(bridge_slave_1) entered blocking state [ 931.065835] bridge0: port 2(bridge_slave_1) entered disabled state [ 931.074634] device bridge_slave_1 entered promiscuous mode [ 931.113126] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 931.152198] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 931.271311] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 931.314978] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 931.490074] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 931.497422] team0: Port device team_slave_0 added [ 931.534614] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 931.542736] team0: Port device team_slave_1 added [ 931.581830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 931.618989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 931.658513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 931.665788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 931.673891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 931.701656] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 931.708819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 931.718351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 931.966201] bridge0: port 2(bridge_slave_1) entered blocking state [ 931.972627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 931.979328] bridge0: port 1(bridge_slave_0) entered blocking state [ 931.985714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 931.993443] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 932.047248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 932.918173] 8021q: adding VLAN 0 to HW filter on device bond0 [ 933.008441] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 933.097310] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 933.103549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 933.111456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 933.196286] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:43 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x2, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000540)) r1 = perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f00000004c0)=0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) mkdir(&(0x7f0000efa000)='./file0\x00', 0x0) rmdir(&(0x7f0000000080)='./file0\x00') r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0xf7, "686a37c7e018dc0c92b8d82f108a27e7f828bcb11b07437bdc12e4034c701e5b25decfde33389c2dc3f323541d5fae9fa27b472813f1f7994db18b60830951686689bbc250098187a85d77942e7a9dcea1fba9869abd4021b59f1d06b7a05f72ab078a0322e8ba15f17a00690131afb5826ef9727f7ed42e521b8bf44c4242a3e53882b216919c53c692d9620f909ae5e29cce4ba0b12d5b1f05ee5b90c3541665d752ee06b105170ad030f41cd4abd3ac127626ff4e0624c686d8ac53420738bbb92e7acaa40b2386a04990f4f962402a3850b93a9f89dc5e788e8eafba2c0ad34d7e6e700912580a16f9ff881d4127c660b3b2c93417"}, &(0x7f0000000180)=0xff) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00004a001996ed12c3cb86a1b0a8065173426b88d318250866239cbe421b70cd03eb44a0a7b73d9348b24a597f829ceee8cb4ae07b9f991c49bc8f8562cd4c9f098569fb2ea6e2030000002e47f2"], 0x2) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) socket$inet(0x2, 0x80004, 0x200) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000000000)=@pic={0x1, 0x8001, 0x57, 0x256, 0x73, 0x3, 0xffffffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x77, 0x0, 0x6}) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000002ff0)=@ioapic={0x2, 0x0, 0x0, 0x0, 0x0, [{0xfffffffffffffffb}]}) ioctl$KVM_IRQ_LINE(r8, 0x4008ae61, &(0x7f0000000280)={0x0, 0x3}) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f0000000140)={&(0x7f0000ffb000/0x3000)=nil, 0x46a9, 0x4, 0x4, &(0x7f0000ffc000/0x3000)=nil, 0x1000}) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r9) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000100)={0xffffffff00000000, 0x0, 0x5, 0x200}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/16 23:20:43 executing program 4: open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4}) fcntl$lock(r1, 0x25, &(0x7f0000000080)={0x0, 0x0, 0x10001}) 2018/04/16 23:20:43 executing program 7: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x18, 0xb, 0x100000000000006, 0x1, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/16 23:20:43 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x404}, 0x5c) 2018/04/16 23:20:43 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x2, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000540)) r1 = perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f00000004c0)=0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) mkdir(&(0x7f0000efa000)='./file0\x00', 0x0) rmdir(&(0x7f0000000080)='./file0\x00') r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0xf7, "686a37c7e018dc0c92b8d82f108a27e7f828bcb11b07437bdc12e4034c701e5b25decfde33389c2dc3f323541d5fae9fa27b472813f1f7994db18b60830951686689bbc250098187a85d77942e7a9dcea1fba9869abd4021b59f1d06b7a05f72ab078a0322e8ba15f17a00690131afb5826ef9727f7ed42e521b8bf44c4242a3e53882b216919c53c692d9620f909ae5e29cce4ba0b12d5b1f05ee5b90c3541665d752ee06b105170ad030f41cd4abd3ac127626ff4e0624c686d8ac53420738bbb92e7acaa40b2386a04990f4f962402a3850b93a9f89dc5e788e8eafba2c0ad34d7e6e700912580a16f9ff881d4127c660b3b2c93417"}, &(0x7f0000000180)=0xff) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00004a001996ed12c3cb86a1b0a8065173426b88d318250866239cbe421b70cd03eb44a0a7b73d9348b24a597f829ceee8cb4ae07b9f991c49bc8f8562cd4c9f098569fb2ea6e2030000002e47f2"], 0x2) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) socket$inet(0x2, 0x80004, 0x200) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000000000)=@pic={0x1, 0x8001, 0x57, 0x256, 0x73, 0x3, 0xffffffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x77, 0x0, 0x6}) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000002ff0)=@ioapic={0x2, 0x0, 0x0, 0x0, 0x0, [{0xfffffffffffffffb}]}) ioctl$KVM_IRQ_LINE(r8, 0x4008ae61, &(0x7f0000000280)={0x0, 0x3}) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f0000000140)={&(0x7f0000ffb000/0x3000)=nil, 0x46a9, 0x4, 0x4, &(0x7f0000ffc000/0x3000)=nil, 0x1000}) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r9) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000100)={0xffffffff00000000, 0x0, 0x5, 0x200}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/16 23:20:43 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='e', 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, r0) 2018/04/16 23:20:43 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 2018/04/16 23:20:43 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0)=[{}], 0x2000000000000262, 0x80) 2018/04/16 23:20:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x8}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x91) [ 933.856191] netlink: 'syz-executor7': attribute type 1 has an invalid length. 2018/04/16 23:20:43 executing program 5: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/16 23:20:43 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x404}, 0x5c) 2018/04/16 23:20:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x258}]}) 2018/04/16 23:20:43 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x2, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000540)) r1 = perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f00000004c0)=0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) mkdir(&(0x7f0000efa000)='./file0\x00', 0x0) rmdir(&(0x7f0000000080)='./file0\x00') r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0xf7, "686a37c7e018dc0c92b8d82f108a27e7f828bcb11b07437bdc12e4034c701e5b25decfde33389c2dc3f323541d5fae9fa27b472813f1f7994db18b60830951686689bbc250098187a85d77942e7a9dcea1fba9869abd4021b59f1d06b7a05f72ab078a0322e8ba15f17a00690131afb5826ef9727f7ed42e521b8bf44c4242a3e53882b216919c53c692d9620f909ae5e29cce4ba0b12d5b1f05ee5b90c3541665d752ee06b105170ad030f41cd4abd3ac127626ff4e0624c686d8ac53420738bbb92e7acaa40b2386a04990f4f962402a3850b93a9f89dc5e788e8eafba2c0ad34d7e6e700912580a16f9ff881d4127c660b3b2c93417"}, &(0x7f0000000180)=0xff) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00004a001996ed12c3cb86a1b0a8065173426b88d318250866239cbe421b70cd03eb44a0a7b73d9348b24a597f829ceee8cb4ae07b9f991c49bc8f8562cd4c9f098569fb2ea6e2030000002e47f2"], 0x2) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) socket$inet(0x2, 0x80004, 0x200) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000000000)=@pic={0x1, 0x8001, 0x57, 0x256, 0x73, 0x3, 0xffffffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x77, 0x0, 0x6}) ioctl$KVM_SET_IRQCHIP(r8, 0x8208ae63, &(0x7f0000002ff0)=@ioapic={0x2, 0x0, 0x0, 0x0, 0x0, [{0xfffffffffffffffb}]}) ioctl$KVM_IRQ_LINE(r8, 0x4008ae61, &(0x7f0000000280)={0x0, 0x3}) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f0000000140)={&(0x7f0000ffb000/0x3000)=nil, 0x46a9, 0x4, 0x4, &(0x7f0000ffc000/0x3000)=nil, 0x1000}) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r9) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000100)={0xffffffff00000000, 0x0, 0x5, 0x200}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/16 23:20:43 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd02002000", 0x6}], 0x1, 0x0) [ 933.985714] device bridge_slave_1 left promiscuous mode [ 933.991424] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:20:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x8}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x91) 2018/04/16 23:20:43 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0)=[{}], 0x2000000000000262, 0x80) [ 934.059897] device bridge_slave_0 left promiscuous mode [ 934.065593] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:20:43 executing program 5: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/16 23:20:43 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x2) 2018/04/16 23:20:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x8}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x91) 2018/04/16 23:20:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x258}]}) 2018/04/16 23:20:44 executing program 5: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 934.240535] IPVS: ftp: loaded support on port[0] = 21 [ 934.253170] team0 (unregistering): Port device team_slave_1 removed [ 934.300154] team0 (unregistering): Port device team_slave_0 removed [ 934.344510] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 934.382756] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 934.425496] bond0 (unregistering): Released all slaves [ 935.086565] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.093104] bridge0: port 1(bridge_slave_0) entered disabled state [ 935.100835] device bridge_slave_0 entered promiscuous mode [ 935.143228] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.149718] bridge0: port 2(bridge_slave_1) entered disabled state [ 935.157225] device bridge_slave_1 entered promiscuous mode [ 935.198449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 935.237965] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 935.358611] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 935.402669] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 935.479821] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 935.486862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 935.590905] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 935.598371] team0: Port device team_slave_0 added [ 935.626829] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 935.634076] team0: Port device team_slave_1 added [ 935.668260] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 935.710476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 935.746359] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 935.753543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 935.762317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 935.783758] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 935.790891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 935.799467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 936.046074] bridge0: port 2(bridge_slave_1) entered blocking state [ 936.052480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 936.059155] bridge0: port 1(bridge_slave_0) entered blocking state [ 936.065536] bridge0: port 1(bridge_slave_0) entered forwarding state [ 936.073063] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 936.479211] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 936.988375] 8021q: adding VLAN 0 to HW filter on device bond0 [ 937.076700] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 937.164330] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 937.170544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 937.178378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 937.262135] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:47 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x2) 2018/04/16 23:20:47 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x404}, 0x5c) 2018/04/16 23:20:47 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec0500001302000012000000000100000002000000010000ba55394ce10000001e000000000000000010cc0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011500)) 2018/04/16 23:20:47 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0)=[{}], 0x2000000000000262, 0x80) 2018/04/16 23:20:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x8}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x91) 2018/04/16 23:20:47 executing program 5: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/16 23:20:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x258}]}) 2018/04/16 23:20:47 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd02002000", 0x6}], 0x1, 0x0) 2018/04/16 23:20:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000140)=0x7, 0x4) 2018/04/16 23:20:47 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x2) 2018/04/16 23:20:47 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x404}, 0x5c) [ 938.038851] device bridge_slave_1 left promiscuous mode [ 938.044720] bridge0: port 2(bridge_slave_1) entered disabled state [ 938.074212] device bridge_slave_0 left promiscuous mode [ 938.079969] bridge0: port 1(bridge_slave_0) entered disabled state [ 938.148762] IPVS: ftp: loaded support on port[0] = 21 [ 938.156214] team0 (unregistering): Port device team_slave_1 removed [ 938.167388] team0 (unregistering): Port device team_slave_0 removed [ 938.179605] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 938.197099] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 938.226444] bond0 (unregistering): Released all slaves [ 938.839450] bridge0: port 1(bridge_slave_0) entered blocking state [ 938.845889] bridge0: port 1(bridge_slave_0) entered disabled state [ 938.854325] device bridge_slave_0 entered promiscuous mode [ 938.894099] bridge0: port 2(bridge_slave_1) entered blocking state [ 938.900567] bridge0: port 2(bridge_slave_1) entered disabled state [ 938.908611] device bridge_slave_1 entered promiscuous mode [ 938.948136] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 938.987647] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 939.107154] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 939.148981] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 939.325518] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 939.332960] team0: Port device team_slave_0 added [ 939.371686] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 939.379186] team0: Port device team_slave_1 added [ 939.412118] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 939.453234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 939.493739] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 939.500888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 939.510994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 939.533091] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 939.540278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 939.548684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 939.789263] bridge0: port 2(bridge_slave_1) entered blocking state [ 939.795663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 939.802311] bridge0: port 1(bridge_slave_0) entered blocking state [ 939.808675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 939.815969] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 939.863185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 940.802157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 940.904514] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 940.999467] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 941.005787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 941.013136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 941.111789] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:51 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000140)=0x7, 0x4) 2018/04/16 23:20:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x258}]}) 2018/04/16 23:20:51 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd02002000", 0x6}], 0x1, 0x0) 2018/04/16 23:20:51 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0)=[{}], 0x2000000000000262, 0x80) 2018/04/16 23:20:51 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x2) 2018/04/16 23:20:51 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) unshare(0x60000000) socket(0x7, 0xa, 0xffffffff) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) 2018/04/16 23:20:51 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x0) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r2) keyctl$link(0x8, r3, r1) r4 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00'}}) 2018/04/16 23:20:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000000efcc)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0xfffffffffffffffd}}, 0x1c}, 0x1}, 0x0) 2018/04/16 23:20:51 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f000052bff4)='/dev/amidi#\x00', 0x34, 0x1) write$evdev(r0, &(0x7f0000a37000)=[{{0x77359400}}], 0x797) 2018/04/16 23:20:51 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000140)=0x7, 0x4) 2018/04/16 23:20:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000000efcc)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0xfffffffffffffffd}}, 0x1c}, 0x1}, 0x0) 2018/04/16 23:20:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000d75000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x14) 2018/04/16 23:20:51 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd02002000", 0x6}], 0x1, 0x0) 2018/04/16 23:20:51 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000140)=0x7, 0x4) 2018/04/16 23:20:51 executing program 0: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x5}]}, &(0x7f0000f91ffc)=0xfffffffffffffd67) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x2a}], {0x95}}, &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00009da000)=r0, 0x4) write(r1, &(0x7f0000fd3000)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) [ 941.946177] device bridge_slave_1 left promiscuous mode [ 941.951864] bridge0: port 2(bridge_slave_1) entered disabled state [ 942.011676] device bridge_slave_0 left promiscuous mode [ 942.017441] bridge0: port 1(bridge_slave_0) entered disabled state [ 942.114605] IPVS: ftp: loaded support on port[0] = 21 [ 942.121910] team0 (unregistering): Port device team_slave_1 removed [ 942.136686] team0 (unregistering): Port device team_slave_0 removed [ 942.147729] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 942.168739] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 942.200294] bond0 (unregistering): Released all slaves [ 942.891466] bridge0: port 1(bridge_slave_0) entered blocking state [ 942.897936] bridge0: port 1(bridge_slave_0) entered disabled state [ 942.906686] device bridge_slave_0 entered promiscuous mode [ 942.945454] bridge0: port 2(bridge_slave_1) entered blocking state [ 942.951908] bridge0: port 2(bridge_slave_1) entered disabled state [ 942.959729] device bridge_slave_1 entered promiscuous mode [ 942.998177] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 943.036940] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 943.151133] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 943.192719] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 943.264766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 943.271723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 943.375125] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 943.382555] team0: Port device team_slave_0 added [ 943.409531] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 943.416667] team0: Port device team_slave_1 added [ 943.452645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 943.492255] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 943.521419] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 943.528524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 943.536504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 943.558468] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 943.565545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 943.574156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 943.796418] bridge0: port 2(bridge_slave_1) entered blocking state [ 943.802813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 943.809456] bridge0: port 1(bridge_slave_0) entered blocking state [ 943.815820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 943.823498] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 944.287124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 944.664246] 8021q: adding VLAN 0 to HW filter on device bond0 [ 944.750133] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 944.836341] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 944.842559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 944.849751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 944.931940] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:55 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x0) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r2) keyctl$link(0x8, r3, r1) r4 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00'}}) 2018/04/16 23:20:55 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x0) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r2) keyctl$link(0x8, r3, r1) r4 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00'}}) 2018/04/16 23:20:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000d75000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x14) 2018/04/16 23:20:55 executing program 0: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x5}]}, &(0x7f0000f91ffc)=0xfffffffffffffd67) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x2a}], {0x95}}, &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00009da000)=r0, 0x4) write(r1, &(0x7f0000fd3000)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/16 23:20:55 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f000052bff4)='/dev/amidi#\x00', 0x34, 0x1) write$evdev(r0, &(0x7f0000a37000)=[{{0x77359400}}], 0x797) 2018/04/16 23:20:55 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000265ff7)='/dev/sg#\x00', 0x0, 0x2) ioctl(r0, 0x227b, &(0x7f0000d27862)="ff") read(r0, &(0x7f0000000140)=""/90, 0x5a) write$fuse(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="50000000000000000000000000000000070000001a000000000000000000000000000000000000000000"], 0x2a) 2018/04/16 23:20:55 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x1f, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x10) 2018/04/16 23:20:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000000efcc)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0xfffffffffffffffd}}, 0x1c}, 0x1}, 0x0) 2018/04/16 23:20:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000d75000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x14) 2018/04/16 23:20:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000000efcc)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0xfffffffffffffffd}}, 0x1c}, 0x1}, 0x0) 2018/04/16 23:20:55 executing program 0: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x5}]}, &(0x7f0000f91ffc)=0xfffffffffffffd67) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x2a}], {0x95}}, &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00009da000)=r0, 0x4) write(r1, &(0x7f0000fd3000)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/16 23:20:55 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x1f, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x10) 2018/04/16 23:20:55 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xc0, &(0x7f000079bffc), &(0x7f0000350ffc)=0x69c4a5d13df95edf) 2018/04/16 23:20:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000d75000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x14) [ 945.700071] device bridge_slave_1 left promiscuous mode [ 945.705796] bridge0: port 2(bridge_slave_1) entered disabled state [ 945.756193] device bridge_slave_0 left promiscuous mode [ 945.761993] bridge0: port 1(bridge_slave_0) entered disabled state [ 945.843442] IPVS: ftp: loaded support on port[0] = 21 [ 945.882513] team0 (unregistering): Port device team_slave_1 removed [ 945.893518] team0 (unregistering): Port device team_slave_0 removed [ 945.903428] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 945.919700] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 945.946767] bond0 (unregistering): Released all slaves [ 946.570644] bridge0: port 1(bridge_slave_0) entered blocking state [ 946.577789] bridge0: port 1(bridge_slave_0) entered disabled state [ 946.585356] device bridge_slave_0 entered promiscuous mode [ 946.624408] bridge0: port 2(bridge_slave_1) entered blocking state [ 946.630865] bridge0: port 2(bridge_slave_1) entered disabled state [ 946.638435] device bridge_slave_1 entered promiscuous mode [ 946.677467] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 946.717161] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 946.830983] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 946.873362] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 947.052120] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 947.059705] team0: Port device team_slave_0 added [ 947.106325] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 947.113784] team0: Port device team_slave_1 added [ 947.148895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 947.186791] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 947.228958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 947.260955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 947.514636] bridge0: port 2(bridge_slave_1) entered blocking state [ 947.521082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 947.527758] bridge0: port 1(bridge_slave_0) entered blocking state [ 947.534167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 947.541632] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 948.454224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 948.512328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 948.547941] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 948.636468] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 948.643231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 948.650704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 948.736090] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:20:59 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="54fdc434f038", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x84}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f0000000140)) 2018/04/16 23:20:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x0) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r2) keyctl$link(0x8, r3, r1) r4 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00'}}) 2018/04/16 23:20:59 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x1f, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x10) 2018/04/16 23:20:59 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x0) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r2) keyctl$link(0x8, r3, r1) r4 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00'}}) 2018/04/16 23:20:59 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f000052bff4)='/dev/amidi#\x00', 0x34, 0x1) write$evdev(r0, &(0x7f0000a37000)=[{{0x77359400}}], 0x797) 2018/04/16 23:20:59 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}, {0x0, 'memory', 0x20}]}, 0xe) write$cgroup_subtree(r1, &(0x7f0000000140)={[{0x2b, 'rdma', 0x20}, {0x1, 'io', 0x20}]}, 0xa) r2 = dup2(r0, r1) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000000180)=""/142) 2018/04/16 23:20:59 executing program 0: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x5}]}, &(0x7f0000f91ffc)=0xfffffffffffffd67) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x2a}], {0x95}}, &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00009da000)=r0, 0x4) write(r1, &(0x7f0000fd3000)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/16 23:20:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={"626f6e64300000ff0fe500", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=@ipv6_newaddr={0x2c, 0x14, 0x121, 0x0, 0x0, {0xa, 0x88, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @mcast2={0xff, 0x2, [], 0x1}}]}, 0x2c}, 0x1}, 0x0) 2018/04/16 23:20:59 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="54fdc434f038", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x84}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f0000000140)) 2018/04/16 23:20:59 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x1f, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x10) 2018/04/16 23:20:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={"626f6e64300000ff0fe500", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=@ipv6_newaddr={0x2c, 0x14, 0x121, 0x0, 0x0, {0xa, 0x88, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @mcast2={0xff, 0x2, [], 0x1}}]}, 0x2c}, 0x1}, 0x0) 2018/04/16 23:20:59 executing program 0: r0 = memfd_create(&(0x7f0000003ffa)='wfgn0', 0x2) fcntl$addseals(r0, 0x409, 0xc) fallocate(r0, 0x3, 0x0, 0x2) 2018/04/16 23:20:59 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="54fdc434f038", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x84}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f0000000140)) 2018/04/16 23:20:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)={[{@sb={'sb', 0x3d}, 0x2c}]}) 2018/04/16 23:20:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={"626f6e64300000ff0fe500", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=@ipv6_newaddr={0x2c, 0x14, 0x121, 0x0, 0x0, {0xa, 0x88, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @mcast2={0xff, 0x2, [], 0x1}}]}, 0x2c}, 0x1}, 0x0) 2018/04/16 23:20:59 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f000052bff4)='/dev/amidi#\x00', 0x34, 0x1) write$evdev(r0, &(0x7f0000a37000)=[{{0x77359400}}], 0x797) [ 949.571954] device bridge_slave_1 left promiscuous mode [ 949.577965] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:20:59 executing program 0: r0 = memfd_create(&(0x7f0000003ffa)='wfgn0', 0x2) fcntl$addseals(r0, 0x409, 0xc) fallocate(r0, 0x3, 0x0, 0x2) [ 949.644910] device bridge_slave_0 left promiscuous mode [ 949.648498] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 949.650698] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:20:59 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="54fdc434f038", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x84}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f0000000140)) [ 949.731748] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 949.755728] IPVS: ftp: loaded support on port[0] = 21 2018/04/16 23:20:59 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x0) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r2) keyctl$link(0x8, r3, r1) r4 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00'}}) 2018/04/16 23:20:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80, 0x0) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r2) keyctl$link(0x8, r3, r1) r4 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00'}}) [ 949.910578] team0 (unregistering): Port device team_slave_1 removed [ 949.935850] team0 (unregistering): Port device team_slave_0 removed [ 949.962759] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 949.993380] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 950.025655] bond0 (unregistering): Released all slaves [ 950.683707] bridge0: port 1(bridge_slave_0) entered blocking state [ 950.690190] bridge0: port 1(bridge_slave_0) entered disabled state [ 950.698181] device bridge_slave_0 entered promiscuous mode [ 950.737886] bridge0: port 2(bridge_slave_1) entered blocking state [ 950.744366] bridge0: port 2(bridge_slave_1) entered disabled state [ 950.752373] device bridge_slave_1 entered promiscuous mode [ 950.792170] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 950.832534] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 950.952251] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 950.994390] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 951.168826] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 951.176176] team0: Port device team_slave_0 added [ 951.203279] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 951.210800] team0: Port device team_slave_1 added [ 951.250183] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 951.287540] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 951.315815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 951.344538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 951.597189] bridge0: port 2(bridge_slave_1) entered blocking state [ 951.603611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 951.610276] bridge0: port 1(bridge_slave_0) entered blocking state [ 951.616668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 951.623984] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 952.537718] 8021q: adding VLAN 0 to HW filter on device bond0 [ 952.607476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 952.629563] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 952.719979] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 952.726230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 952.734173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 952.818764] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:03 executing program 7: syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)={[{@sb={'sb', 0x3d}, 0x2c}]}) 2018/04/16 23:21:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @loopback=0x7f000001}, 0x3) 2018/04/16 23:21:03 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000040)="bd88734f5826f5d69c93dbe59e97b3afe49f25753542bacee7dc85b715c64775"}) 2018/04/16 23:21:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001740)="a7", 0x1}], 0x1, &(0x7f0000001200)}], 0x1, 0x0) 2018/04/16 23:21:03 executing program 0: r0 = memfd_create(&(0x7f0000003ffa)='wfgn0', 0x2) fcntl$addseals(r0, 0x409, 0xc) fallocate(r0, 0x3, 0x0, 0x2) 2018/04/16 23:21:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, &(0x7f0000000340)=0x90) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$netrom(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@ax25={0x3, {"fc132bfbb71640"}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000400)}, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32"}], 0xaaaaaaaaaaaab20, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000100)={0x0, 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0fec8cdfffb8b6008ec8baa100ed8044dca70f005943f3f30f236f66b9360200000f32f4653ef30fbc9e544d0f229c", 0x2f}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/16 23:21:03 executing program 6: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x8000000008, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000001, 0x0, r0, &(0x7f0000000a00)}]) 2018/04/16 23:21:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={"626f6e64300000ff0fe500", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=@ipv6_newaddr={0x2c, 0x14, 0x121, 0x0, 0x0, {0xa, 0x88, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @mcast2={0xff, 0x2, [], 0x1}}]}, 0x2c}, 0x1}, 0x0) 2018/04/16 23:21:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @loopback=0x7f000001}, 0x3) [ 953.465280] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 2018/04/16 23:21:03 executing program 0: r0 = memfd_create(&(0x7f0000003ffa)='wfgn0', 0x2) fcntl$addseals(r0, 0x409, 0xc) fallocate(r0, 0x3, 0x0, 0x2) 2018/04/16 23:21:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001740)="a7", 0x1}], 0x1, &(0x7f0000001200)}], 0x1, 0x0) 2018/04/16 23:21:03 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001000)="5500000018007fafb72d1cb2a4a280930206000000a843096c26236925000800040000001000ca8a9848a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000004000)}, 0x0) 2018/04/16 23:21:03 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) 2018/04/16 23:21:03 executing program 7: syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)={[{@sb={'sb', 0x3d}, 0x2c}]}) 2018/04/16 23:21:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @loopback=0x7f000001}, 0x3) [ 953.614231] device bridge_slave_1 left promiscuous mode [ 953.619886] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:21:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001740)="a7", 0x1}], 0x1, &(0x7f0000001200)}], 0x1, 0x0) 2018/04/16 23:21:03 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) [ 953.655928] device bridge_slave_0 left promiscuous mode [ 953.661530] bridge0: port 1(bridge_slave_0) entered disabled state [ 953.662838] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 953.813929] IPVS: ftp: loaded support on port[0] = 21 [ 953.843246] team0 (unregistering): Port device team_slave_1 removed [ 953.861953] team0 (unregistering): Port device team_slave_0 removed [ 953.875553] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 953.889586] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 953.914484] bond0 (unregistering): Released all slaves [ 954.544162] bridge0: port 1(bridge_slave_0) entered blocking state [ 954.550623] bridge0: port 1(bridge_slave_0) entered disabled state [ 954.557900] device bridge_slave_0 entered promiscuous mode [ 954.596314] bridge0: port 2(bridge_slave_1) entered blocking state [ 954.602790] bridge0: port 2(bridge_slave_1) entered disabled state [ 954.610919] device bridge_slave_1 entered promiscuous mode [ 954.648670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 954.687621] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 954.802511] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 954.842534] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 955.008677] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 955.016124] team0: Port device team_slave_0 added [ 955.053618] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 955.061213] team0: Port device team_slave_1 added [ 955.094631] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 955.135110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 955.175141] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 955.182275] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 955.190417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 955.212996] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 955.220265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 955.228341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 955.475232] bridge0: port 2(bridge_slave_1) entered blocking state [ 955.481662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 955.488345] bridge0: port 1(bridge_slave_0) entered blocking state [ 955.494741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 955.502307] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 955.999148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 956.417483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 956.504080] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 956.590820] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 956.597122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 956.604324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 956.684990] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, &(0x7f0000000340)=0x90) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$netrom(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@ax25={0x3, {"fc132bfbb71640"}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000400)}, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32"}], 0xaaaaaaaaaaaab20, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000100)={0x0, 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0fec8cdfffb8b6008ec8baa100ed8044dca70f005943f3f30f236f66b9360200000f32f4653ef30fbc9e544d0f229c", 0x2f}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/16 23:21:07 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001000)="5500000018007fafb72d1cb2a4a280930206000000a843096c26236925000800040000001000ca8a9848a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000004000)}, 0x0) 2018/04/16 23:21:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, &(0x7f0000000340)=0x90) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$netrom(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@ax25={0x3, {"fc132bfbb71640"}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000400)}, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32"}], 0xaaaaaaaaaaaab20, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000100)={0x0, 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0fec8cdfffb8b6008ec8baa100ed8044dca70f005943f3f30f236f66b9360200000f32f4653ef30fbc9e544d0f229c", 0x2f}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/16 23:21:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @loopback=0x7f000001}, 0x3) 2018/04/16 23:21:07 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) 2018/04/16 23:21:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001740)="a7", 0x1}], 0x1, &(0x7f0000001200)}], 0x1, 0x0) 2018/04/16 23:21:07 executing program 7: syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)={[{@sb={'sb', 0x3d}, 0x2c}]}) 2018/04/16 23:21:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, &(0x7f0000000340)=0x90) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$netrom(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@ax25={0x3, {"fc132bfbb71640"}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000400)}, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32"}], 0xaaaaaaaaaaaab20, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000100)={0x0, 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0fec8cdfffb8b6008ec8baa100ed8044dca70f005943f3f30f236f66b9360200000f32f4653ef30fbc9e544d0f229c", 0x2f}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/16 23:21:07 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) 2018/04/16 23:21:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000000c0)={0x14, 0xa, 0xa, 0xfffffffffffffffd}, 0x14}, 0x1}, 0x0) 2018/04/16 23:21:07 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001000)="5500000018007fafb72d1cb2a4a280930206000000a843096c26236925000800040000001000ca8a9848a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000004000)}, 0x0) 2018/04/16 23:21:07 executing program 3: r0 = memfd_create(&(0x7f0000003ffa)='wfgn0', 0x2) fcntl$addseals(r0, 0x409, 0xc) fallocate(r0, 0x0, 0x0, 0xffff) [ 957.328442] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 2018/04/16 23:21:07 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x800000000004, 0x4, 0x2009, 0x0, 0xffffffffffffffff, 0x0, [0x8]}, 0x2c) 2018/04/16 23:21:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000000c0)={0x14, 0xa, 0xa, 0xfffffffffffffffd}, 0x14}, 0x1}, 0x0) 2018/04/16 23:21:07 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001000)="5500000018007fafb72d1cb2a4a280930206000000a843096c26236925000800040000001000ca8a9848a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000004000)}, 0x0) [ 957.480182] device bridge_slave_1 left promiscuous mode [ 957.485837] bridge0: port 2(bridge_slave_1) entered disabled state [ 957.556368] device bridge_slave_0 left promiscuous mode [ 957.562069] bridge0: port 1(bridge_slave_0) entered disabled state [ 957.616960] IPVS: ftp: loaded support on port[0] = 21 [ 957.653744] team0 (unregistering): Port device team_slave_1 removed [ 957.667301] team0 (unregistering): Port device team_slave_0 removed [ 957.677409] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 957.693632] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 957.722653] bond0 (unregistering): Released all slaves [ 958.329493] bridge0: port 1(bridge_slave_0) entered blocking state [ 958.335948] bridge0: port 1(bridge_slave_0) entered disabled state [ 958.344789] device bridge_slave_0 entered promiscuous mode [ 958.384712] bridge0: port 2(bridge_slave_1) entered blocking state [ 958.391181] bridge0: port 2(bridge_slave_1) entered disabled state [ 958.399141] device bridge_slave_1 entered promiscuous mode [ 958.438271] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 958.478099] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 958.594136] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 958.637529] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 958.821655] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 958.828861] team0: Port device team_slave_0 added [ 958.856444] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 958.865160] team0: Port device team_slave_1 added [ 958.903205] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 958.944946] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 958.974399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 959.016322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 959.287409] bridge0: port 2(bridge_slave_1) entered blocking state [ 959.293839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 959.300556] bridge0: port 1(bridge_slave_0) entered blocking state [ 959.306959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 959.314385] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 960.235414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 960.290005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 960.329012] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 960.418190] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 960.424430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 960.432284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 960.516441] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:10 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x800000000004, 0x4, 0x2009, 0x0, 0xffffffffffffffff, 0x0, [0x8]}, 0x2c) 2018/04/16 23:21:10 executing program 3: r0 = memfd_create(&(0x7f0000003ffa)='wfgn0', 0x2) fcntl$addseals(r0, 0x409, 0xc) fallocate(r0, 0x0, 0x0, 0xffff) 2018/04/16 23:21:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, &(0x7f0000000340)=0x90) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$netrom(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@ax25={0x3, {"fc132bfbb71640"}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000400)}, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32"}], 0xaaaaaaaaaaaab20, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000100)={0x0, 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0fec8cdfffb8b6008ec8baa100ed8044dca70f005943f3f30f236f66b9360200000f32f4653ef30fbc9e544d0f229c", 0x2f}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/16 23:21:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000000c0)={0x14, 0xa, 0xa, 0xfffffffffffffffd}, 0x14}, 0x1}, 0x0) 2018/04/16 23:21:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, &(0x7f0000000340)=0x90) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$netrom(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@ax25={0x3, {"fc132bfbb71640"}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000400)}, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32"}], 0xaaaaaaaaaaaab20, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000100)={0x0, 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0fec8cdfffb8b6008ec8baa100ed8044dca70f005943f3f30f236f66b9360200000f32f4653ef30fbc9e544d0f229c", 0x2f}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/16 23:21:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, &(0x7f0000000340)=0x90) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$netrom(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@ax25={0x3, {"fc132bfbb71640"}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000400)}, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32"}], 0xaaaaaaaaaaaab20, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000100)={0x0, 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0fec8cdfffb8b6008ec8baa100ed8044dca70f005943f3f30f236f66b9360200000f32f4653ef30fbc9e544d0f229c", 0x2f}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/16 23:21:10 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000013000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000002000)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x8, 0x0, &(0x7f0000aabfe8)=[@increfs={0x40046304}], 0x0, 0x0, &(0x7f0000008f37)}) 2018/04/16 23:21:10 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x0) unshare(0x400) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 2018/04/16 23:21:10 executing program 3: r0 = memfd_create(&(0x7f0000003ffa)='wfgn0', 0x2) fcntl$addseals(r0, 0x409, 0xc) fallocate(r0, 0x0, 0x0, 0xffff) 2018/04/16 23:21:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000000c0)={0x14, 0xa, 0xa, 0xfffffffffffffffd}, 0x14}, 0x1}, 0x0) 2018/04/16 23:21:10 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x800000000004, 0x4, 0x2009, 0x0, 0xffffffffffffffff, 0x0, [0x8]}, 0x2c) 2018/04/16 23:21:11 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000013000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000002000)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x8, 0x0, &(0x7f0000aabfe8)=[@increfs={0x40046304}], 0x0, 0x0, &(0x7f0000008f37)}) 2018/04/16 23:21:11 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x0) unshare(0x400) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 2018/04/16 23:21:11 executing program 3: r0 = memfd_create(&(0x7f0000003ffa)='wfgn0', 0x2) fcntl$addseals(r0, 0x409, 0xc) fallocate(r0, 0x0, 0x0, 0xffff) [ 961.330912] device bridge_slave_1 left promiscuous mode [ 961.336604] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.400853] device bridge_slave_0 left promiscuous mode [ 961.406499] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.456357] IPVS: ftp: loaded support on port[0] = 21 [ 961.479630] team0 (unregistering): Port device team_slave_1 removed [ 961.489765] team0 (unregistering): Port device team_slave_0 removed [ 961.501353] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 961.517645] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 961.547221] bond0 (unregistering): Released all slaves [ 962.148669] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.155152] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.163233] device bridge_slave_0 entered promiscuous mode [ 962.205786] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.212345] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.220370] device bridge_slave_1 entered promiscuous mode [ 962.259359] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 962.299178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 962.417934] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 962.462442] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 962.643512] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 962.650983] team0: Port device team_slave_0 added [ 962.689448] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 962.696881] team0: Port device team_slave_1 added [ 962.732874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 962.770988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 962.811688] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 962.818885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 962.827563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 962.850526] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 962.857675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 962.866384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 963.105131] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.111535] bridge0: port 2(bridge_slave_1) entered forwarding state [ 963.118202] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.124580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 963.131873] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 963.343171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 964.044627] 8021q: adding VLAN 0 to HW filter on device bond0 [ 964.133222] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 964.219906] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 964.226185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 964.233898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 964.318359] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:14 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x0) unshare(0x400) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 2018/04/16 23:21:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, &(0x7f0000000340)=0x90) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$netrom(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@ax25={0x3, {"fc132bfbb71640"}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000400)}, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32"}], 0xaaaaaaaaaaaab20, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000100)={0x0, 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0fec8cdfffb8b6008ec8baa100ed8044dca70f005943f3f30f236f66b9360200000f32f4653ef30fbc9e544d0f229c", 0x2f}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/16 23:21:14 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x800000000004, 0x4, 0x2009, 0x0, 0xffffffffffffffff, 0x0, [0x8]}, 0x2c) 2018/04/16 23:21:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, &(0x7f0000000340)=0x90) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$netrom(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@ax25={0x3, {"fc132bfbb71640"}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000400)}, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32"}], 0xaaaaaaaaaaaab20, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000100)={0x0, 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0fec8cdfffb8b6008ec8baa100ed8044dca70f005943f3f30f236f66b9360200000f32f4653ef30fbc9e544d0f229c", 0x2f}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/16 23:21:14 executing program 3: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') umount2(&(0x7f0000e28000)='..', 0x2) getcwd(&(0x7f0000000080)=""/43, 0x2b) 2018/04/16 23:21:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, &(0x7f0000000340)=0x90) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$netrom(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@ax25={0x3, {"fc132bfbb71640"}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000400)}, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32"}], 0xaaaaaaaaaaaab20, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000100)={0x0, 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0fec8cdfffb8b6008ec8baa100ed8044dca70f005943f3f30f236f66b9360200000f32f4653ef30fbc9e544d0f229c", 0x2f}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/16 23:21:14 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000013000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000002000)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x8, 0x0, &(0x7f0000aabfe8)=[@increfs={0x40046304}], 0x0, 0x0, &(0x7f0000008f37)}) 2018/04/16 23:21:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000540)=0x3, 0x4) sendto$inet(r0, &(0x7f0000000000)="ea", 0x1, 0x0, &(0x7f0000e68000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/16 23:21:14 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='oom_score_adj\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000cac000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001800)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000002040)=""/4096}, &(0x7f0000000180)=0x78) ioprio_get$pid(0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) truncate(&(0x7f0000001180)='./bus\x00', 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r3, r2, &(0x7f00000010c0), 0x10000065) tkill(0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001640)={0x1ff, {0x2, 0x4e21}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e20, @multicast2=0xe0000002}, 0x0, 0x9, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000001240)='teql0\x00', 0x0, 0x80}) inotify_rm_watch(0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(0x0, 0x2, 0x10) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001700)) syz_fuseblk_mount(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x3ff, 0x1, 0x0) 2018/04/16 23:21:14 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x0) unshare(0x400) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 2018/04/16 23:21:14 executing program 3: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') umount2(&(0x7f0000e28000)='..', 0x2) getcwd(&(0x7f0000000080)=""/43, 0x2b) 2018/04/16 23:21:14 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000013000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000002000)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x8, 0x0, &(0x7f0000aabfe8)=[@increfs={0x40046304}], 0x0, 0x0, &(0x7f0000008f37)}) 2018/04/16 23:21:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000540)=0x3, 0x4) sendto$inet(r0, &(0x7f0000000000)="ea", 0x1, 0x0, &(0x7f0000e68000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/16 23:21:14 executing program 6: perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/207, 0xcf, 0x0) 2018/04/16 23:21:14 executing program 4: mkdir(&(0x7f00000001c0)='./control\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000100)='./control\x00', &(0x7f0000000140)=@known='security.capability\x00', &(0x7f0000000180)=""/20, 0x14) [ 965.115262] device bridge_slave_1 left promiscuous mode [ 965.121164] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.192122] device bridge_slave_0 left promiscuous mode [ 965.197826] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.274306] IPVS: ftp: loaded support on port[0] = 21 [ 965.327652] team0 (unregistering): Port device team_slave_1 removed [ 965.338311] team0 (unregistering): Port device team_slave_0 removed [ 965.348354] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 965.361592] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 965.389886] bond0 (unregistering): Released all slaves [ 965.837840] bridge0: port 1(bridge_slave_0) entered blocking state [ 965.844282] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.851893] device bridge_slave_0 entered promiscuous mode [ 965.890695] bridge0: port 2(bridge_slave_1) entered blocking state [ 965.897131] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.904502] device bridge_slave_1 entered promiscuous mode [ 965.944123] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 965.983170] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 966.099534] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 966.140754] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 966.324158] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 966.332292] team0: Port device team_slave_0 added [ 966.370559] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 966.379845] team0: Port device team_slave_1 added [ 966.418297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 966.462601] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 966.504353] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 966.511607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 966.520593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 966.561377] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 966.568666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 966.577563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 966.951746] bridge0: port 2(bridge_slave_1) entered blocking state [ 966.958166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 966.964839] bridge0: port 1(bridge_slave_0) entered blocking state [ 966.971236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 966.978613] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 967.887530] 8021q: adding VLAN 0 to HW filter on device bond0 [ 967.967216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 967.984876] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 968.089202] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 968.095779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 968.103611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 968.188350] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000540)=0x3, 0x4) sendto$inet(r0, &(0x7f0000000000)="ea", 0x1, 0x0, &(0x7f0000e68000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/16 23:21:18 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "c0e544", 0x18, 0x40000000003a, 0x0, @dev={0xfe, 0x80}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}}}, 0x0) 2018/04/16 23:21:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='oom_score_adj\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000cac000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001800)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000002040)=""/4096}, &(0x7f0000000180)=0x78) ioprio_get$pid(0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) truncate(&(0x7f0000001180)='./bus\x00', 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r3, r2, &(0x7f00000010c0), 0x10000065) tkill(0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001640)={0x1ff, {0x2, 0x4e21}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e20, @multicast2=0xe0000002}, 0x0, 0x9, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000001240)='teql0\x00', 0x0, 0x80}) inotify_rm_watch(0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(0x0, 0x2, 0x10) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001700)) syz_fuseblk_mount(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x3ff, 0x1, 0x0) 2018/04/16 23:21:18 executing program 4: mkdir(&(0x7f00000001c0)='./control\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000100)='./control\x00', &(0x7f0000000140)=@known='security.capability\x00', &(0x7f0000000180)=""/20, 0x14) 2018/04/16 23:21:18 executing program 3: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') umount2(&(0x7f0000e28000)='..', 0x2) getcwd(&(0x7f0000000080)=""/43, 0x2b) 2018/04/16 23:21:18 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='oom_score_adj\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000cac000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001800)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000002040)=""/4096}, &(0x7f0000000180)=0x78) ioprio_get$pid(0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) truncate(&(0x7f0000001180)='./bus\x00', 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r3, r2, &(0x7f00000010c0), 0x10000065) tkill(0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001640)={0x1ff, {0x2, 0x4e21}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e20, @multicast2=0xe0000002}, 0x0, 0x9, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000001240)='teql0\x00', 0x0, 0x80}) inotify_rm_watch(0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(0x0, 0x2, 0x10) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001700)) syz_fuseblk_mount(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x3ff, 0x1, 0x0) 2018/04/16 23:21:18 executing program 6: perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/207, 0xcf, 0x0) 2018/04/16 23:21:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='oom_score_adj\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000cac000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001800)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000002040)=""/4096}, &(0x7f0000000180)=0x78) ioprio_get$pid(0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) truncate(&(0x7f0000001180)='./bus\x00', 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r3, r2, &(0x7f00000010c0), 0x10000065) tkill(0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001640)={0x1ff, {0x2, 0x4e21}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e20, @multicast2=0xe0000002}, 0x0, 0x9, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000001240)='teql0\x00', 0x0, 0x80}) inotify_rm_watch(0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(0x0, 0x2, 0x10) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001700)) syz_fuseblk_mount(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x3ff, 0x1, 0x0) 2018/04/16 23:21:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x4, {0x2}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/16 23:21:18 executing program 3: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') umount2(&(0x7f0000e28000)='..', 0x2) getcwd(&(0x7f0000000080)=""/43, 0x2b) 2018/04/16 23:21:18 executing program 4: mkdir(&(0x7f00000001c0)='./control\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000100)='./control\x00', &(0x7f0000000140)=@known='security.capability\x00', &(0x7f0000000180)=""/20, 0x14) 2018/04/16 23:21:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000540)=0x3, 0x4) sendto$inet(r0, &(0x7f0000000000)="ea", 0x1, 0x0, &(0x7f0000e68000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/16 23:21:18 executing program 6: perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/207, 0xcf, 0x0) 2018/04/16 23:21:18 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='oom_score_adj\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000cac000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001800)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000002040)=""/4096}, &(0x7f0000000180)=0x78) ioprio_get$pid(0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) truncate(&(0x7f0000001180)='./bus\x00', 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r3, r2, &(0x7f00000010c0), 0x10000065) tkill(0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001640)={0x1ff, {0x2, 0x4e21}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e20, @multicast2=0xe0000002}, 0x0, 0x9, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000001240)='teql0\x00', 0x0, 0x80}) inotify_rm_watch(0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(0x0, 0x2, 0x10) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001700)) syz_fuseblk_mount(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x3ff, 0x1, 0x0) 2018/04/16 23:21:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='oom_score_adj\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000cac000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001800)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000002040)=""/4096}, &(0x7f0000000180)=0x78) ioprio_get$pid(0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) truncate(&(0x7f0000001180)='./bus\x00', 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r3, r2, &(0x7f00000010c0), 0x10000065) tkill(0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001640)={0x1ff, {0x2, 0x4e21}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e20, @multicast2=0xe0000002}, 0x0, 0x9, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000001240)='teql0\x00', 0x0, 0x80}) inotify_rm_watch(0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(0x0, 0x2, 0x10) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001700)) syz_fuseblk_mount(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x3ff, 0x1, 0x0) [ 969.001522] device bridge_slave_1 left promiscuous mode [ 969.007269] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:21:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) write(r1, &(0x7f0000000000)="791f7dfde08186d67dba3f649a7ba85e30", 0x11) [ 969.069465] device bridge_slave_0 left promiscuous mode [ 969.075224] bridge0: port 1(bridge_slave_0) entered disabled state [ 969.158364] IPVS: ftp: loaded support on port[0] = 21 [ 969.209223] team0 (unregistering): Port device team_slave_1 removed [ 969.224970] team0 (unregistering): Port device team_slave_0 removed [ 969.236304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 969.249563] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 969.279134] bond0 (unregistering): Released all slaves [ 969.719646] bridge0: port 1(bridge_slave_0) entered blocking state [ 969.726106] bridge0: port 1(bridge_slave_0) entered disabled state [ 969.733991] device bridge_slave_0 entered promiscuous mode [ 969.774341] bridge0: port 2(bridge_slave_1) entered blocking state [ 969.780785] bridge0: port 2(bridge_slave_1) entered disabled state [ 969.788655] device bridge_slave_1 entered promiscuous mode [ 969.828475] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 969.866996] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 969.982581] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 970.024541] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 970.065503] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 970.072463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 970.112549] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 970.119504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 970.236730] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 970.244693] team0: Port device team_slave_0 added [ 970.282394] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 970.289829] team0: Port device team_slave_1 added [ 970.329105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 970.371428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 970.412165] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 970.419411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 970.435685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 970.468645] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 970.475925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 970.487470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 970.849456] bridge0: port 2(bridge_slave_1) entered blocking state [ 970.855863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 970.862543] bridge0: port 1(bridge_slave_0) entered blocking state [ 970.868955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 970.876545] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 971.039174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 971.801755] 8021q: adding VLAN 0 to HW filter on device bond0 [ 971.889364] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 971.977235] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 971.983461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 971.991318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 972.074823] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:22 executing program 4: mkdir(&(0x7f00000001c0)='./control\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000100)='./control\x00', &(0x7f0000000140)=@known='security.capability\x00', &(0x7f0000000180)=""/20, 0x14) 2018/04/16 23:21:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x4, {0x2}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/16 23:21:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000f10ffc)=0x3f, 0x4) bind$inet6(r1, &(0x7f0000cb8fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x47) r2 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/16 23:21:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) write(r1, &(0x7f0000000000)="791f7dfde08186d67dba3f649a7ba85e30", 0x11) 2018/04/16 23:21:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='oom_score_adj\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000cac000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001800)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000002040)=""/4096}, &(0x7f0000000180)=0x78) ioprio_get$pid(0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) truncate(&(0x7f0000001180)='./bus\x00', 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r3, r2, &(0x7f00000010c0), 0x10000065) tkill(0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001640)={0x1ff, {0x2, 0x4e21}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e20, @multicast2=0xe0000002}, 0x0, 0x9, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000001240)='teql0\x00', 0x0, 0x80}) inotify_rm_watch(0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(0x0, 0x2, 0x10) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001700)) syz_fuseblk_mount(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x3ff, 0x1, 0x0) 2018/04/16 23:21:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='oom_score_adj\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000cac000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001800)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000002040)=""/4096}, &(0x7f0000000180)=0x78) ioprio_get$pid(0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) truncate(&(0x7f0000001180)='./bus\x00', 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r3, r2, &(0x7f00000010c0), 0x10000065) tkill(0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001640)={0x1ff, {0x2, 0x4e21}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e20, @multicast2=0xe0000002}, 0x0, 0x9, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000001240)='teql0\x00', 0x0, 0x80}) inotify_rm_watch(0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(0x0, 0x2, 0x10) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001700)) syz_fuseblk_mount(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x3ff, 0x1, 0x0) 2018/04/16 23:21:22 executing program 6: perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/207, 0xcf, 0x0) 2018/04/16 23:21:22 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='oom_score_adj\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000cac000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001800)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000002040)=""/4096}, &(0x7f0000000180)=0x78) ioprio_get$pid(0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) truncate(&(0x7f0000001180)='./bus\x00', 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r3, r2, &(0x7f00000010c0), 0x10000065) tkill(0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001640)={0x1ff, {0x2, 0x4e21}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e20, @multicast2=0xe0000002}, 0x0, 0x9, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000001240)='teql0\x00', 0x0, 0x80}) inotify_rm_watch(0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(0x0, 0x2, 0x10) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001700)) syz_fuseblk_mount(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x3ff, 0x1, 0x0) 2018/04/16 23:21:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000f10ffc)=0x3f, 0x4) bind$inet6(r1, &(0x7f0000cb8fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x47) r2 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/16 23:21:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) write(r1, &(0x7f0000000000)="791f7dfde08186d67dba3f649a7ba85e30", 0x11) 2018/04/16 23:21:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x4, {0x2}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/16 23:21:22 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000037fe8)=[{{}, 0x1, 0x80, 0x2}, {}], 0x30) 2018/04/16 23:21:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) write(r1, &(0x7f0000000000)="791f7dfde08186d67dba3f649a7ba85e30", 0x11) 2018/04/16 23:21:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000240)="370f32ba2000b001ee0f01c9baf80c66b810813a8e66efbafc0ced66b8010000000f01c1360f01cf670f200766b9800000c00f326635010000000f30673e662e660cee", 0x43}], 0x1, 0x0, &(0x7f0000000080), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r3, 0xaeb7) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f00000001c0)="c441c1dba20068000066baf80cb8c65f4f8aef66bafc0c66b8dc0366efc481f8ae583566b86c008ed0470f01ee66bad004b800000000efac66b8fd000f00d80f01df0f35", 0x44}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2018/04/16 23:21:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) write(r1, &(0x7f0000000000)="791f7dfde08186d67dba3f649a7ba85e30", 0x11) 2018/04/16 23:21:22 executing program 7: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="20cbef000500010005000000001c08108f13", 0x12, 0x400}], 0x40, 0x0) [ 972.855537] device bridge_slave_1 left promiscuous mode [ 972.861220] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:21:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x4, {0x2}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/16 23:21:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000f10ffc)=0x3f, 0x4) bind$inet6(r1, &(0x7f0000cb8fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x47) r2 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/16 23:21:22 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000037fe8)=[{{}, 0x1, 0x80, 0x2}, {}], 0x30) [ 972.928737] device bridge_slave_0 left promiscuous mode [ 972.934371] bridge0: port 1(bridge_slave_0) entered disabled state [ 973.000387] MINIX-fs: bad superblock or unable to read bitmaps [ 973.052477] MINIX-fs: bad superblock or unable to read bitmaps [ 973.071096] IPVS: ftp: loaded support on port[0] = 21 [ 973.139626] team0 (unregistering): Port device team_slave_1 removed [ 973.151481] team0 (unregistering): Port device team_slave_0 removed [ 973.161720] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 973.177747] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 973.205196] bond0 (unregistering): Released all slaves [ 973.840430] bridge0: port 1(bridge_slave_0) entered blocking state [ 973.846869] bridge0: port 1(bridge_slave_0) entered disabled state [ 973.854256] device bridge_slave_0 entered promiscuous mode [ 973.893302] bridge0: port 2(bridge_slave_1) entered blocking state [ 973.899747] bridge0: port 2(bridge_slave_1) entered disabled state [ 973.907621] device bridge_slave_1 entered promiscuous mode [ 973.948006] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 973.986669] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 974.100607] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 974.141652] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 974.324858] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 974.332135] team0: Port device team_slave_0 added [ 974.360416] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 974.367691] team0: Port device team_slave_1 added [ 974.404155] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 974.446528] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 974.476348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 974.517546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 974.780495] bridge0: port 2(bridge_slave_1) entered blocking state [ 974.786927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 974.793593] bridge0: port 1(bridge_slave_0) entered blocking state [ 974.799971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 974.807358] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 975.692798] 8021q: adding VLAN 0 to HW filter on device bond0 [ 975.711182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 975.783962] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 975.871516] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 975.877731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 975.885595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 975.967322] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:26 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000037fe8)=[{{}, 0x1, 0x80, 0x2}, {}], 0x30) 2018/04/16 23:21:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) write(r1, &(0x7f0000000000)="791f7dfde08186d67dba3f649a7ba85e30", 0x11) 2018/04/16 23:21:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000f10ffc)=0x3f, 0x4) bind$inet6(r1, &(0x7f0000cb8fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x47) r2 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/16 23:21:26 executing program 7: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="20cbef000500010005000000001c08108f13", 0x12, 0x400}], 0x40, 0x0) 2018/04/16 23:21:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000240)="370f32ba2000b001ee0f01c9baf80c66b810813a8e66efbafc0ced66b8010000000f01c1360f01cf670f200766b9800000c00f326635010000000f30673e662e660cee", 0x43}], 0x1, 0x0, &(0x7f0000000080), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r3, 0xaeb7) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f00000001c0)="c441c1dba20068000066baf80cb8c65f4f8aef66bafc0c66b8dc0366efc481f8ae583566b86c008ed0470f01ee66bad004b800000000efac66b8fd000f00d80f01df0f35", 0x44}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2018/04/16 23:21:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='oom_score_adj\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000cac000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001800)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000002040)=""/4096}, &(0x7f0000000180)=0x78) ioprio_get$pid(0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) truncate(&(0x7f0000001180)='./bus\x00', 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r3, r2, &(0x7f00000010c0), 0x10000065) tkill(0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001640)={0x1ff, {0x2, 0x4e21}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e20, @multicast2=0xe0000002}, 0x0, 0x9, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000001240)='teql0\x00', 0x0, 0x80}) inotify_rm_watch(0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(0x0, 0x2, 0x10) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001700)) syz_fuseblk_mount(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x3ff, 0x1, 0x0) 2018/04/16 23:21:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000ce7fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendto(r1, &(0x7f0000000140)="ef00fffff7ba09000000000008006a3f99f2179f3bf02de9e6c0ab2fa5a4f0acd00e06d9052a673d7e9ca737eb889792e8ee852bb83705b6dc33250a8d0e973f7f1def197c6a0ad954fae54120736c03b1cb0e9f2bd69aed8359561bbad23477", 0x60, 0x0, &(0x7f000007b000)=@can={0x1d}, 0x80) recvmsg(r1, &(0x7f0000000000)={&(0x7f000076c000)=@hci, 0x80, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x62}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/16 23:21:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) write(r1, &(0x7f0000000000)="791f7dfde08186d67dba3f649a7ba85e30", 0x11) [ 976.565411] MINIX-fs: bad superblock or unable to read bitmaps 2018/04/16 23:21:26 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000037fe8)=[{{}, 0x1, 0x80, 0x2}, {}], 0x30) 2018/04/16 23:21:26 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x3, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x18}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x78}, 0x1}, 0x0) 2018/04/16 23:21:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00007a0000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300), 0x0) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) 2018/04/16 23:21:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000500)={0x2c15c010}) 2018/04/16 23:21:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000ce7fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendto(r1, &(0x7f0000000140)="ef00fffff7ba09000000000008006a3f99f2179f3bf02de9e6c0ab2fa5a4f0acd00e06d9052a673d7e9ca737eb889792e8ee852bb83705b6dc33250a8d0e973f7f1def197c6a0ad954fae54120736c03b1cb0e9f2bd69aed8359561bbad23477", 0x60, 0x0, &(0x7f000007b000)=@can={0x1d}, 0x80) recvmsg(r1, &(0x7f0000000000)={&(0x7f000076c000)=@hci, 0x80, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x62}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/16 23:21:26 executing program 7: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="20cbef000500010005000000001c08108f13", 0x12, 0x400}], 0x40, 0x0) 2018/04/16 23:21:26 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000800)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000900)=0x0) r5 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000940)={{0x1, r1, 0x0, r2, r3, 0x40, 0x20}, 0x7, 0x0, 0x3, 0x9, r4, r5, 0x401}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000240)="34620933e231db2c8a30e8cce6c7c24c80da5473bb7bc712b7a300b75a0e35b91ee08a464db51e91d290125cbd3b25398dade7f031f69f2caa8236eb6688893bb766adc4aeea1f9b79") fcntl$lock(r0, 0x7, &(0x7f0000000580)={0x3, 0x0, 0x7fffffff}) r6 = syz_open_dev$mouse(&(0x7f00000009c0)='/dev/input/mouse#\x00', 0x0, 0x401) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000ac0)={0x1, &(0x7f0000000a00)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000b00)={r7, 0x4}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000b40)={r6}) sysinfo(&(0x7f0000000bc0)=""/188) r8 = socket(0x1e, 0x1000000000005, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x3, 0x2, &(0x7f00000000c0)=@raw=[@exit={0x95}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xb9, &(0x7f00000012c0)=""/185, 0x0, 0x0, [], r9}, 0x48) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r10, 0x9205, 0x0) [ 976.772391] device bridge_slave_1 left promiscuous mode [ 976.778125] bridge0: port 2(bridge_slave_1) entered disabled state [ 976.791907] MINIX-fs: bad superblock or unable to read bitmaps 2018/04/16 23:21:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000240)="370f32ba2000b001ee0f01c9baf80c66b810813a8e66efbafc0ced66b8010000000f01c1360f01cf670f200766b9800000c00f326635010000000f30673e662e660cee", 0x43}], 0x1, 0x0, &(0x7f0000000080), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r3, 0xaeb7) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f00000001c0)="c441c1dba20068000066baf80cb8c65f4f8aef66bafc0c66b8dc0366efc481f8ae583566b86c008ed0470f01ee66bad004b800000000efac66b8fd000f00d80f01df0f35", 0x44}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2018/04/16 23:21:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000500)={0x2c15c010}) [ 976.869799] device bridge_slave_0 left promiscuous mode [ 976.875529] bridge0: port 1(bridge_slave_0) entered disabled state [ 976.966298] IPVS: ftp: loaded support on port[0] = 21 [ 977.035548] team0 (unregistering): Port device team_slave_1 removed [ 977.045902] team0 (unregistering): Port device team_slave_0 removed [ 977.055910] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 977.074717] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 977.103275] bond0 (unregistering): Released all slaves [ 977.736546] bridge0: port 1(bridge_slave_0) entered blocking state [ 977.743011] bridge0: port 1(bridge_slave_0) entered disabled state [ 977.750985] device bridge_slave_0 entered promiscuous mode [ 977.791653] bridge0: port 2(bridge_slave_1) entered blocking state [ 977.798109] bridge0: port 2(bridge_slave_1) entered disabled state [ 977.806063] device bridge_slave_1 entered promiscuous mode [ 977.845567] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 977.883959] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 978.001375] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 978.044294] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 978.216515] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 978.223937] team0: Port device team_slave_0 added [ 978.262255] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 978.269629] team0: Port device team_slave_1 added [ 978.299925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 978.341414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 978.377875] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 978.384991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 978.393683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 978.415446] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 978.422572] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 978.431198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 978.676420] bridge0: port 2(bridge_slave_1) entered blocking state [ 978.682865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 978.689524] bridge0: port 1(bridge_slave_0) entered blocking state [ 978.695925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 978.703339] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 978.767159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 979.613104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 979.702561] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 979.790945] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 979.797376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 979.805255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 979.889400] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000800)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000900)=0x0) r5 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000940)={{0x1, r1, 0x0, r2, r3, 0x40, 0x20}, 0x7, 0x0, 0x3, 0x9, r4, r5, 0x401}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000240)="34620933e231db2c8a30e8cce6c7c24c80da5473bb7bc712b7a300b75a0e35b91ee08a464db51e91d290125cbd3b25398dade7f031f69f2caa8236eb6688893bb766adc4aeea1f9b79") fcntl$lock(r0, 0x7, &(0x7f0000000580)={0x3, 0x0, 0x7fffffff}) r6 = syz_open_dev$mouse(&(0x7f00000009c0)='/dev/input/mouse#\x00', 0x0, 0x401) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000ac0)={0x1, &(0x7f0000000a00)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000b00)={r7, 0x4}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000b40)={r6}) sysinfo(&(0x7f0000000bc0)=""/188) r8 = socket(0x1e, 0x1000000000005, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x3, 0x2, &(0x7f00000000c0)=@raw=[@exit={0x95}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xb9, &(0x7f00000012c0)=""/185, 0x0, 0x0, [], r9}, 0x48) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r10, 0x9205, 0x0) 2018/04/16 23:21:30 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x3, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x18}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x78}, 0x1}, 0x0) 2018/04/16 23:21:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000ce7fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendto(r1, &(0x7f0000000140)="ef00fffff7ba09000000000008006a3f99f2179f3bf02de9e6c0ab2fa5a4f0acd00e06d9052a673d7e9ca737eb889792e8ee852bb83705b6dc33250a8d0e973f7f1def197c6a0ad954fae54120736c03b1cb0e9f2bd69aed8359561bbad23477", 0x60, 0x0, &(0x7f000007b000)=@can={0x1d}, 0x80) recvmsg(r1, &(0x7f0000000000)={&(0x7f000076c000)=@hci, 0x80, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x62}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/16 23:21:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00007a0000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300), 0x0) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) 2018/04/16 23:21:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000500)={0x2c15c010}) 2018/04/16 23:21:30 executing program 7: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="20cbef000500010005000000001c08108f13", 0x12, 0x400}], 0x40, 0x0) 2018/04/16 23:21:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000240)="370f32ba2000b001ee0f01c9baf80c66b810813a8e66efbafc0ced66b8010000000f01c1360f01cf670f200766b9800000c00f326635010000000f30673e662e660cee", 0x43}], 0x1, 0x0, &(0x7f0000000080), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r3, 0xaeb7) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f00000001c0)="c441c1dba20068000066baf80cb8c65f4f8aef66bafc0c66b8dc0366efc481f8ae583566b86c008ed0470f01ee66bad004b800000000efac66b8fd000f00d80f01df0f35", 0x44}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2018/04/16 23:21:30 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000800)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000900)=0x0) r5 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000940)={{0x1, r1, 0x0, r2, r3, 0x40, 0x20}, 0x7, 0x0, 0x3, 0x9, r4, r5, 0x401}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000240)="34620933e231db2c8a30e8cce6c7c24c80da5473bb7bc712b7a300b75a0e35b91ee08a464db51e91d290125cbd3b25398dade7f031f69f2caa8236eb6688893bb766adc4aeea1f9b79") fcntl$lock(r0, 0x7, &(0x7f0000000580)={0x3, 0x0, 0x7fffffff}) r6 = syz_open_dev$mouse(&(0x7f00000009c0)='/dev/input/mouse#\x00', 0x0, 0x401) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000ac0)={0x1, &(0x7f0000000a00)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000b00)={r7, 0x4}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000b40)={r6}) sysinfo(&(0x7f0000000bc0)=""/188) r8 = socket(0x1e, 0x1000000000005, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x3, 0x2, &(0x7f00000000c0)=@raw=[@exit={0x95}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xb9, &(0x7f00000012c0)=""/185, 0x0, 0x0, [], r9}, 0x48) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r10, 0x9205, 0x0) 2018/04/16 23:21:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000500)={0x2c15c010}) 2018/04/16 23:21:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00007a0000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300), 0x0) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) [ 980.541661] MINIX-fs: bad superblock or unable to read bitmaps 2018/04/16 23:21:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000800)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000900)=0x0) r5 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000940)={{0x1, r1, 0x0, r2, r3, 0x40, 0x20}, 0x7, 0x0, 0x3, 0x9, r4, r5, 0x401}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000240)="34620933e231db2c8a30e8cce6c7c24c80da5473bb7bc712b7a300b75a0e35b91ee08a464db51e91d290125cbd3b25398dade7f031f69f2caa8236eb6688893bb766adc4aeea1f9b79") fcntl$lock(r0, 0x7, &(0x7f0000000580)={0x3, 0x0, 0x7fffffff}) r6 = syz_open_dev$mouse(&(0x7f00000009c0)='/dev/input/mouse#\x00', 0x0, 0x401) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000ac0)={0x1, &(0x7f0000000a00)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000b00)={r7, 0x4}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000b40)={r6}) sysinfo(&(0x7f0000000bc0)=""/188) r8 = socket(0x1e, 0x1000000000005, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x3, 0x2, &(0x7f00000000c0)=@raw=[@exit={0x95}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xb9, &(0x7f00000012c0)=""/185, 0x0, 0x0, [], r9}, 0x48) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r10, 0x9205, 0x0) 2018/04/16 23:21:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000ce7fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendto(r1, &(0x7f0000000140)="ef00fffff7ba09000000000008006a3f99f2179f3bf02de9e6c0ab2fa5a4f0acd00e06d9052a673d7e9ca737eb889792e8ee852bb83705b6dc33250a8d0e973f7f1def197c6a0ad954fae54120736c03b1cb0e9f2bd69aed8359561bbad23477", 0x60, 0x0, &(0x7f000007b000)=@can={0x1d}, 0x80) recvmsg(r1, &(0x7f0000000000)={&(0x7f000076c000)=@hci, 0x80, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x62}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/16 23:21:30 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000800)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000900)=0x0) r5 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000940)={{0x1, r1, 0x0, r2, r3, 0x40, 0x20}, 0x7, 0x0, 0x3, 0x9, r4, r5, 0x401}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000240)="34620933e231db2c8a30e8cce6c7c24c80da5473bb7bc712b7a300b75a0e35b91ee08a464db51e91d290125cbd3b25398dade7f031f69f2caa8236eb6688893bb766adc4aeea1f9b79") fcntl$lock(r0, 0x7, &(0x7f0000000580)={0x3, 0x0, 0x7fffffff}) r6 = syz_open_dev$mouse(&(0x7f00000009c0)='/dev/input/mouse#\x00', 0x0, 0x401) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000ac0)={0x1, &(0x7f0000000a00)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000b00)={r7, 0x4}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000b40)={r6}) sysinfo(&(0x7f0000000bc0)=""/188) r8 = socket(0x1e, 0x1000000000005, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x3, 0x2, &(0x7f00000000c0)=@raw=[@exit={0x95}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xb9, &(0x7f00000012c0)=""/185, 0x0, 0x0, [], r9}, 0x48) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r10, 0x9205, 0x0) 2018/04/16 23:21:30 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00007a0000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300), 0x0) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) 2018/04/16 23:21:30 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x3, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x18}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x78}, 0x1}, 0x0) [ 980.748825] device bridge_slave_1 left promiscuous mode [ 980.754616] bridge0: port 2(bridge_slave_1) entered disabled state [ 980.793307] IPVS: ftp: loaded support on port[0] = 21 [ 980.820510] device bridge_slave_0 left promiscuous mode [ 980.826338] bridge0: port 1(bridge_slave_0) entered disabled state [ 980.918282] team0 (unregistering): Port device team_slave_1 removed [ 980.928585] team0 (unregistering): Port device team_slave_0 removed [ 980.940163] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 980.959745] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 980.992721] bond0 (unregistering): Released all slaves [ 981.642718] bridge0: port 1(bridge_slave_0) entered blocking state [ 981.649188] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.656614] device bridge_slave_0 entered promiscuous mode [ 981.697974] bridge0: port 2(bridge_slave_1) entered blocking state [ 981.704440] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.712507] device bridge_slave_1 entered promiscuous mode [ 981.751326] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 981.790755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 981.906461] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 981.951622] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 982.026800] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 982.033760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 982.129159] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 982.136912] team0: Port device team_slave_0 added [ 982.173052] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 982.180343] team0: Port device team_slave_1 added [ 982.214828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 982.255874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 982.286985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 982.294247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 982.302748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 982.323622] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 982.330875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 982.339468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 982.574136] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.580539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 982.587204] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.593575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 982.601407] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 983.072502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 983.509076] 8021q: adding VLAN 0 to HW filter on device bond0 [ 983.598335] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 983.685691] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 983.691936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 983.700578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 983.784974] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:34 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00007a0000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300), 0x0) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) 2018/04/16 23:21:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00007a0000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300), 0x0) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) 2018/04/16 23:21:34 executing program 0: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00007fcffa)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) unshare(0x200) chdir(&(0x7f0000bddc23)='./file0\x00') poll(&(0x7f00006cd000), 0x0, 0xfffffffffffffffa) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00007d7ff8)='./file0\x00') pivot_root(&(0x7f00000e6ff8)='./file0\x00', &(0x7f0000451000)='./file0\x00') 2018/04/16 23:21:34 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000800)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000900)=0x0) r5 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000940)={{0x1, r1, 0x0, r2, r3, 0x40, 0x20}, 0x7, 0x0, 0x3, 0x9, r4, r5, 0x401}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000240)="34620933e231db2c8a30e8cce6c7c24c80da5473bb7bc712b7a300b75a0e35b91ee08a464db51e91d290125cbd3b25398dade7f031f69f2caa8236eb6688893bb766adc4aeea1f9b79") fcntl$lock(r0, 0x7, &(0x7f0000000580)={0x3, 0x0, 0x7fffffff}) r6 = syz_open_dev$mouse(&(0x7f00000009c0)='/dev/input/mouse#\x00', 0x0, 0x401) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000ac0)={0x1, &(0x7f0000000a00)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000b00)={r7, 0x4}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000b40)={r6}) sysinfo(&(0x7f0000000bc0)=""/188) r8 = socket(0x1e, 0x1000000000005, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x3, 0x2, &(0x7f00000000c0)=@raw=[@exit={0x95}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xb9, &(0x7f00000012c0)=""/185, 0x0, 0x0, [], r9}, 0x48) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r10, 0x9205, 0x0) 2018/04/16 23:21:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000800)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000900)=0x0) r5 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000940)={{0x1, r1, 0x0, r2, r3, 0x40, 0x20}, 0x7, 0x0, 0x3, 0x9, r4, r5, 0x401}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000240)="34620933e231db2c8a30e8cce6c7c24c80da5473bb7bc712b7a300b75a0e35b91ee08a464db51e91d290125cbd3b25398dade7f031f69f2caa8236eb6688893bb766adc4aeea1f9b79") fcntl$lock(r0, 0x7, &(0x7f0000000580)={0x3, 0x0, 0x7fffffff}) r6 = syz_open_dev$mouse(&(0x7f00000009c0)='/dev/input/mouse#\x00', 0x0, 0x401) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000ac0)={0x1, &(0x7f0000000a00)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000b00)={r7, 0x4}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000b40)={r6}) sysinfo(&(0x7f0000000bc0)=""/188) r8 = socket(0x1e, 0x1000000000005, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x3, 0x2, &(0x7f00000000c0)=@raw=[@exit={0x95}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xb9, &(0x7f00000012c0)=""/185, 0x0, 0x0, [], r9}, 0x48) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r10, 0x9205, 0x0) 2018/04/16 23:21:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000800)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000900)=0x0) r5 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000940)={{0x1, r1, 0x0, r2, r3, 0x40, 0x20}, 0x7, 0x0, 0x3, 0x9, r4, r5, 0x401}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000240)="34620933e231db2c8a30e8cce6c7c24c80da5473bb7bc712b7a300b75a0e35b91ee08a464db51e91d290125cbd3b25398dade7f031f69f2caa8236eb6688893bb766adc4aeea1f9b79") fcntl$lock(r0, 0x7, &(0x7f0000000580)={0x3, 0x0, 0x7fffffff}) r6 = syz_open_dev$mouse(&(0x7f00000009c0)='/dev/input/mouse#\x00', 0x0, 0x401) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000ac0)={0x1, &(0x7f0000000a00)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000b00)={r7, 0x4}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000b40)={r6}) sysinfo(&(0x7f0000000bc0)=""/188) r8 = socket(0x1e, 0x1000000000005, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x3, 0x2, &(0x7f00000000c0)=@raw=[@exit={0x95}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xb9, &(0x7f00000012c0)=""/185, 0x0, 0x0, [], r9}, 0x48) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r10, 0x9205, 0x0) 2018/04/16 23:21:34 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x3, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x18}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x78}, 0x1}, 0x0) 2018/04/16 23:21:34 executing program 3: mkdir(&(0x7f0000000100)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000010000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000180)='./control/file0\x00') pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)='./control\x00') rmdir(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/04/16 23:21:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000307ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f00000001c0), 0x0, r2}) dup2(r0, r1) 2018/04/16 23:21:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000800)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000900)=0x0) r5 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000940)={{0x1, r1, 0x0, r2, r3, 0x40, 0x20}, 0x7, 0x0, 0x3, 0x9, r4, r5, 0x401}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000240)="34620933e231db2c8a30e8cce6c7c24c80da5473bb7bc712b7a300b75a0e35b91ee08a464db51e91d290125cbd3b25398dade7f031f69f2caa8236eb6688893bb766adc4aeea1f9b79") fcntl$lock(r0, 0x7, &(0x7f0000000580)={0x3, 0x0, 0x7fffffff}) r6 = syz_open_dev$mouse(&(0x7f00000009c0)='/dev/input/mouse#\x00', 0x0, 0x401) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000ac0)={0x1, &(0x7f0000000a00)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000b00)={r7, 0x4}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000b40)={r6}) sysinfo(&(0x7f0000000bc0)=""/188) r8 = socket(0x1e, 0x1000000000005, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x3, 0x2, &(0x7f00000000c0)=@raw=[@exit={0x95}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xb9, &(0x7f00000012c0)=""/185, 0x0, 0x0, [], r9}, 0x48) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r10, 0x9205, 0x0) 2018/04/16 23:21:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000212ff8)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000ebcffe)) setrlimit(0xc, &(0x7f0000000100)) creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) 2018/04/16 23:21:34 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00007a0000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300), 0x0) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) 2018/04/16 23:21:34 executing program 6: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000840)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800)={0xffffffff}, 0x111}}, 0x20) exit(0x0) write$rdma_cm(r0, &(0x7f0000000880)=@accept={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 2018/04/16 23:21:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000307ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f00000001c0), 0x0, r2}) dup2(r0, r1) [ 984.565320] device bridge_slave_1 left promiscuous mode [ 984.570987] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:21:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000212ff8)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000ebcffe)) setrlimit(0xc, &(0x7f0000000100)) creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) [ 984.615990] device bridge_slave_0 left promiscuous mode [ 984.621664] bridge0: port 1(bridge_slave_0) entered disabled state [ 984.710865] IPVS: ftp: loaded support on port[0] = 21 [ 984.725977] team0 (unregistering): Port device team_slave_1 removed [ 984.737960] team0 (unregistering): Port device team_slave_0 removed [ 984.748475] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 984.762082] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 984.794161] bond0 (unregistering): Released all slaves [ 985.528099] bridge0: port 1(bridge_slave_0) entered blocking state [ 985.534521] bridge0: port 1(bridge_slave_0) entered disabled state [ 985.542397] device bridge_slave_0 entered promiscuous mode [ 985.580368] bridge0: port 2(bridge_slave_1) entered blocking state [ 985.586816] bridge0: port 2(bridge_slave_1) entered disabled state [ 985.594155] device bridge_slave_1 entered promiscuous mode [ 985.631889] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 985.669071] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 985.780740] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 985.821114] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 985.985922] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 985.993417] team0: Port device team_slave_0 added [ 986.031854] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 986.039177] team0: Port device team_slave_1 added [ 986.100244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 986.146565] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 986.184177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 986.221733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 986.523729] bridge0: port 2(bridge_slave_1) entered blocking state [ 986.530118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 986.536779] bridge0: port 1(bridge_slave_0) entered blocking state [ 986.543141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 986.550529] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 987.409978] 8021q: adding VLAN 0 to HW filter on device bond0 [ 987.423243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 987.495197] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 987.577382] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 987.583598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 987.591272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 987.670094] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:37 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000307ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f00000001c0), 0x0, r2}) dup2(r0, r1) 2018/04/16 23:21:37 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="0f2b94"], &(0x7f0000000240)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:21:37 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000212ff8)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000ebcffe)) setrlimit(0xc, &(0x7f0000000100)) creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) 2018/04/16 23:21:37 executing program 0: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00007fcffa)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) unshare(0x200) chdir(&(0x7f0000bddc23)='./file0\x00') poll(&(0x7f00006cd000), 0x0, 0xfffffffffffffffa) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00007d7ff8)='./file0\x00') pivot_root(&(0x7f00000e6ff8)='./file0\x00', &(0x7f0000451000)='./file0\x00') 2018/04/16 23:21:37 executing program 3: mkdir(&(0x7f0000000100)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000010000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000180)='./control/file0\x00') pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)='./control\x00') rmdir(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/04/16 23:21:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000006c0)={0x0, 0x1, 0x6, @random="667928c0b3b5"}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='ppp0/\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000800)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000900)=0x0) r5 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000940)={{0x1, r1, 0x0, r2, r3, 0x40, 0x20}, 0x7, 0x0, 0x3, 0x9, r4, r5, 0x401}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000240)="34620933e231db2c8a30e8cce6c7c24c80da5473bb7bc712b7a300b75a0e35b91ee08a464db51e91d290125cbd3b25398dade7f031f69f2caa8236eb6688893bb766adc4aeea1f9b79") fcntl$lock(r0, 0x7, &(0x7f0000000580)={0x3, 0x0, 0x7fffffff}) r6 = syz_open_dev$mouse(&(0x7f00000009c0)='/dev/input/mouse#\x00', 0x0, 0x401) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000ac0)={0x1, &(0x7f0000000a00)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000b00)={r7, 0x4}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000b40)={r6}) sysinfo(&(0x7f0000000bc0)=""/188) r8 = socket(0x1e, 0x1000000000005, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x3, 0x2, &(0x7f00000000c0)=@raw=[@exit={0x95}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xb9, &(0x7f00000012c0)=""/185, 0x0, 0x0, [], r9}, 0x48) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r10, 0x9205, 0x0) 2018/04/16 23:21:37 executing program 6: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000840)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800)={0xffffffff}, 0x111}}, 0x20) exit(0x0) write$rdma_cm(r0, &(0x7f0000000880)=@accept={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 2018/04/16 23:21:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000212ff8)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000ebcffe)) setrlimit(0xc, &(0x7f0000000100)) creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) 2018/04/16 23:21:38 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000307ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f00000001c0), 0x0, r2}) dup2(r0, r1) 2018/04/16 23:21:38 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="0f2b94"], &(0x7f0000000240)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 988.408260] IPVS: ftp: loaded support on port[0] = 21 [ 988.415297] device bridge_slave_1 left promiscuous mode [ 988.420990] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:21:38 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="0f2b94"], &(0x7f0000000240)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 988.456693] device bridge_slave_0 left promiscuous mode [ 988.462370] bridge0: port 1(bridge_slave_0) entered disabled state [ 988.530712] team0 (unregistering): Port device team_slave_1 removed [ 988.543415] team0 (unregistering): Port device team_slave_0 removed [ 988.554710] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 988.570240] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 988.600456] bond0 (unregistering): Released all slaves [ 989.334994] bridge0: port 1(bridge_slave_0) entered blocking state [ 989.341549] bridge0: port 1(bridge_slave_0) entered disabled state [ 989.349134] device bridge_slave_0 entered promiscuous mode [ 989.386446] bridge0: port 2(bridge_slave_1) entered blocking state [ 989.393148] bridge0: port 2(bridge_slave_1) entered disabled state [ 989.400708] device bridge_slave_1 entered promiscuous mode [ 989.438586] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 989.476214] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 989.589989] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 989.631501] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 989.670457] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 989.677411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 989.717135] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 989.724125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 989.830101] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 989.838410] team0: Port device team_slave_0 added [ 989.867422] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 989.874792] team0: Port device team_slave_1 added [ 989.911852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 989.947863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 989.976238] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 989.983339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 989.991910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 990.012682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 990.019786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 990.027805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 990.252641] bridge0: port 2(bridge_slave_1) entered blocking state [ 990.259076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 990.265725] bridge0: port 1(bridge_slave_0) entered blocking state [ 990.272097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 990.279443] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 990.687318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 991.120729] 8021q: adding VLAN 0 to HW filter on device bond0 [ 991.205437] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 991.287256] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 991.293477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 991.300607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 991.377438] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:41 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="0f2b94"], &(0x7f0000000240)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:21:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="0f2b94"], &(0x7f0000000240)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:21:41 executing program 6: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000840)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800)={0xffffffff}, 0x111}}, 0x20) exit(0x0) write$rdma_cm(r0, &(0x7f0000000880)=@accept={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "6678317a42f0afcaa5a4709107dd74ec84caa5a9c58f2ae940d3d277569c95c45ce6e8921cc6f737eae7d3e749d318bc23e817ea5bf77c14d3d91e7282559bf503355fb509d9060cdc8b1dbdebbb71392699be78c56d60f82523720b02723256b4da47354f53684801750b74bc90926eaf62afc5aa7d5e81540b2cbc6081f188b0789fc1e4465dd44de9e0ee1d8e9c2e7ab7695346bd80db8b674f5669453a6512b022db65a195661c68ea49ace732adbc2236406fcff68ff640e7b51e6c846a88f090301880f31e63bc0971b98d2a949bb103339afd79e442e0b8eff03c8cab7a743968422706959e5762a6b20a96be194cf30be1fd377cb62b4d9638b67e1e"}, r1}}, 0x128) 2018/04/16 23:21:41 executing program 4: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00007fcffa)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) unshare(0x200) chdir(&(0x7f0000bddc23)='./file0\x00') poll(&(0x7f00006cd000), 0x0, 0xfffffffffffffffa) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00007d7ff8)='./file0\x00') pivot_root(&(0x7f00000e6ff8)='./file0\x00', &(0x7f0000451000)='./file0\x00') 2018/04/16 23:21:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x491}]}) 2018/04/16 23:21:41 executing program 0: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00007fcffa)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) unshare(0x200) chdir(&(0x7f0000bddc23)='./file0\x00') poll(&(0x7f00006cd000), 0x0, 0xfffffffffffffffa) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00007d7ff8)='./file0\x00') pivot_root(&(0x7f00000e6ff8)='./file0\x00', &(0x7f0000451000)='./file0\x00') 2018/04/16 23:21:41 executing program 3: mkdir(&(0x7f0000000100)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000010000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000180)='./control/file0\x00') pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)='./control\x00') rmdir(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/04/16 23:21:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000040)=""/33) 2018/04/16 23:21:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x491}]}) 2018/04/16 23:21:41 executing program 7: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="400000000002000019000000dc0100002c000000010000000000010000000000002000000020000040000000edff00003d5cbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[]) 2018/04/16 23:21:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="0f2b94"], &(0x7f0000000240)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 992.067384] device bridge_slave_1 left promiscuous mode [ 992.073179] bridge0: port 2(bridge_slave_1) entered disabled state [ 992.098899] EXT4-fs (loop7): Invalid log block size: 65536 [ 992.106119] device bridge_slave_0 left promiscuous mode [ 992.111717] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:21:41 executing program 7: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="400000000002000019000000dc0100002c000000010000000000010000000000002000000020000040000000edff00003d5cbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[]) [ 992.144716] EXT4-fs (loop7): Invalid log block size: 65536 2018/04/16 23:21:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x491}]}) 2018/04/16 23:21:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="0f2b94"], &(0x7f0000000240)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 992.231323] EXT4-fs (loop7): Invalid log block size: 65536 [ 992.234278] IPVS: ftp: loaded support on port[0] = 21 [ 992.245071] team0 (unregistering): Port device team_slave_1 removed 2018/04/16 23:21:42 executing program 7: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="400000000002000019000000dc0100002c000000010000000000010000000000002000000020000040000000edff00003d5cbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[]) [ 992.283889] team0 (unregistering): Port device team_slave_0 removed [ 992.320915] bond0 (unregistering): Releasing backup interface bond_slave_1 2018/04/16 23:21:42 executing program 5: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xfffffffffffffff9, 0x40020011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$sock_SIOCGIFINDEX(r0, 0x8910, &(0x7f0000000000)={'bond0\x00'}) 2018/04/16 23:21:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x491}]}) [ 992.350371] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 992.378318] EXT4-fs (loop7): Invalid log block size: 65536 2018/04/16 23:21:42 executing program 7: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="400000000002000019000000dc0100002c000000010000000000010000000000002000000020000040000000edff00003d5cbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[]) [ 992.419138] binder_alloc: binder_alloc_mmap_handler: 7255 20000000-20002000 already mapped failed -16 [ 992.432552] bond0 (unregistering): Released all slaves [ 992.446260] binder: BINDER_SET_CONTEXT_MGR already set [ 992.459564] binder: 7255:7256 ioctl 40046207 0 returned -16 [ 992.468314] binder_alloc: 7255: binder_alloc_buf, no vma [ 992.474065] binder: 7255:7257 transaction failed 29189/-3, size 40-0 line 2963 [ 992.512467] EXT4-fs (loop7): Invalid log block size: 65536 [ 992.573575] binder: release 7255:7256 transaction 176 out, still active [ 992.580569] binder: undelivered TRANSACTION_COMPLETE [ 992.585765] binder: undelivered TRANSACTION_ERROR: 29189 [ 992.591275] binder: send failed reply for transaction 176, target dead [ 993.214792] bridge0: port 1(bridge_slave_0) entered blocking state [ 993.221227] bridge0: port 1(bridge_slave_0) entered disabled state [ 993.229875] device bridge_slave_0 entered promiscuous mode [ 993.269877] bridge0: port 2(bridge_slave_1) entered blocking state [ 993.276303] bridge0: port 2(bridge_slave_1) entered disabled state [ 993.284275] device bridge_slave_1 entered promiscuous mode [ 993.323178] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 993.361446] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 993.473420] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 993.514220] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 993.689933] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 993.697877] team0: Port device team_slave_0 added [ 993.731340] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 993.738791] team0: Port device team_slave_1 added [ 993.777218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 993.820279] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 993.848692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 993.889520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 994.125931] bridge0: port 2(bridge_slave_1) entered blocking state [ 994.132343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 994.139006] bridge0: port 1(bridge_slave_0) entered blocking state [ 994.145404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 994.152793] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 994.975149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 994.985628] 8021q: adding VLAN 0 to HW filter on device bond0 [ 995.067588] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 995.154261] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 995.160451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 995.167702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 995.246054] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:45 executing program 6: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000840)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800)={0xffffffff}, 0x111}}, 0x20) exit(0x0) write$rdma_cm(r0, &(0x7f0000000880)=@accept={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 2018/04/16 23:21:45 executing program 5: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xfffffffffffffff9, 0x40020011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$sock_SIOCGIFINDEX(r0, 0x8910, &(0x7f0000000000)={'bond0\x00'}) 2018/04/16 23:21:45 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) read$eventfd(r0, &(0x7f0000000040), 0xffffffc0) io_setup(0x9, &(0x7f0000000240)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)="10000000f0ffffffff00000000855da0", 0x10}]) 2018/04/16 23:21:45 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 2018/04/16 23:21:45 executing program 2: unshare(0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa}) r1 = dup(r0) syz_init_net_socket$llc(0x1a, 0x8004, 0x0) recvfrom$llc(r1, &(0x7f00000000c0)=""/71, 0x47, 0x40010003, &(0x7f0000000140)={0x1a, 0x1, 0x0, 0x0, 0x7209, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000003ff0)={&(0x7f0000011000/0x3000)=nil, 0x400000}) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x1) socket$vsock_stream(0x28, 0x1, 0x0) symlink(&(0x7f000000bffa)='./control\x00', &(0x7f0000000040)='./bus\x00') symlink(&(0x7f0000ad9ff4)='./bus/file0\x00', &(0x7f0000ee1ff6)='./control\x00') syz_fuse_mount(&(0x7f0000000000)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x4000008006) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f0000000080)="03", 0x1) 2018/04/16 23:21:45 executing program 4: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00007fcffa)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) unshare(0x200) chdir(&(0x7f0000bddc23)='./file0\x00') poll(&(0x7f00006cd000), 0x0, 0xfffffffffffffffa) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00007d7ff8)='./file0\x00') pivot_root(&(0x7f00000e6ff8)='./file0\x00', &(0x7f0000451000)='./file0\x00') 2018/04/16 23:21:45 executing program 3: mkdir(&(0x7f0000000100)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000010000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000180)='./control/file0\x00') pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)='./control\x00') rmdir(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/04/16 23:21:45 executing program 0: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00007fcffa)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) unshare(0x200) chdir(&(0x7f0000bddc23)='./file0\x00') poll(&(0x7f00006cd000), 0x0, 0xfffffffffffffffa) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00007d7ff8)='./file0\x00') pivot_root(&(0x7f00000e6ff8)='./file0\x00', &(0x7f0000451000)='./file0\x00') 2018/04/16 23:21:45 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 2018/04/16 23:21:45 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) read$eventfd(r0, &(0x7f0000000040), 0xffffffc0) io_setup(0x9, &(0x7f0000000240)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)="10000000f0ffffffff00000000855da0", 0x10}]) 2018/04/16 23:21:45 executing program 5: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xfffffffffffffff9, 0x40020011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$sock_SIOCGIFINDEX(r0, 0x8910, &(0x7f0000000000)={'bond0\x00'}) [ 995.870400] binder: release 7531:7532 transaction 179 out, still active [ 995.877320] binder: undelivered TRANSACTION_COMPLETE [ 995.882519] binder: send failed reply for transaction 179, target dead 2018/04/16 23:21:45 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 2018/04/16 23:21:45 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) read$eventfd(r0, &(0x7f0000000040), 0xffffffc0) io_setup(0x9, &(0x7f0000000240)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)="10000000f0ffffffff00000000855da0", 0x10}]) 2018/04/16 23:21:45 executing program 5: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xfffffffffffffff9, 0x40020011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$sock_SIOCGIFINDEX(r0, 0x8910, &(0x7f0000000000)={'bond0\x00'}) [ 995.945291] device bridge_slave_1 left promiscuous mode [ 995.951011] bridge0: port 2(bridge_slave_1) entered disabled state [ 995.969154] binder: release 7552:7553 transaction 181 out, still active [ 995.976079] binder: undelivered TRANSACTION_COMPLETE [ 995.981265] binder: send failed reply for transaction 181, target dead 2018/04/16 23:21:45 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) [ 996.003510] device bridge_slave_0 left promiscuous mode [ 996.009196] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:21:45 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) read$eventfd(r0, &(0x7f0000000040), 0xffffffc0) io_setup(0x9, &(0x7f0000000240)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)="10000000f0ffffffff00000000855da0", 0x10}]) [ 996.074835] IPVS: ftp: loaded support on port[0] = 21 [ 996.083163] binder: release 7559:7561 transaction 183 out, still active [ 996.090084] binder: undelivered TRANSACTION_COMPLETE [ 996.095269] binder: send failed reply for transaction 183, target dead [ 996.134150] team0 (unregistering): Port device team_slave_1 removed [ 996.149225] team0 (unregistering): Port device team_slave_0 removed [ 996.159921] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 996.176825] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 996.207223] bond0 (unregistering): Released all slaves [ 996.906496] bridge0: port 1(bridge_slave_0) entered blocking state [ 996.912928] bridge0: port 1(bridge_slave_0) entered disabled state [ 996.921131] device bridge_slave_0 entered promiscuous mode [ 996.958688] bridge0: port 2(bridge_slave_1) entered blocking state [ 996.965118] bridge0: port 2(bridge_slave_1) entered disabled state [ 996.972418] device bridge_slave_1 entered promiscuous mode [ 997.010533] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 997.049289] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 997.160812] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 997.201736] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 997.275247] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 997.282197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 997.394700] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 997.402226] team0: Port device team_slave_0 added [ 997.439844] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 997.448675] team0: Port device team_slave_1 added [ 997.488445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 997.529006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 997.566659] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 997.573860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 997.589456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 997.622147] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 997.629222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 997.637327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 997.864214] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.870625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 997.877269] bridge0: port 1(bridge_slave_0) entered blocking state [ 997.883628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 997.891165] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 998.303136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 998.738067] 8021q: adding VLAN 0 to HW filter on device bond0 [ 998.820492] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 998.902747] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 998.908986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 998.916139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 998.996400] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:49 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r1}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r0}, 0x10) 2018/04/16 23:21:49 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000), 0xef) 2018/04/16 23:21:49 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x8000000007, &(0x7f0000000040)) fanotify_init(0x51, 0x0) userfaultfd(0x0) 2018/04/16 23:21:49 executing program 4: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00007fcffa)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) unshare(0x200) chdir(&(0x7f0000bddc23)='./file0\x00') poll(&(0x7f00006cd000), 0x0, 0xfffffffffffffffa) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00007d7ff8)='./file0\x00') pivot_root(&(0x7f00000e6ff8)='./file0\x00', &(0x7f0000451000)='./file0\x00') 2018/04/16 23:21:49 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) socket$kcm(0x29, 0x5, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21e}, 0x35e) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x29, 0x30, &(0x7f0000000180)) 2018/04/16 23:21:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x114, 0x200002714, &(0x7f0000000000)={@remote, @remote}, &(0x7f0000000080)=0xc) 2018/04/16 23:21:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, r1) 2018/04/16 23:21:49 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x7) connect$inet(r0, &(0x7f0000772000)={0x2}, 0x10) 2018/04/16 23:21:49 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000), 0xef) 2018/04/16 23:21:49 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x8000000007, &(0x7f0000000040)) fanotify_init(0x51, 0x0) userfaultfd(0x0) 2018/04/16 23:21:49 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x8000000007, &(0x7f0000000040)) fanotify_init(0x51, 0x0) userfaultfd(0x0) 2018/04/16 23:21:49 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) socket$kcm(0x29, 0x5, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21e}, 0x35e) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x29, 0x30, &(0x7f0000000180)) 2018/04/16 23:21:49 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r1}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r0}, 0x10) 2018/04/16 23:21:49 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x7) connect$inet(r0, &(0x7f0000772000)={0x2}, 0x10) [ 999.745121] device bridge_slave_1 left promiscuous mode [ 999.750796] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:21:49 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000), 0xef) 2018/04/16 23:21:49 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) socket$kcm(0x29, 0x5, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21e}, 0x35e) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x29, 0x30, &(0x7f0000000180)) 2018/04/16 23:21:49 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x8000000007, &(0x7f0000000040)) fanotify_init(0x51, 0x0) userfaultfd(0x0) 2018/04/16 23:21:49 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x8000000007, &(0x7f0000000040)) fanotify_init(0x51, 0x0) userfaultfd(0x0) [ 999.793314] device bridge_slave_0 left promiscuous mode [ 999.799199] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:21:49 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r1}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r0}, 0x10) [ 999.882432] IPVS: ftp: loaded support on port[0] = 21 [ 1000.004006] team0 (unregistering): Port device team_slave_1 removed [ 1000.016810] team0 (unregistering): Port device team_slave_0 removed [ 1000.029654] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1000.045954] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1000.074121] bond0 (unregistering): Released all slaves [ 1000.688165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1000.694590] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.702568] device bridge_slave_0 entered promiscuous mode [ 1000.740893] bridge0: port 2(bridge_slave_1) entered blocking state [ 1000.747331] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.755321] device bridge_slave_1 entered promiscuous mode [ 1000.794120] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1000.831063] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1000.940457] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1000.980464] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1001.151809] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1001.159806] team0: Port device team_slave_0 added [ 1001.194538] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1001.201922] team0: Port device team_slave_1 added [ 1001.239433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1001.279671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1001.309046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1001.348319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1001.587678] bridge0: port 2(bridge_slave_1) entered blocking state [ 1001.594082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1001.600724] bridge0: port 1(bridge_slave_0) entered blocking state [ 1001.607091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1001.614421] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1002.443428] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1002.523418] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1002.591504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1002.610940] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1002.617208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1002.624907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1002.701457] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:53 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r1}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r0}, 0x10) 2018/04/16 23:21:53 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x7) connect$inet(r0, &(0x7f0000772000)={0x2}, 0x10) 2018/04/16 23:21:53 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000), 0xef) 2018/04/16 23:21:53 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x8000000007, &(0x7f0000000040)) fanotify_init(0x51, 0x0) userfaultfd(0x0) 2018/04/16 23:21:53 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) socket$kcm(0x29, 0x5, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21e}, 0x35e) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x29, 0x30, &(0x7f0000000180)) 2018/04/16 23:21:53 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x8000000007, &(0x7f0000000040)) fanotify_init(0x51, 0x0) userfaultfd(0x0) 2018/04/16 23:21:53 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r1}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r0}, 0x10) 2018/04/16 23:21:53 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r1}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r0}, 0x10) 2018/04/16 23:21:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)='d', 0x1) r1 = dup(r0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000946ff8)={&(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_filter={0x0, 0x1a, @in6=@dev={0xfe, 0x80}, @in=@remote={0xac, 0x14, 0x14, 0xbb}}]}, 0xfffffdbe}, 0x1}, 0x0) recvmmsg(r2, &(0x7f00000026c0)=[{{&(0x7f0000001580)=@ethernet={0x0, @local}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, &(0x7f0000000140)) 2018/04/16 23:21:53 executing program 7: r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write(r0, &(0x7f0000000280)="e4", 0x1) sendfile(r0, r0, &(0x7f00009bcffe), 0x2000000000004c35) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0x80003ffd) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[{0x3, 0x80}, {0x2, 0x3f}, {0x0, 0x1}], 0x3) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x3, 0x4) 2018/04/16 23:21:53 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x7) connect$inet(r0, &(0x7f0000772000)={0x2}, 0x10) 2018/04/16 23:21:53 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 2018/04/16 23:21:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000200)="be", &(0x7f0000000300)=""/168}, 0x18) 2018/04/16 23:21:53 executing program 3: mkdir(&(0x7f0000062ff6)='./control\x00', 0x0) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f000003cff6)='./control\x00', 0x220001a1) symlink(&(0x7f0000000080)='./control/file0\x00', &(0x7f00000000c0)='./control/file0\x00') read(r0, &(0x7f0000000040)=""/32, 0xa7) 2018/04/16 23:21:53 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r1}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r0}, 0x10) [ 1003.477349] device bridge_slave_1 left promiscuous mode [ 1003.482969] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.529985] device bridge_slave_0 left promiscuous mode [ 1003.535729] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.592623] IPVS: ftp: loaded support on port[0] = 21 [ 1003.635258] team0 (unregistering): Port device team_slave_1 removed [ 1003.645583] team0 (unregistering): Port device team_slave_0 removed [ 1003.655335] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1003.672627] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1003.701985] bond0 (unregistering): Released all slaves [ 1004.413957] bridge0: port 1(bridge_slave_0) entered blocking state [ 1004.420466] bridge0: port 1(bridge_slave_0) entered disabled state [ 1004.428360] device bridge_slave_0 entered promiscuous mode [ 1004.469661] bridge0: port 2(bridge_slave_1) entered blocking state [ 1004.476124] bridge0: port 2(bridge_slave_1) entered disabled state [ 1004.504098] device bridge_slave_1 entered promiscuous mode [ 1004.543582] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1004.581328] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1004.693527] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1004.733735] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1004.775548] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1004.782492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1004.822099] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1004.829372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1004.931389] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1004.938874] team0: Port device team_slave_0 added [ 1004.974664] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1004.982146] team0: Port device team_slave_1 added [ 1005.015390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1005.053262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1005.091994] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1005.099293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1005.107828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1005.130254] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1005.137348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1005.145823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1005.366486] bridge0: port 2(bridge_slave_1) entered blocking state [ 1005.372886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1005.379530] bridge0: port 1(bridge_slave_0) entered blocking state [ 1005.385887] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1005.393234] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1005.791267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1006.206529] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1006.286115] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1006.364751] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1006.371321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1006.379196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1006.459395] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:21:56 executing program 3: mkdir(&(0x7f0000062ff6)='./control\x00', 0x0) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f000003cff6)='./control\x00', 0x220001a1) symlink(&(0x7f0000000080)='./control/file0\x00', &(0x7f00000000c0)='./control/file0\x00') read(r0, &(0x7f0000000040)=""/32, 0xa7) 2018/04/16 23:21:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000200)="be", &(0x7f0000000300)=""/168}, 0x18) 2018/04/16 23:21:56 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r1}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r0}, 0x10) 2018/04/16 23:21:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)='d', 0x1) r1 = dup(r0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000946ff8)={&(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_filter={0x0, 0x1a, @in6=@dev={0xfe, 0x80}, @in=@remote={0xac, 0x14, 0x14, 0xbb}}]}, 0xfffffdbe}, 0x1}, 0x0) recvmmsg(r2, &(0x7f00000026c0)=[{{&(0x7f0000001580)=@ethernet={0x0, @local}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, &(0x7f0000000140)) 2018/04/16 23:21:56 executing program 7: r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write(r0, &(0x7f0000000280)="e4", 0x1) sendfile(r0, r0, &(0x7f00009bcffe), 0x2000000000004c35) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0x80003ffd) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[{0x3, 0x80}, {0x2, 0x3f}, {0x0, 0x1}], 0x3) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x3, 0x4) 2018/04/16 23:21:56 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 2018/04/16 23:21:56 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r1}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r0}, 0x10) 2018/04/16 23:21:56 executing program 3: mkdir(&(0x7f0000062ff6)='./control\x00', 0x0) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f000003cff6)='./control\x00', 0x220001a1) symlink(&(0x7f0000000080)='./control/file0\x00', &(0x7f00000000c0)='./control/file0\x00') read(r0, &(0x7f0000000040)=""/32, 0xa7) 2018/04/16 23:21:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000200)="be", &(0x7f0000000300)=""/168}, 0x18) 2018/04/16 23:21:56 executing program 4: r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write(r0, &(0x7f0000000280)="e4", 0x1) sendfile(r0, r0, &(0x7f00009bcffe), 0x2000000000004c35) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0x80003ffd) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[{0x3, 0x80}, {0x2, 0x3f}, {0x0, 0x1}], 0x3) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x3, 0x4) 2018/04/16 23:21:56 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 2018/04/16 23:21:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000200)="be", &(0x7f0000000300)=""/168}, 0x18) 2018/04/16 23:21:56 executing program 3: mkdir(&(0x7f0000062ff6)='./control\x00', 0x0) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f000003cff6)='./control\x00', 0x220001a1) symlink(&(0x7f0000000080)='./control/file0\x00', &(0x7f00000000c0)='./control/file0\x00') read(r0, &(0x7f0000000040)=""/32, 0xa7) 2018/04/16 23:21:56 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) [ 1007.157963] device bridge_slave_1 left promiscuous mode [ 1007.163824] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.185111] device bridge_slave_0 left promiscuous mode [ 1007.190872] bridge0: port 1(bridge_slave_0) entered disabled state [ 1007.315539] team0 (unregistering): Port device team_slave_1 removed [ 1007.324266] IPVS: ftp: loaded support on port[0] = 21 [ 1007.344230] team0 (unregistering): Port device team_slave_0 removed [ 1007.356778] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1007.371563] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1007.404798] bond0 (unregistering): Released all slaves [ 1008.181594] bridge0: port 1(bridge_slave_0) entered blocking state [ 1008.188074] bridge0: port 1(bridge_slave_0) entered disabled state [ 1008.195956] device bridge_slave_0 entered promiscuous mode [ 1008.235467] bridge0: port 2(bridge_slave_1) entered blocking state [ 1008.241916] bridge0: port 2(bridge_slave_1) entered disabled state [ 1008.249771] device bridge_slave_1 entered promiscuous mode [ 1008.288118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1008.325888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1008.439916] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1008.481108] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1008.655945] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1008.663578] team0: Port device team_slave_0 added [ 1008.696473] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1008.703859] team0: Port device team_slave_1 added [ 1008.742431] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1008.775993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1008.814214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1008.854789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1009.084669] bridge0: port 2(bridge_slave_1) entered blocking state [ 1009.091080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1009.097730] bridge0: port 1(bridge_slave_0) entered blocking state [ 1009.104097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1009.111945] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1009.916549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1009.995739] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1010.016203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1010.089855] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1010.096166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1010.103563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1010.184817] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:00 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00005cfff6)='/dev/cuse\x00', 0x8010000080802, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000a4c000)=""/56, 0x38, 0x0) write$fuse(r0, &(0x7f000007c000)={0x58, 0x0, 0x1, @random="07000000000000000000e6065d86a61bf2b3b36e2713546deaa31b55dededda4847ff7bf2b3a8d3b874662bb74e794b2ee47ed46cd5ed34882afb9950b1b3dd332fdbf7b83919045"}, 0x58) 2018/04/16 23:22:00 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 2018/04/16 23:22:00 executing program 4: r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write(r0, &(0x7f0000000280)="e4", 0x1) sendfile(r0, r0, &(0x7f00009bcffe), 0x2000000000004c35) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0x80003ffd) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[{0x3, 0x80}, {0x2, 0x3f}, {0x0, 0x1}], 0x3) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x3, 0x4) 2018/04/16 23:22:00 executing program 7: r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write(r0, &(0x7f0000000280)="e4", 0x1) sendfile(r0, r0, &(0x7f00009bcffe), 0x2000000000004c35) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0x80003ffd) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[{0x3, 0x80}, {0x2, 0x3f}, {0x0, 0x1}], 0x3) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x3, 0x4) 2018/04/16 23:22:00 executing program 6: mkdir(&(0x7f0000062ff6)='./control\x00', 0x0) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f000003cff6)='./control\x00', 0x220001a1) symlink(&(0x7f0000000080)='./control/file0\x00', &(0x7f00000000c0)='./control/file0\x00') read(r0, &(0x7f0000000040)=""/32, 0xa7) 2018/04/16 23:22:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)='d', 0x1) r1 = dup(r0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000946ff8)={&(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_filter={0x0, 0x1a, @in6=@dev={0xfe, 0x80}, @in=@remote={0xac, 0x14, 0x14, 0xbb}}]}, 0xfffffdbe}, 0x1}, 0x0) recvmmsg(r2, &(0x7f00000026c0)=[{{&(0x7f0000001580)=@ethernet={0x0, @local}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, &(0x7f0000000140)) 2018/04/16 23:22:00 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r1}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r0}, 0x10) 2018/04/16 23:22:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt(r0, 0x88, 0x65, &(0x7f0000000280), 0x292) 2018/04/16 23:22:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt(r0, 0x88, 0x65, &(0x7f0000000280), 0x292) 2018/04/16 23:22:00 executing program 6: mkdir(&(0x7f0000062ff6)='./control\x00', 0x0) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f000003cff6)='./control\x00', 0x220001a1) symlink(&(0x7f0000000080)='./control/file0\x00', &(0x7f00000000c0)='./control/file0\x00') read(r0, &(0x7f0000000040)=""/32, 0xa7) 2018/04/16 23:22:00 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 2018/04/16 23:22:00 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00005cfff6)='/dev/cuse\x00', 0x8010000080802, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000a4c000)=""/56, 0x38, 0x0) write$fuse(r0, &(0x7f000007c000)={0x58, 0x0, 0x1, @random="07000000000000000000e6065d86a61bf2b3b36e2713546deaa31b55dededda4847ff7bf2b3a8d3b874662bb74e794b2ee47ed46cd5ed34882afb9950b1b3dd332fdbf7b83919045"}, 0x58) 2018/04/16 23:22:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt(r0, 0x88, 0x65, &(0x7f0000000280), 0x292) [ 1010.890647] device bridge_slave_1 left promiscuous mode [ 1010.896325] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:22:00 executing program 6: mkdir(&(0x7f0000062ff6)='./control\x00', 0x0) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f000003cff6)='./control\x00', 0x220001a1) symlink(&(0x7f0000000080)='./control/file0\x00', &(0x7f00000000c0)='./control/file0\x00') read(r0, &(0x7f0000000040)=""/32, 0xa7) 2018/04/16 23:22:00 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00005cfff6)='/dev/cuse\x00', 0x8010000080802, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000a4c000)=""/56, 0x38, 0x0) write$fuse(r0, &(0x7f000007c000)={0x58, 0x0, 0x1, @random="07000000000000000000e6065d86a61bf2b3b36e2713546deaa31b55dededda4847ff7bf2b3a8d3b874662bb74e794b2ee47ed46cd5ed34882afb9950b1b3dd332fdbf7b83919045"}, 0x58) [ 1010.970546] IPVS: ftp: loaded support on port[0] = 21 [ 1010.977864] device bridge_slave_0 left promiscuous mode [ 1010.983738] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:22:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt(r0, 0x88, 0x65, &(0x7f0000000280), 0x292) 2018/04/16 23:22:00 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) [ 1011.149385] team0 (unregistering): Port device team_slave_1 removed [ 1011.162864] team0 (unregistering): Port device team_slave_0 removed [ 1011.174710] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1011.190208] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1011.228046] bond0 (unregistering): Released all slaves [ 1011.947712] bridge0: port 1(bridge_slave_0) entered blocking state [ 1011.954144] bridge0: port 1(bridge_slave_0) entered disabled state [ 1011.961647] device bridge_slave_0 entered promiscuous mode [ 1012.000344] bridge0: port 2(bridge_slave_1) entered blocking state [ 1012.006840] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.018206] device bridge_slave_1 entered promiscuous mode [ 1012.055876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1012.094574] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1012.208289] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1012.250214] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1012.291198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1012.298192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1012.338964] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1012.345967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1012.456461] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1012.463915] team0: Port device team_slave_0 added [ 1012.500253] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1012.507772] team0: Port device team_slave_1 added [ 1012.542414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1012.583199] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1012.622373] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1012.629654] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1012.637844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1012.659544] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1012.666637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1012.675345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1012.899356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1012.905757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1012.912401] bridge0: port 1(bridge_slave_0) entered blocking state [ 1012.918777] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1012.926148] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1013.279354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1013.778137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1013.865633] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1013.951891] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1013.958145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1013.965829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1014.045101] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)='d', 0x1) r1 = dup(r0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000946ff8)={&(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_filter={0x0, 0x1a, @in6=@dev={0xfe, 0x80}, @in=@remote={0xac, 0x14, 0x14, 0xbb}}]}, 0xfffffdbe}, 0x1}, 0x0) recvmmsg(r2, &(0x7f00000026c0)=[{{&(0x7f0000001580)=@ethernet={0x0, @local}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, &(0x7f0000000140)) 2018/04/16 23:22:04 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00005cfff6)='/dev/cuse\x00', 0x8010000080802, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000a4c000)=""/56, 0x38, 0x0) write$fuse(r0, &(0x7f000007c000)={0x58, 0x0, 0x1, @random="07000000000000000000e6065d86a61bf2b3b36e2713546deaa31b55dededda4847ff7bf2b3a8d3b874662bb74e794b2ee47ed46cd5ed34882afb9950b1b3dd332fdbf7b83919045"}, 0x58) 2018/04/16 23:22:04 executing program 4: r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write(r0, &(0x7f0000000280)="e4", 0x1) sendfile(r0, r0, &(0x7f00009bcffe), 0x2000000000004c35) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0x80003ffd) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[{0x3, 0x80}, {0x2, 0x3f}, {0x0, 0x1}], 0x3) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x3, 0x4) 2018/04/16 23:22:04 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00005cfff6)='/dev/cuse\x00', 0x8010000080802, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000a4c000)=""/56, 0x38, 0x0) write$fuse(r0, &(0x7f000007c000)={0x58, 0x0, 0x1, @random="07000000000000000000e6065d86a61bf2b3b36e2713546deaa31b55dededda4847ff7bf2b3a8d3b874662bb74e794b2ee47ed46cd5ed34882afb9950b1b3dd332fdbf7b83919045"}, 0x58) 2018/04/16 23:22:04 executing program 7: r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write(r0, &(0x7f0000000280)="e4", 0x1) sendfile(r0, r0, &(0x7f00009bcffe), 0x2000000000004c35) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0x80003ffd) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[{0x3, 0x80}, {0x2, 0x3f}, {0x0, 0x1}], 0x3) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x3, 0x4) 2018/04/16 23:22:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000184000)='projid_map\x00') sendfile(r0, r0, &(0x7f0000d33ff8), 0x80004) 2018/04/16 23:22:04 executing program 0: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x66, &(0x7f00008a8ff0)={0x0, 0x0, &(0x7f0000d22000)}, &(0x7f0000f6affc)=0x10) 2018/04/16 23:22:04 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, &(0x7f0000005fe0)) timerfd_gettime(r0, &(0x7f0000000240)) 2018/04/16 23:22:04 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, &(0x7f0000005fe0)) timerfd_gettime(r0, &(0x7f0000000240)) 2018/04/16 23:22:04 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f000079df88)) msgsnd(r0, &(0x7f0000c40ff8)={0x1}, 0x8, 0x0) msgctl$IPC_RMID(r0, 0x0) 2018/04/16 23:22:04 executing program 0: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x66, &(0x7f00008a8ff0)={0x0, 0x0, &(0x7f0000d22000)}, &(0x7f0000f6affc)=0x10) 2018/04/16 23:22:04 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00005cfff6)='/dev/cuse\x00', 0x8010000080802, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000a4c000)=""/56, 0x38, 0x0) write$fuse(r0, &(0x7f000007c000)={0x58, 0x0, 0x1, @random="07000000000000000000e6065d86a61bf2b3b36e2713546deaa31b55dededda4847ff7bf2b3a8d3b874662bb74e794b2ee47ed46cd5ed34882afb9950b1b3dd332fdbf7b83919045"}, 0x58) 2018/04/16 23:22:04 executing program 0: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x66, &(0x7f00008a8ff0)={0x0, 0x0, &(0x7f0000d22000)}, &(0x7f0000f6affc)=0x10) 2018/04/16 23:22:04 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, &(0x7f0000005fe0)) timerfd_gettime(r0, &(0x7f0000000240)) [ 1014.811136] device bridge_slave_1 left promiscuous mode [ 1014.817147] bridge0: port 2(bridge_slave_1) entered disabled state [ 1014.830256] IPVS: ftp: loaded support on port[0] = 21 [ 1014.846184] device bridge_slave_0 left promiscuous mode [ 1014.851939] bridge0: port 1(bridge_slave_0) entered disabled state [ 1014.928767] team0 (unregistering): Port device team_slave_1 removed [ 1014.942353] team0 (unregistering): Port device team_slave_0 removed [ 1014.953936] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1014.972906] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1015.006116] bond0 (unregistering): Released all slaves [ 1015.859070] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.865520] bridge0: port 1(bridge_slave_0) entered disabled state [ 1015.873441] device bridge_slave_0 entered promiscuous mode [ 1015.912529] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.919225] bridge0: port 2(bridge_slave_1) entered disabled state [ 1015.927314] device bridge_slave_1 entered promiscuous mode [ 1015.964272] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1016.003130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1016.121891] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1016.163482] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1016.328501] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1016.335991] team0: Port device team_slave_0 added [ 1016.373865] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1016.381885] team0: Port device team_slave_1 added [ 1016.413378] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1016.452977] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1016.493702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1016.521859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1016.749415] bridge0: port 2(bridge_slave_1) entered blocking state [ 1016.755803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1016.762451] bridge0: port 1(bridge_slave_0) entered blocking state [ 1016.768823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1016.776170] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1017.632405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1017.649237] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1017.737824] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1017.826574] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1017.832864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1017.840554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1017.923782] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:08 executing program 0: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x66, &(0x7f00008a8ff0)={0x0, 0x0, &(0x7f0000d22000)}, &(0x7f0000f6affc)=0x10) 2018/04/16 23:22:08 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000c2d000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f00003acfff)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cb6fd8)={0x0, 0x0, &(0x7f00003a4000)=""/105, &(0x7f0000af5000)=""/228, &(0x7f0000ae5f39)=""/199}) 2018/04/16 23:22:08 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, &(0x7f0000005fe0)) timerfd_gettime(r0, &(0x7f0000000240)) 2018/04/16 23:22:08 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00005cfff6)='/dev/cuse\x00', 0x8010000080802, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000a4c000)=""/56, 0x38, 0x0) write$fuse(r0, &(0x7f000007c000)={0x58, 0x0, 0x1, @random="07000000000000000000e6065d86a61bf2b3b36e2713546deaa31b55dededda4847ff7bf2b3a8d3b874662bb74e794b2ee47ed46cd5ed34882afb9950b1b3dd332fdbf7b83919045"}, 0x58) 2018/04/16 23:22:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001480)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}}, &(0x7f0000001540)=0x90) 2018/04/16 23:22:08 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2018/04/16 23:22:08 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8dc, 0x8040) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2200, 0x154) connect$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1e) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000040)={0x0, 0xa8, &(0x7f0000000080)="86f7b87354686156f65402007141d61cb010b71aa365b23148bb1100984f836f909e811d0000007e50000000000000b31eaf108100000000000000331d4482a58207f82cd83d02d2ad4f6e16cd44a89fd9160654e1e5a973419ce0f9c558858aad53fb2f3fa5a0f072cc3e2cc463dbb943880e430a01e4c0faa1da0200000000000000848c600665a70391a4b0fc9c3e6698f0e89f33b022cae8aa1f565de3858eeab392fcada143"}) write$evdev(r2, &(0x7f00008c1fd0)=[{{}, 0x2, 0x0, 0x40c}, {}], 0x30) 2018/04/16 23:22:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0x6, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x3c}, [], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x99, &(0x7f0000000140)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x64, &(0x7f0000000340), &(0x7f00000002c0)=""/100}, 0x28) 2018/04/16 23:22:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0x6, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x3c}, [], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x99, &(0x7f0000000140)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x64, &(0x7f0000000340), &(0x7f00000002c0)=""/100}, 0x28) 2018/04/16 23:22:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001480)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}}, &(0x7f0000001540)=0x90) 2018/04/16 23:22:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0x6, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x3c}, [], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x99, &(0x7f0000000140)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x64, &(0x7f0000000340), &(0x7f00000002c0)=""/100}, 0x28) 2018/04/16 23:22:08 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000c2d000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f00003acfff)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cb6fd8)={0x0, 0x0, &(0x7f00003a4000)=""/105, &(0x7f0000af5000)=""/228, &(0x7f0000ae5f39)=""/199}) 2018/04/16 23:22:08 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2018/04/16 23:22:08 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000da9000)=ANY=[@ANYBLOB="0203000910000000000000000000000002001300020000f3ff0000000006000005000600000000000a000000000000000000000000000000000000000000000000000000000000000200010000000000000000020000000005000500000000000a00000000000000ff01000000000000000000aa386adb32815742ce838b0000"], 0x80}, 0x1}, 0x0) 2018/04/16 23:22:08 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x123, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x84, 0xb, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0x1000) 2018/04/16 23:22:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0x6, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x3c}, [], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x99, &(0x7f0000000140)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x64, &(0x7f0000000340), &(0x7f00000002c0)=""/100}, 0x28) 2018/04/16 23:22:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001480)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}}, &(0x7f0000001540)=0x90) 2018/04/16 23:22:08 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2018/04/16 23:22:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0x6, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x3c}, [], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x99, &(0x7f0000000140)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x64, &(0x7f0000000340), &(0x7f00000002c0)=""/100}, 0x28) [ 1018.738520] device bridge_slave_1 left promiscuous mode [ 1018.744220] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:22:08 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000c2d000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f00003acfff)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cb6fd8)={0x0, 0x0, &(0x7f00003a4000)=""/105, &(0x7f0000af5000)=""/228, &(0x7f0000ae5f39)=""/199}) 2018/04/16 23:22:08 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000040), 0x1) [ 1018.800751] device bridge_slave_0 left promiscuous mode [ 1018.806415] bridge0: port 1(bridge_slave_0) entered disabled state [ 1018.910552] IPVS: ftp: loaded support on port[0] = 21 [ 1018.956560] team0 (unregistering): Port device team_slave_1 removed [ 1018.967203] team0 (unregistering): Port device team_slave_0 removed [ 1018.977094] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1018.993680] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1019.023710] bond0 (unregistering): Released all slaves [ 1019.635833] bridge0: port 1(bridge_slave_0) entered blocking state [ 1019.642300] bridge0: port 1(bridge_slave_0) entered disabled state [ 1019.649686] device bridge_slave_0 entered promiscuous mode [ 1019.689424] bridge0: port 2(bridge_slave_1) entered blocking state [ 1019.695879] bridge0: port 2(bridge_slave_1) entered disabled state [ 1019.703778] device bridge_slave_1 entered promiscuous mode [ 1019.743934] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1019.782900] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1019.897942] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1019.939057] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1020.109830] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1020.118261] team0: Port device team_slave_0 added [ 1020.155375] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1020.162827] team0: Port device team_slave_1 added [ 1020.200608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1020.238953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1020.278422] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1020.286179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1020.294933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1020.317788] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1020.324958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1020.333550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1020.560543] bridge0: port 2(bridge_slave_1) entered blocking state [ 1020.566962] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1020.573623] bridge0: port 1(bridge_slave_0) entered blocking state [ 1020.580013] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1020.587333] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1020.687151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1021.422314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1021.504460] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1021.585354] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1021.591536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1021.599193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1021.671608] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:11 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x123, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x84, 0xb, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0x1000) 2018/04/16 23:22:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001480)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}}, &(0x7f0000001540)=0x90) 2018/04/16 23:22:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0x6, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x3c}, [], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x99, &(0x7f0000000140)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x64, &(0x7f0000000340), &(0x7f00000002c0)=""/100}, 0x28) 2018/04/16 23:22:11 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)) 2018/04/16 23:22:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000040), 0x1) 2018/04/16 23:22:11 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000c2d000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f00003acfff)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cb6fd8)={0x0, 0x0, &(0x7f00003a4000)=""/105, &(0x7f0000af5000)=""/228, &(0x7f0000ae5f39)=""/199}) 2018/04/16 23:22:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0x6, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x3c}, [], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x99, &(0x7f0000000140)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x64, &(0x7f0000000340), &(0x7f00000002c0)=""/100}, 0x28) 2018/04/16 23:22:11 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2018/04/16 23:22:12 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000040), 0x1) 2018/04/16 23:22:12 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x97}, 0x2c) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x5, 0x2, 0xfffffffb, &(0x7f0000000000)) socketpair$inet_icmp(0x4, 0x400000, 0x8, &(0x7f0000000580)) 2018/04/16 23:22:12 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') 2018/04/16 23:22:12 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f0000000100), 0x8) 2018/04/16 23:22:12 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000002540)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file1\x00', 0x0, 0x0, &(0x7f0000000880), 0x0, &(0x7f0000000900)={[{@sys_immutable='sys_immutable', 0x2c}, {@gid={'gid', 0x3d, [0x0]}, 0x2c}]}) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r0, &(0x7f0000000100)=ANY=[], 0x1023c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 2018/04/16 23:22:12 executing program 7: clock_getres(0x8000001, &(0x7f0000000140)) 2018/04/16 23:22:12 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x123, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x84, 0xb, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0x1000) 2018/04/16 23:22:12 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000040), 0x1) [ 1022.415532] device bridge_slave_1 left promiscuous mode [ 1022.421231] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:22:12 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f0000000100), 0x8) 2018/04/16 23:22:12 executing program 7: clock_getres(0x8000001, &(0x7f0000000140)) [ 1022.484340] device bridge_slave_0 left promiscuous mode [ 1022.490062] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:22:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x13) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1a) [ 1022.584783] IPVS: ftp: loaded support on port[0] = 21 [ 1022.638407] team0 (unregistering): Port device team_slave_1 removed [ 1022.658326] team0 (unregistering): Port device team_slave_0 removed [ 1022.678665] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1022.705223] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1022.732744] bond0 (unregistering): Released all slaves [ 1023.322487] bridge0: port 1(bridge_slave_0) entered blocking state [ 1023.328957] bridge0: port 1(bridge_slave_0) entered disabled state [ 1023.336359] device bridge_slave_0 entered promiscuous mode [ 1023.374879] bridge0: port 2(bridge_slave_1) entered blocking state [ 1023.381368] bridge0: port 2(bridge_slave_1) entered disabled state [ 1023.388792] device bridge_slave_1 entered promiscuous mode [ 1023.427381] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1023.466965] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1023.580269] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1023.621432] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1023.800245] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1023.807831] team0: Port device team_slave_0 added [ 1023.835669] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1023.842950] team0: Port device team_slave_1 added [ 1023.879544] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1023.920262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1023.951841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1023.992529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1024.242379] bridge0: port 2(bridge_slave_1) entered blocking state [ 1024.248785] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1024.255441] bridge0: port 1(bridge_slave_0) entered blocking state [ 1024.261810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1024.269172] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1025.119985] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1025.203938] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1025.247285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1025.297705] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1025.303913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1025.311742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1025.396184] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:15 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x123, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x84, 0xb, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0x1000) 2018/04/16 23:22:15 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') 2018/04/16 23:22:15 executing program 0: creat(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') 2018/04/16 23:22:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x13) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1a) 2018/04/16 23:22:15 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f0000000100), 0x8) 2018/04/16 23:22:15 executing program 7: clock_getres(0x8000001, &(0x7f0000000140)) 2018/04/16 23:22:15 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "f3b639", 0x24, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[@fragment={0x2c}, @srh={0x3c, 0x0, 0x4}], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000004c0)) 2018/04/16 23:22:15 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x97}, 0x2c) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x5, 0x2, 0xfffffffb, &(0x7f0000000000)) socketpair$inet_icmp(0x4, 0x400000, 0x8, &(0x7f0000000580)) 2018/04/16 23:22:15 executing program 7: clock_getres(0x8000001, &(0x7f0000000140)) 2018/04/16 23:22:15 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f0000000100), 0x8) 2018/04/16 23:22:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x13) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1a) 2018/04/16 23:22:15 executing program 0: creat(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') 2018/04/16 23:22:15 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1=0xe0000001, @loopback=0x7f000001}, 0xb6) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f000043e000)={0x1, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0x3, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) 2018/04/16 23:22:15 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') 2018/04/16 23:22:15 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000acd000)='/dev/loop#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x40081271, 0x0) 2018/04/16 23:22:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f00000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f8f000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)="a58c2433e1c2f318137c27a2ffcb05ec", 0x10}], 0x1) recvmmsg(r1, &(0x7f0000f75da8)=[{{&(0x7f0000b86000)=@ethernet={0x0, @link_local}, 0x10, &(0x7f00007e9fa0)=[{&(0x7f0000032000)=""/60, 0x3c}], 0x1, &(0x7f00002c4000)=""/52, 0x34}}], 0x1, 0x0, &(0x7f00002d9000)) 2018/04/16 23:22:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x13) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1a) 2018/04/16 23:22:16 executing program 0: creat(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') [ 1026.234800] device bridge_slave_1 left promiscuous mode [ 1026.240461] bridge0: port 2(bridge_slave_1) entered disabled state [ 1026.266495] IPVS: ftp: loaded support on port[0] = 21 2018/04/16 23:22:16 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') 2018/04/16 23:22:16 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000acd000)='/dev/loop#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x40081271, 0x0) 2018/04/16 23:22:16 executing program 5: r0 = memfd_create(&(0x7f0000dcf000)='proc.wlan0ppp0keyring\x00', 0x0) fallocate(r0, 0x0, 0x7fffffffffffdffd, 0x6150) [ 1026.286298] device bridge_slave_0 left promiscuous mode [ 1026.292098] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:22:16 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000acd000)='/dev/loop#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x40081271, 0x0) [ 1026.430604] team0 (unregistering): Port device team_slave_1 removed [ 1026.466421] team0 (unregistering): Port device team_slave_0 removed [ 1026.483427] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1026.500233] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1026.526328] bond0 (unregistering): Released all slaves [ 1027.113681] bridge0: port 1(bridge_slave_0) entered blocking state [ 1027.120137] bridge0: port 1(bridge_slave_0) entered disabled state [ 1027.128394] device bridge_slave_0 entered promiscuous mode [ 1027.166390] bridge0: port 2(bridge_slave_1) entered blocking state [ 1027.172874] bridge0: port 2(bridge_slave_1) entered disabled state [ 1027.180259] device bridge_slave_1 entered promiscuous mode [ 1027.218203] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1027.259944] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1027.375478] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1027.416612] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1027.597377] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1027.604838] team0: Port device team_slave_0 added [ 1027.634733] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1027.643566] team0: Port device team_slave_1 added [ 1027.680487] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1027.687727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1027.703590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1027.732707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1027.772570] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1027.779771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1027.795574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1027.825073] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1027.832274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1027.840885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1028.084546] bridge0: port 2(bridge_slave_1) entered blocking state [ 1028.090956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1028.097608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1028.103980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1028.111384] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1028.576169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1029.002693] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1029.091829] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1029.179819] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1029.186240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1029.196862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1029.275720] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:19 executing program 2: r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r0, &(0x7f0000037fe8)=[{{0x0, 0x7530}, 0x1, 0x74, 0x2}], 0x18) sendfile(r0, r0, &(0x7f00000010c0)=0x2, 0x4c35) sendfile(r1, r0, &(0x7f0000fc1ff8), 0x80000001) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000080)=""/4096) 2018/04/16 23:22:19 executing program 0: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) quotactl(0xb5b, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f0000000200)) 2018/04/16 23:22:19 executing program 5: r0 = memfd_create(&(0x7f0000dcf000)='proc.wlan0ppp0keyring\x00', 0x0) fallocate(r0, 0x0, 0x7fffffffffffdffd, 0x6150) 2018/04/16 23:22:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f00000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f8f000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)="a58c2433e1c2f318137c27a2ffcb05ec", 0x10}], 0x1) recvmmsg(r1, &(0x7f0000f75da8)=[{{&(0x7f0000b86000)=@ethernet={0x0, @link_local}, 0x10, &(0x7f00007e9fa0)=[{&(0x7f0000032000)=""/60, 0x3c}], 0x1, &(0x7f00002c4000)=""/52, 0x34}}], 0x1, 0x0, &(0x7f00002d9000)) 2018/04/16 23:22:19 executing program 3: perf_event_open(&(0x7f000025c000)={0x10000000000002, 0x70, 0x4ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000c5fff4)='/dev/amidi#\x00', 0x0, 0x0) 2018/04/16 23:22:19 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000acd000)='/dev/loop#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x40081271, 0x0) 2018/04/16 23:22:19 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1=0xe0000001, @loopback=0x7f000001}, 0xb6) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f000043e000)={0x1, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0x3, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) 2018/04/16 23:22:19 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x97}, 0x2c) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x5, 0x2, 0xfffffffb, &(0x7f0000000000)) socketpair$inet_icmp(0x4, 0x400000, 0x8, &(0x7f0000000580)) 2018/04/16 23:22:19 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000dc01)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000000efcc)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1, 0x2000}}, 0x1c}, 0x1}, 0x0) r1 = memfd_create(&(0x7f0000000000)='5trustedvboxnet0@\x00', 0x2) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) 2018/04/16 23:22:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)='C', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f00000002c0)="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", 0x5c1, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/16 23:22:19 executing program 5: r0 = memfd_create(&(0x7f0000dcf000)='proc.wlan0ppp0keyring\x00', 0x0) fallocate(r0, 0x0, 0x7fffffffffffdffd, 0x6150) 2018/04/16 23:22:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f00000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f8f000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)="a58c2433e1c2f318137c27a2ffcb05ec", 0x10}], 0x1) recvmmsg(r1, &(0x7f0000f75da8)=[{{&(0x7f0000b86000)=@ethernet={0x0, @link_local}, 0x10, &(0x7f00007e9fa0)=[{&(0x7f0000032000)=""/60, 0x3c}], 0x1, &(0x7f00002c4000)=""/52, 0x34}}], 0x1, 0x0, &(0x7f00002d9000)) 2018/04/16 23:22:19 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1=0xe0000001, @loopback=0x7f000001}, 0xb6) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f000043e000)={0x1, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0x3, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) 2018/04/16 23:22:19 executing program 3: perf_event_open(&(0x7f000025c000)={0x10000000000002, 0x70, 0x4ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000c5fff4)='/dev/amidi#\x00', 0x0, 0x0) 2018/04/16 23:22:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)='C', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f00000002c0)="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", 0x5c1, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/16 23:22:19 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000dc01)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000000efcc)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1, 0x2000}}, 0x1c}, 0x1}, 0x0) r1 = memfd_create(&(0x7f0000000000)='5trustedvboxnet0@\x00', 0x2) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) [ 1030.074685] device bridge_slave_1 left promiscuous mode [ 1030.081381] bridge0: port 2(bridge_slave_1) entered disabled state [ 1030.158277] IPVS: ftp: loaded support on port[0] = 21 [ 1030.170203] device bridge_slave_0 left promiscuous mode [ 1030.175899] bridge0: port 1(bridge_slave_0) entered disabled state [ 1030.233570] team0 (unregistering): Port device team_slave_1 removed [ 1030.245062] team0 (unregistering): Port device team_slave_0 removed [ 1030.254825] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1030.274513] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1030.306828] bond0 (unregistering): Released all slaves [ 1030.927629] bridge0: port 1(bridge_slave_0) entered blocking state [ 1030.934079] bridge0: port 1(bridge_slave_0) entered disabled state [ 1030.941693] device bridge_slave_0 entered promiscuous mode [ 1030.983893] bridge0: port 2(bridge_slave_1) entered blocking state [ 1030.990314] bridge0: port 2(bridge_slave_1) entered disabled state [ 1030.998425] device bridge_slave_1 entered promiscuous mode [ 1031.035963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1031.080603] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1031.193229] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1031.236018] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1031.405781] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1031.413784] team0: Port device team_slave_0 added [ 1031.452324] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1031.459737] team0: Port device team_slave_1 added [ 1031.493942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1031.534188] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1031.574678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1031.602950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1031.842735] bridge0: port 2(bridge_slave_1) entered blocking state [ 1031.849145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1031.855820] bridge0: port 1(bridge_slave_0) entered blocking state [ 1031.862206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1031.869717] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1032.721954] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1032.807573] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1032.863402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1032.895454] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1032.901813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1032.909566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1032.987931] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)='C', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f00000002c0)="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", 0x5c1, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/16 23:22:23 executing program 5: r0 = memfd_create(&(0x7f0000dcf000)='proc.wlan0ppp0keyring\x00', 0x0) fallocate(r0, 0x0, 0x7fffffffffffdffd, 0x6150) 2018/04/16 23:22:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f00000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f8f000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)="a58c2433e1c2f318137c27a2ffcb05ec", 0x10}], 0x1) recvmmsg(r1, &(0x7f0000f75da8)=[{{&(0x7f0000b86000)=@ethernet={0x0, @link_local}, 0x10, &(0x7f00007e9fa0)=[{&(0x7f0000032000)=""/60, 0x3c}], 0x1, &(0x7f00002c4000)=""/52, 0x34}}], 0x1, 0x0, &(0x7f00002d9000)) 2018/04/16 23:22:23 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x97}, 0x2c) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x5, 0x2, 0xfffffffb, &(0x7f0000000000)) socketpair$inet_icmp(0x4, 0x400000, 0x8, &(0x7f0000000580)) 2018/04/16 23:22:23 executing program 3: perf_event_open(&(0x7f000025c000)={0x10000000000002, 0x70, 0x4ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000c5fff4)='/dev/amidi#\x00', 0x0, 0x0) 2018/04/16 23:22:23 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1=0xe0000001, @loopback=0x7f000001}, 0xb6) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f000043e000)={0x1, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0x3, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) 2018/04/16 23:22:23 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000dc01)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000000efcc)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1, 0x2000}}, 0x1c}, 0x1}, 0x0) r1 = memfd_create(&(0x7f0000000000)='5trustedvboxnet0@\x00', 0x2) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) 2018/04/16 23:22:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)='C', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f00000002c0)="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", 0x5c1, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/16 23:22:23 executing program 3: perf_event_open(&(0x7f000025c000)={0x10000000000002, 0x70, 0x4ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000c5fff4)='/dev/amidi#\x00', 0x0, 0x0) 2018/04/16 23:22:23 executing program 5: perf_event_open(&(0x7f000025c000)={0x10000000000002, 0x70, 0x4ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000c5fff4)='/dev/amidi#\x00', 0x0, 0x0) 2018/04/16 23:22:23 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000dc01)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000000efcc)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1, 0x2000}}, 0x1c}, 0x1}, 0x0) r1 = memfd_create(&(0x7f0000000000)='5trustedvboxnet0@\x00', 0x2) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) [ 1033.721579] device bridge_slave_1 left promiscuous mode [ 1033.727213] bridge0: port 2(bridge_slave_1) entered disabled state [ 1033.762101] device bridge_slave_0 left promiscuous mode [ 1033.767747] bridge0: port 1(bridge_slave_0) entered disabled state [ 1033.774725] IPVS: ftp: loaded support on port[0] = 21 [ 1033.831521] team0 (unregistering): Port device team_slave_1 removed [ 1033.842462] team0 (unregistering): Port device team_slave_0 removed [ 1033.852560] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1033.868296] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1033.895998] bond0 (unregistering): Released all slaves [ 1034.458237] bridge0: port 1(bridge_slave_0) entered blocking state [ 1034.464667] bridge0: port 1(bridge_slave_0) entered disabled state [ 1034.471990] device bridge_slave_0 entered promiscuous mode [ 1034.510060] bridge0: port 2(bridge_slave_1) entered blocking state [ 1034.516493] bridge0: port 2(bridge_slave_1) entered disabled state [ 1034.523826] device bridge_slave_1 entered promiscuous mode [ 1034.560119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1034.596229] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1034.705745] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1034.745892] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1034.917495] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1034.924915] team0: Port device team_slave_0 added [ 1034.962298] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1034.969729] team0: Port device team_slave_1 added [ 1035.004910] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1035.011850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1035.020282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1035.051906] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1035.058847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1035.074538] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1035.108584] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1035.115795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1035.131640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1035.153605] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1035.160699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1035.169315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1035.424152] bridge0: port 2(bridge_slave_1) entered blocking state [ 1035.430555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1035.437228] bridge0: port 1(bridge_slave_0) entered blocking state [ 1035.443642] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1035.451138] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1035.935596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1036.282346] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1036.370234] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1036.457591] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1036.463807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1036.471670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1036.552548] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:26 executing program 7: r0 = socket(0x2, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000db6ffc)=0x20102, 0x4) fallocate(r1, 0x0, 0x0, 0x9) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) connect(r0, &(0x7f0000000040)=@nl=@unspec, 0xc) sendfile(r0, r1, &(0x7f0000af5000), 0x10001) 2018/04/16 23:22:26 executing program 1: clone(0x200, &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000000500)='./file0\x00', 0x83, 0x8) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080), 0xc) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000480), &(0x7f00006fcff0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)="636772312e8a43cb6f75702e6576656e747300", 0x0, 0x0) r1 = inotify_init1(0x4000000000000803) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000280)={{0x4, 0x5}, 'port1\x00', 0x6f40b7c95600a1e9, 0x83d, 0xff0000, 0xfffffffffffffffa, 0x8, 0x9000000000, 0x401, 0x0, 0x2, 0xe4}) r3 = getpgrp(r2) kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x400000, 0x0) setsockopt$packet_int(r4, 0x107, 0x7, &(0x7f0000000740)=0x2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)="d1d35c28c9a2940ff92d92cf5ba99dbd095c407a47aee16bd9fba4aa14c8b45950fc2ab852e6d0beb1087f244343358f379574c393d75b0d12d48fa3caa8455d0e9c92d2c81682adb435103b73129d829a840c501aa5c4284cdbc4d1729fb7666889febd3c69f3d47e8d03d1d931768918a07a614ccd6dd70e01808b3288dc1a2c203ab3252cda9e26aefcd1d5a0d633af9407d2d4bcf067a896cae139c19d2491f723dda8d03445824da761af13cad98310c06c3cfc1c03e84784a88cb75bd08c373e05cf1fd629c62714e5595e28323552b147f54a56c12801d1") ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)) r5 = socket$inet(0x2, 0xfffffffffffffffd, 0x0) connect(r5, &(0x7f0000000600)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x4, 0x80, "ab7d48bfd11a3e7a60aa13ac7038ef595132145fd73a3831bf9ebbf8ba02fddd251584133faf65deeb9e6b927bda4629855f75a594a70a003ee8e259f5ef07", 0x31}, 0x80) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000a80)="a33af9140719e3bb3bfa5097cbfa66e055f5e591237fdb26a7738177fd5ddac52529c334c8a4cc1e1d663365fd3f5d8b1c460b1a8064b854af4e59028c0c4e1af3c97e94f649b15c5fba9e2d6dbe36efb4ed110c76fc4457606b5209a808883eb39c5b60f948b4f875e2f82ac3af36a005fce179f20154bd6a5f6cfc4079170ce6fad80ef16734065f61bc2cdc2ca5c1a562f63c9f8f0286def6fed118b2637cf2873e943b13a3e52f33db60acada1c0181e978275891731a178295c6f53583c0fd378986c07ae67540b65db6a5ae647405a4b78b95abeb920a24ddfa70194bdd95bd20cb6d6561971e4fc68953bb68041eb78303c4805", 0xf7) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002}, 0x8) r6 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4000000000007, 0x181000) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000780)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@empty, r8}, 0x14) bind(r0, &(0x7f0000000680)=@nfc_llcp={0x27, 0x0, 0x1, 0x2, 0x73e, 0x6, "eb0aefa6d93c315c4580d2d7106217cb5f01ed0a6f59eed9592f177190886947a1f0c703e0f1de4057847e5fc122954fffa1b84263635a0f5ec3dc61a21711", 0x15}, 0x80) r9 = shmget(0x0, 0x9000, 0x402, &(0x7f0000ff7000/0x9000)=nil) shmctl$SHM_STAT(r9, 0xd, &(0x7f0000000280)=""/86) 2018/04/16 23:22:26 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ff5000/0x2000)=nil}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)=ANY=[@ANYBLOB="d200000000000000024d564b0000000001010080"]) 2018/04/16 23:22:26 executing program 5: perf_event_open(&(0x7f000025c000)={0x10000000000002, 0x70, 0x4ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000c5fff4)='/dev/amidi#\x00', 0x0, 0x0) 2018/04/16 23:22:26 executing program 3: sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[]}, 0x1}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/16 23:22:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)='C', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f00000002c0)="12cd58d42f59908651b8c93cb8a9a02a578d44d4bd5c3d22913ab9d96a66bd6b408fc253e03ae94a716e4e516fd221ca9d8e596b440ac402e12c0d843298bdb86b5d54c89784bd26922ac5ab16d52638cad559ce9d04ce2b21be66b80d6d4b1b008e4e00f7eee48b832299b9cf1ec5ab2f9b378073aea6a96c6c82de99ba01da85a62492b792ce5038b9062e473da3cfc431e2482afd7f9f228f7f1f6690455e636b21fcf084e7297dfe14b66d3e162b3006a32b7e8842cbf2ac4a2ad98ea41c5829da827785e5503fdd01404a4106088c9de0269fcc956d15292ae9479830eb553a2bf0a208a755698aaecc571c97634ccb2350e7ac5e9b84db0ff60b1fe0d406237877d9a2e822c29651bc430b89171ea990c2677d3233eb04ae6688673a4b4d738dc40917de993ded723d676b7c7dae15f1a6015bf1b5e6933d381d1022cfc70616d13dd4709d8885976bb50bb52ebef92a3aa4461576edae8ed91585e7c0a5753fa3bef51853ffe3e3ffbcde785eda2e38e584814d6d9231b7102a7cc750787c9a6be5bc3f9fea353ed880e01b196bf4b3642264d621ea3d0e7de772ff4d85bcafc8aa3e806224821e6a31b92f4b6f4a3f84593a0a6df2f5eb031afb00b91c6cdc4c7b4f2ef7f1b8ca98a0ada7b250bafe0e7111761f83909f76915adbbf3d72058f2f3f229ece54c21deaa28976d1a9129e3deaa4fc0edfe5f34d9cdf438510ba6fb8d3fee09ccb8f6419030d65134e08f2ebeb703e0b692534d9f976d2d875d39ca182e614637abe23e1edb7a5167cdebb29aa2b5b7399074a7b2df83dd3b1e50438edb0958b3ab36868d97118912dfd8b4354837f3f1148383fe8d0c8fc17cd599434cd672eb6eb4783b5b03f4eea49fc00fb18aa8db8bd4e657a49b8ee9d81181f6ecbbfdce18327e34c4664ded2e8de76aabf21cbf8ba71703d988776bfbd4be8e08b694bafe925520eaaca22de8b4ccc7969a2218b3a2bd77dd530d9be4b36733dc58d908baeba22dfa6305454ec4ffb22f99a6373976352a1872d59744db6a03f61aed889bee7b4342aa0f020ba308dafdf442d4e7428ad3000ece1f3a50223251421fa2396533263c81049283b38f8fb9ef08de6f569f2be20658eedd08077d03cb01c0daa6f75df010370b99c726837effb3e8d6305bc11d90cdf416c81c3d1ff94e622655e6713904408f602cdb0978835719b31bf8748ae773b0aa5d72e2c77451591cd8c43c800ee728cd934d7c668b86bdd1d73afbe00fdb2dbae5314de955597fff624b9e2f7f8cddf4383731124b2521a19a037051b0e6bf5a425b3e64847a763646f7c256c5781a1f96192fd567817da89feab3acf503f62824942e5cd6985048af70a4fdcb05e11a3d0b8c0aa58be489cd937e92f1facefc0d10c3ac1e3d0a24b17436ebbf2220dd8701b77614cebe706a659b382af5d9fe8656e0d1204c74cb8a6e2dd7c70372077ff3c2d920716e526b04e321de47c2575b78726f290a9577e96169a7170208dfb4291edf0bf40bc843bc9519f3f757548cbb28bd5be5000aa4ea84588aab5f1e0a96c68cd0e74cc16b3fb47571555c266baa0af78240101ff4ac394adc1c544fd90c29f6a83af3bc5a685ba9ad96345297ab7bddacb332901fe61666317799096d8fe403a09ee9e4a7252b21fcbaab3e47c7024a7b0ec0682817aa81dad3c6981e87a37668758f09ca3574cee686e4efa8d965f65852f03210db35b791d3b895f82455a8f5a224253f0715408ca4de02ac33f84808739426f7f257e4d0ef194ce367bcb5c8ddc8a13bc54dcf531b2df58c150a6e0adfcd50c59b4047da48de8ecb5ded7af338f01789024b80e562f8257ea3c02bb2392c5a04890f4637239697470da81c1550340bbd0389ec8cae46d449c81f29cc848ffa33870f3f18f5f2fa5d67b91d0030cc429587fa8316a9e5bf303ce8089c7310b1f4817c358a03e91fa5fb53fa0050bf66af209e3fa3caf95c47460ff4f86905aaa3a8687bd0b9200b892b1a6b81958972ebd103a724259e6125aa9fdd4202c54fdb286e2f727c1ac809514f95a184b1ec60aca291f59b7", 0x5c1, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/16 23:22:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)='C', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f00000002c0)="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", 0x5c1, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/16 23:22:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000f43ff0)={0x2, &(0x7f0000b1dff8)=[{0x3c}, {0x6}]}, 0x10) 2018/04/16 23:22:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000f43ff0)={0x2, &(0x7f0000b1dff8)=[{0x3c}, {0x6}]}, 0x10) 2018/04/16 23:22:27 executing program 3: sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[]}, 0x1}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/16 23:22:27 executing program 5: perf_event_open(&(0x7f000025c000)={0x10000000000002, 0x70, 0x4ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000c5fff4)='/dev/amidi#\x00', 0x0, 0x0) 2018/04/16 23:22:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(aes-aesni))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f7e000)={0x0, 0x0, &(0x7f0000f7efd0), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [], 0xa, "650be17bfba3"}, 0x11) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/16 23:22:27 executing program 7: r0 = socket(0x2, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000db6ffc)=0x20102, 0x4) fallocate(r1, 0x0, 0x0, 0x9) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) connect(r0, &(0x7f0000000040)=@nl=@unspec, 0xc) sendfile(r0, r1, &(0x7f0000af5000), 0x10001) 2018/04/16 23:22:27 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x1, 0x4000020030}, 0xc) sendto$inet6(r0, &(0x7f0000000140)='{', 0x1, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000280)='h', 0x1}], 0x1) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000a80)="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", 0x2b1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240), 0x20) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) writev(r0, &(0x7f0000000380)=[{&(0x7f0000002080)="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", 0x3d3}], 0x1) 2018/04/16 23:22:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000f43ff0)={0x2, &(0x7f0000b1dff8)=[{0x3c}, {0x6}]}, 0x10) [ 1037.348295] device bridge_slave_1 left promiscuous mode [ 1037.354122] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:22:27 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}}}}}}, 0x0) r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f0000000340)="d44d3e4c", 0x4) 2018/04/16 23:22:27 executing program 3: sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[]}, 0x1}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1037.390402] device bridge_slave_0 left promiscuous mode [ 1037.396106] bridge0: port 1(bridge_slave_0) entered disabled state [ 1037.475530] IPVS: ftp: loaded support on port[0] = 21 [ 1037.558140] team0 (unregistering): Port device team_slave_1 removed [ 1037.570324] team0 (unregistering): Port device team_slave_0 removed [ 1037.580238] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1037.596471] bond0 (unregistering): Releasing backup interface bond_slave_0 2018/04/16 23:22:27 executing program 1: clone(0x200, &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000000500)='./file0\x00', 0x83, 0x8) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080), 0xc) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000480), &(0x7f00006fcff0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)="636772312e8a43cb6f75702e6576656e747300", 0x0, 0x0) r1 = inotify_init1(0x4000000000000803) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000280)={{0x4, 0x5}, 'port1\x00', 0x6f40b7c95600a1e9, 0x83d, 0xff0000, 0xfffffffffffffffa, 0x8, 0x9000000000, 0x401, 0x0, 0x2, 0xe4}) r3 = getpgrp(r2) kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x400000, 0x0) setsockopt$packet_int(r4, 0x107, 0x7, &(0x7f0000000740)=0x2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)="d1d35c28c9a2940ff92d92cf5ba99dbd095c407a47aee16bd9fba4aa14c8b45950fc2ab852e6d0beb1087f244343358f379574c393d75b0d12d48fa3caa8455d0e9c92d2c81682adb435103b73129d829a840c501aa5c4284cdbc4d1729fb7666889febd3c69f3d47e8d03d1d931768918a07a614ccd6dd70e01808b3288dc1a2c203ab3252cda9e26aefcd1d5a0d633af9407d2d4bcf067a896cae139c19d2491f723dda8d03445824da761af13cad98310c06c3cfc1c03e84784a88cb75bd08c373e05cf1fd629c62714e5595e28323552b147f54a56c12801d1") ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)) r5 = socket$inet(0x2, 0xfffffffffffffffd, 0x0) connect(r5, &(0x7f0000000600)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x4, 0x80, "ab7d48bfd11a3e7a60aa13ac7038ef595132145fd73a3831bf9ebbf8ba02fddd251584133faf65deeb9e6b927bda4629855f75a594a70a003ee8e259f5ef07", 0x31}, 0x80) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000a80)="a33af9140719e3bb3bfa5097cbfa66e055f5e591237fdb26a7738177fd5ddac52529c334c8a4cc1e1d663365fd3f5d8b1c460b1a8064b854af4e59028c0c4e1af3c97e94f649b15c5fba9e2d6dbe36efb4ed110c76fc4457606b5209a808883eb39c5b60f948b4f875e2f82ac3af36a005fce179f20154bd6a5f6cfc4079170ce6fad80ef16734065f61bc2cdc2ca5c1a562f63c9f8f0286def6fed118b2637cf2873e943b13a3e52f33db60acada1c0181e978275891731a178295c6f53583c0fd378986c07ae67540b65db6a5ae647405a4b78b95abeb920a24ddfa70194bdd95bd20cb6d6561971e4fc68953bb68041eb78303c4805", 0xf7) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002}, 0x8) r6 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4000000000007, 0x181000) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000780)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@empty, r8}, 0x14) bind(r0, &(0x7f0000000680)=@nfc_llcp={0x27, 0x0, 0x1, 0x2, 0x73e, 0x6, "eb0aefa6d93c315c4580d2d7106217cb5f01ed0a6f59eed9592f177190886947a1f0c703e0f1de4057847e5fc122954fffa1b84263635a0f5ec3dc61a21711", 0x15}, 0x80) r9 = shmget(0x0, 0x9000, 0x402, &(0x7f0000ff7000/0x9000)=nil) shmctl$SHM_STAT(r9, 0xd, &(0x7f0000000280)=""/86) 2018/04/16 23:22:27 executing program 7: r0 = socket(0x2, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000db6ffc)=0x20102, 0x4) fallocate(r1, 0x0, 0x0, 0x9) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) connect(r0, &(0x7f0000000040)=@nl=@unspec, 0xc) sendfile(r0, r1, &(0x7f0000af5000), 0x10001) 2018/04/16 23:22:27 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x1, 0x4000020030}, 0xc) sendto$inet6(r0, &(0x7f0000000140)='{', 0x1, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000280)='h', 0x1}], 0x1) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000a80)="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", 0x2b1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240), 0x20) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) writev(r0, &(0x7f0000000380)=[{&(0x7f0000002080)="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", 0x3d3}], 0x1) 2018/04/16 23:22:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000f43ff0)={0x2, &(0x7f0000b1dff8)=[{0x3c}, {0x6}]}, 0x10) [ 1037.622562] bond0 (unregistering): Released all slaves [ 1038.384295] bridge0: port 1(bridge_slave_0) entered blocking state [ 1038.390754] bridge0: port 1(bridge_slave_0) entered disabled state [ 1038.398705] device bridge_slave_0 entered promiscuous mode [ 1038.438469] bridge0: port 2(bridge_slave_1) entered blocking state [ 1038.444925] bridge0: port 2(bridge_slave_1) entered disabled state [ 1038.452834] device bridge_slave_1 entered promiscuous mode [ 1038.492258] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1038.531736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1038.646809] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1038.688088] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1038.859404] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1038.866890] team0: Port device team_slave_0 added [ 1038.895275] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1038.902488] team0: Port device team_slave_1 added [ 1038.937816] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1038.978562] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1039.010761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1039.039246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1039.281917] bridge0: port 2(bridge_slave_1) entered blocking state [ 1039.288328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1039.294989] bridge0: port 1(bridge_slave_0) entered blocking state [ 1039.301369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1039.308866] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1040.160835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1040.198149] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1040.288734] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1040.369834] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1040.376101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1040.383441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1040.461943] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:30 executing program 3: sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[]}, 0x1}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/16 23:22:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(aes-aesni))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f7e000)={0x0, 0x0, &(0x7f0000f7efd0), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [], 0xa, "650be17bfba3"}, 0x11) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/16 23:22:30 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}}}}}}, 0x0) r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f0000000340)="d44d3e4c", 0x4) 2018/04/16 23:22:30 executing program 7: r0 = socket(0x2, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000db6ffc)=0x20102, 0x4) fallocate(r1, 0x0, 0x0, 0x9) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) connect(r0, &(0x7f0000000040)=@nl=@unspec, 0xc) sendfile(r0, r1, &(0x7f0000af5000), 0x10001) 2018/04/16 23:22:30 executing program 4: clone(0x200, &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000000500)='./file0\x00', 0x83, 0x8) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080), 0xc) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000480), &(0x7f00006fcff0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)="636772312e8a43cb6f75702e6576656e747300", 0x0, 0x0) r1 = inotify_init1(0x4000000000000803) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000280)={{0x4, 0x5}, 'port1\x00', 0x6f40b7c95600a1e9, 0x83d, 0xff0000, 0xfffffffffffffffa, 0x8, 0x9000000000, 0x401, 0x0, 0x2, 0xe4}) r3 = getpgrp(r2) kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x400000, 0x0) setsockopt$packet_int(r4, 0x107, 0x7, &(0x7f0000000740)=0x2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)="d1d35c28c9a2940ff92d92cf5ba99dbd095c407a47aee16bd9fba4aa14c8b45950fc2ab852e6d0beb1087f244343358f379574c393d75b0d12d48fa3caa8455d0e9c92d2c81682adb435103b73129d829a840c501aa5c4284cdbc4d1729fb7666889febd3c69f3d47e8d03d1d931768918a07a614ccd6dd70e01808b3288dc1a2c203ab3252cda9e26aefcd1d5a0d633af9407d2d4bcf067a896cae139c19d2491f723dda8d03445824da761af13cad98310c06c3cfc1c03e84784a88cb75bd08c373e05cf1fd629c62714e5595e28323552b147f54a56c12801d1") ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)) r5 = socket$inet(0x2, 0xfffffffffffffffd, 0x0) connect(r5, &(0x7f0000000600)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x4, 0x80, "ab7d48bfd11a3e7a60aa13ac7038ef595132145fd73a3831bf9ebbf8ba02fddd251584133faf65deeb9e6b927bda4629855f75a594a70a003ee8e259f5ef07", 0x31}, 0x80) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000a80)="a33af9140719e3bb3bfa5097cbfa66e055f5e591237fdb26a7738177fd5ddac52529c334c8a4cc1e1d663365fd3f5d8b1c460b1a8064b854af4e59028c0c4e1af3c97e94f649b15c5fba9e2d6dbe36efb4ed110c76fc4457606b5209a808883eb39c5b60f948b4f875e2f82ac3af36a005fce179f20154bd6a5f6cfc4079170ce6fad80ef16734065f61bc2cdc2ca5c1a562f63c9f8f0286def6fed118b2637cf2873e943b13a3e52f33db60acada1c0181e978275891731a178295c6f53583c0fd378986c07ae67540b65db6a5ae647405a4b78b95abeb920a24ddfa70194bdd95bd20cb6d6561971e4fc68953bb68041eb78303c4805", 0xf7) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002}, 0x8) r6 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4000000000007, 0x181000) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000780)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@empty, r8}, 0x14) bind(r0, &(0x7f0000000680)=@nfc_llcp={0x27, 0x0, 0x1, 0x2, 0x73e, 0x6, "eb0aefa6d93c315c4580d2d7106217cb5f01ed0a6f59eed9592f177190886947a1f0c703e0f1de4057847e5fc122954fffa1b84263635a0f5ec3dc61a21711", 0x15}, 0x80) r9 = shmget(0x0, 0x9000, 0x402, &(0x7f0000ff7000/0x9000)=nil) shmctl$SHM_STAT(r9, 0xd, &(0x7f0000000280)=""/86) 2018/04/16 23:22:30 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x1, 0x4000020030}, 0xc) sendto$inet6(r0, &(0x7f0000000140)='{', 0x1, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000280)='h', 0x1}], 0x1) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000a80)="3ed21575c3f18d3fb43933f5b1a012a84676a362a50977040d539ad569e673062265550831aeb50c145c63036e078020b13a1608c9a02bc09879e85db249dcb0ccd98fe7f1b71cf175878d59a6824437de52c40910a65b8830afea57b7db711925855bfd092146c8d36b5848677fd186308b7d397fadbb2fba64283c01319315ef15c239d1ce8abcce05f0be57ca4fc4c2d058c0148d26a067e3b7f4c0a5a9a70edc5b1884babc512c9c6a508e04f7cd68e4731db0b633158c3a68a84ad368d75cd484c298276dc8c38f398e37a767e814ba8aae634961e86f1a97881fd522b68ce331d497afd79e8f98696bea9678b01927bc4bd1c02c1a5979b541d9293d0997c29bd11579010000001a87eed653e562cf5198a5451ec0c5399f9d6e9f14b72e8141b8e1e3664c207df1702fb9fae62d31bf8e4b72a617327895f174e8aef5c8357655beae446b304f498ad44b90b16ecb67339b02aada7d9eae592fff1e1b1ef56a0e44c97aa4e76b7ca9e87dfcac6cf6d3a2ee01fd3e59ff56d42f3eb5d09afde8fb1d118bcdfe2cf185be664ee3bb73f543466a72ecc52aa3f8b7674851c03532a5b4815c06bc0fb4b9be907f90cd0c6f8b042a76c08a841ddf80b16bcf1391208f0d4505e71c4fb06d915fc33cbc7d1264f1bedd9591194c7db219d78fb0d59ce2f54ad3041efa482f215e1b7772c8f182c637e6abf671fc5d21822f944687cee496b90f7e1bbb34dec17d3fcd1902ca082ef6c1a3cc10ed8022fed9f20a97af8cb7cff627715bfb5b9afdc6db30fa7eb5ba196abf41dbd46596a7a8e91c5e35087fd764766492637f25e16eb8ae4e4c28cc6e60a33e7f691d7c3ceccf8483412a2428415e14b0935ffa41a86491c2571018bccd88f88141e58f5b841e12c2ff0551a30d129bbd03c5dbb05e670bb006b29c48d22447e689a4ce9a171bbc4a5be6fb625be87353844a7bfb9f27a4", 0x2b1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240), 0x20) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) writev(r0, &(0x7f0000000380)=[{&(0x7f0000002080)="7ec1ee34978a6c3bee1bd6cb230ba23abefd55c19f9166bcb61076bbbfd4076b9e609b27856d24025cb15a2650ee012fd171954568336ff798b24c4fb7aa6e74e01cd5835cf1ac44c6d2af0e7a3de05c220e43cdfbfc0ad73519d771d7c1aaded7e96fef1ad758d52b7c8b22baeb4b025040f2f3cb729424f77bf2a7cba4ceb72947a3f883de8f00cdd3cc834eca69fbaa602cb48738032a5f0387906cc06f15118f6dfe382be01bdb4866e6959247fe66982cf1cee83acd1833953693e4aec63702fe0c276914e519fc5156d69279760bd5049bc0273af0b46964428a8a9c1eb2d79921b7a85d59b4db4f221745ac3b5dfbca317e817e038c6a656435fc25df6f4ac9ba3a20a9cc5399ccd5635b3adc2f69f4229bc3500b27a0dd3039ccc70dd412f1bee11f9bb6eaef096805b0fc1130268c3f813f441bbcd3df1638d326f3bdf5f775c47825ffdb23aa383155ce1ff431fa782b96d6c98f7a49fa313e3dba54884d81c0ed4787253b6999368c494841a38f3d8e307e4933201b2991923026570da6002e0b5c1e771cd7705c1e9c4fdd9c6acb229d8ddf3481470b5a02d214249aa5f42490bbe3316517fda96169c360f2e63799a2ebeacb77f7e51664ecbd1949dcd7b136bf784ff4e25808bdffe5b36854d0ade946aec192715465fc0208b8ce2a406d9c3e2672f1e34c7006eead5465939448e47cf7f17a83ec5fd065e85019964be36774c179176de73b2dc6fca5a38a3b3c8f50a3a548141d7f34b5b8491c9421bc4096bf0d8a028c1e2f357bb41062b23b6e28aa69b74ad87379c54e5bd418ee66c859932bb0fb26a4a29f66ec370fe18dbda90daffdeded18e6e64de0e266920297d1c5e566456d06d478fcb8a94aec1327aafd989bf7286e3ef7e8a8ddca15aab332dafb8e476c1893c10198ec520e349d02f4d1c46b8e1bca927c6bb320c7bccfe254b2e38fc1493b5ef5236867a0f12e68f0fc08d6eebf543f41acd0e2010ff1781666579ab2d061673dfe0c3da749455ab6f4419baefdd675292c5661d7af3ce913818d15bf1fcef8ad69e483b27971c69e29f982500ddf1b003dc263cbc02900573f5760197fa7cecb807c0b65341d358df40f4e01cceaf3fefea3b0b1a45175699ff79eeab0f9aac08d4db75448f6304a2872cc8d16bb4de8524e311a5a98c7dd85b8da611e20b5234a2605966fe4cce6fd90143122ca810eb1b6f249023789fda77bd3514853c216b7d505015653a3f966c2967f3acde24c0fa9682c0baedd94eda204fdd96a50280f351c4b55eeceefaddaa47f3f3e877ff790611687599ddd187bfc9ce3e9ea86ae652b4c5d939972cffbdec1ff87f5b37d70e9278e39b58d2c66a20d7a089c81e43c0d", 0x3d3}], 0x1) 2018/04/16 23:22:30 executing program 1: clone(0x200, &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000000500)='./file0\x00', 0x83, 0x8) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080), 0xc) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000480), &(0x7f00006fcff0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)="636772312e8a43cb6f75702e6576656e747300", 0x0, 0x0) r1 = inotify_init1(0x4000000000000803) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000280)={{0x4, 0x5}, 'port1\x00', 0x6f40b7c95600a1e9, 0x83d, 0xff0000, 0xfffffffffffffffa, 0x8, 0x9000000000, 0x401, 0x0, 0x2, 0xe4}) r3 = getpgrp(r2) kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x400000, 0x0) setsockopt$packet_int(r4, 0x107, 0x7, &(0x7f0000000740)=0x2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)="d1d35c28c9a2940ff92d92cf5ba99dbd095c407a47aee16bd9fba4aa14c8b45950fc2ab852e6d0beb1087f244343358f379574c393d75b0d12d48fa3caa8455d0e9c92d2c81682adb435103b73129d829a840c501aa5c4284cdbc4d1729fb7666889febd3c69f3d47e8d03d1d931768918a07a614ccd6dd70e01808b3288dc1a2c203ab3252cda9e26aefcd1d5a0d633af9407d2d4bcf067a896cae139c19d2491f723dda8d03445824da761af13cad98310c06c3cfc1c03e84784a88cb75bd08c373e05cf1fd629c62714e5595e28323552b147f54a56c12801d1") ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)) r5 = socket$inet(0x2, 0xfffffffffffffffd, 0x0) connect(r5, &(0x7f0000000600)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x4, 0x80, "ab7d48bfd11a3e7a60aa13ac7038ef595132145fd73a3831bf9ebbf8ba02fddd251584133faf65deeb9e6b927bda4629855f75a594a70a003ee8e259f5ef07", 0x31}, 0x80) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000a80)="a33af9140719e3bb3bfa5097cbfa66e055f5e591237fdb26a7738177fd5ddac52529c334c8a4cc1e1d663365fd3f5d8b1c460b1a8064b854af4e59028c0c4e1af3c97e94f649b15c5fba9e2d6dbe36efb4ed110c76fc4457606b5209a808883eb39c5b60f948b4f875e2f82ac3af36a005fce179f20154bd6a5f6cfc4079170ce6fad80ef16734065f61bc2cdc2ca5c1a562f63c9f8f0286def6fed118b2637cf2873e943b13a3e52f33db60acada1c0181e978275891731a178295c6f53583c0fd378986c07ae67540b65db6a5ae647405a4b78b95abeb920a24ddfa70194bdd95bd20cb6d6561971e4fc68953bb68041eb78303c4805", 0xf7) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002}, 0x8) r6 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4000000000007, 0x181000) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000780)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@empty, r8}, 0x14) bind(r0, &(0x7f0000000680)=@nfc_llcp={0x27, 0x0, 0x1, 0x2, 0x73e, 0x6, "eb0aefa6d93c315c4580d2d7106217cb5f01ed0a6f59eed9592f177190886947a1f0c703e0f1de4057847e5fc122954fffa1b84263635a0f5ec3dc61a21711", 0x15}, 0x80) r9 = shmget(0x0, 0x9000, 0x402, &(0x7f0000ff7000/0x9000)=nil) shmctl$SHM_STAT(r9, 0xd, &(0x7f0000000280)=""/86) 2018/04/16 23:22:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)='C', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f00000002c0)="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", 0x5c1, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/16 23:22:30 executing program 3: clone(0x200, &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000000500)='./file0\x00', 0x83, 0x8) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080), 0xc) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000480), &(0x7f00006fcff0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)="636772312e8a43cb6f75702e6576656e747300", 0x0, 0x0) r1 = inotify_init1(0x4000000000000803) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000280)={{0x4, 0x5}, 'port1\x00', 0x6f40b7c95600a1e9, 0x83d, 0xff0000, 0xfffffffffffffffa, 0x8, 0x9000000000, 0x401, 0x0, 0x2, 0xe4}) r3 = getpgrp(r2) kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x400000, 0x0) setsockopt$packet_int(r4, 0x107, 0x7, &(0x7f0000000740)=0x2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)="d1d35c28c9a2940ff92d92cf5ba99dbd095c407a47aee16bd9fba4aa14c8b45950fc2ab852e6d0beb1087f244343358f379574c393d75b0d12d48fa3caa8455d0e9c92d2c81682adb435103b73129d829a840c501aa5c4284cdbc4d1729fb7666889febd3c69f3d47e8d03d1d931768918a07a614ccd6dd70e01808b3288dc1a2c203ab3252cda9e26aefcd1d5a0d633af9407d2d4bcf067a896cae139c19d2491f723dda8d03445824da761af13cad98310c06c3cfc1c03e84784a88cb75bd08c373e05cf1fd629c62714e5595e28323552b147f54a56c12801d1") ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)) r5 = socket$inet(0x2, 0xfffffffffffffffd, 0x0) connect(r5, &(0x7f0000000600)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x4, 0x80, "ab7d48bfd11a3e7a60aa13ac7038ef595132145fd73a3831bf9ebbf8ba02fddd251584133faf65deeb9e6b927bda4629855f75a594a70a003ee8e259f5ef07", 0x31}, 0x80) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000a80)="a33af9140719e3bb3bfa5097cbfa66e055f5e591237fdb26a7738177fd5ddac52529c334c8a4cc1e1d663365fd3f5d8b1c460b1a8064b854af4e59028c0c4e1af3c97e94f649b15c5fba9e2d6dbe36efb4ed110c76fc4457606b5209a808883eb39c5b60f948b4f875e2f82ac3af36a005fce179f20154bd6a5f6cfc4079170ce6fad80ef16734065f61bc2cdc2ca5c1a562f63c9f8f0286def6fed118b2637cf2873e943b13a3e52f33db60acada1c0181e978275891731a178295c6f53583c0fd378986c07ae67540b65db6a5ae647405a4b78b95abeb920a24ddfa70194bdd95bd20cb6d6561971e4fc68953bb68041eb78303c4805", 0xf7) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002}, 0x8) r6 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4000000000007, 0x181000) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000780)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@empty, r8}, 0x14) bind(r0, &(0x7f0000000680)=@nfc_llcp={0x27, 0x0, 0x1, 0x2, 0x73e, 0x6, "eb0aefa6d93c315c4580d2d7106217cb5f01ed0a6f59eed9592f177190886947a1f0c703e0f1de4057847e5fc122954fffa1b84263635a0f5ec3dc61a21711", 0x15}, 0x80) r9 = shmget(0x0, 0x9000, 0x402, &(0x7f0000ff7000/0x9000)=nil) shmctl$SHM_STAT(r9, 0xd, &(0x7f0000000280)=""/86) 2018/04/16 23:22:30 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}}}}}}, 0x0) r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f0000000340)="d44d3e4c", 0x4) 2018/04/16 23:22:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(aes-aesni))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f7e000)={0x0, 0x0, &(0x7f0000f7efd0), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [], 0xa, "650be17bfba3"}, 0x11) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/16 23:22:30 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000), 0x4) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0), 0x10) [ 1041.174694] device bridge_slave_1 left promiscuous mode [ 1041.180450] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:22:31 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}}}}}}, 0x0) r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f0000000340)="d44d3e4c", 0x4) 2018/04/16 23:22:31 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000), 0x4) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0), 0x10) 2018/04/16 23:22:31 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x1, 0x4000020030}, 0xc) sendto$inet6(r0, &(0x7f0000000140)='{', 0x1, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000280)='h', 0x1}], 0x1) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000a80)="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", 0x2b1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240), 0x20) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) writev(r0, &(0x7f0000000380)=[{&(0x7f0000002080)="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", 0x3d3}], 0x1) [ 1041.252683] device bridge_slave_0 left promiscuous mode [ 1041.258345] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:22:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(aes-aesni))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f7e000)={0x0, 0x0, &(0x7f0000f7efd0), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [], 0xa, "650be17bfba3"}, 0x11) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) [ 1041.366543] IPVS: ftp: loaded support on port[0] = 21 [ 1041.386561] team0 (unregistering): Port device team_slave_1 removed [ 1041.418729] team0 (unregistering): Port device team_slave_0 removed [ 1041.444140] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1041.468588] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1041.509511] bond0 (unregistering): Released all slaves [ 1042.188677] bridge0: port 1(bridge_slave_0) entered blocking state [ 1042.195135] bridge0: port 1(bridge_slave_0) entered disabled state [ 1042.203354] device bridge_slave_0 entered promiscuous mode [ 1042.241493] bridge0: port 2(bridge_slave_1) entered blocking state [ 1042.247955] bridge0: port 2(bridge_slave_1) entered disabled state [ 1042.255819] device bridge_slave_1 entered promiscuous mode [ 1042.294119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1042.331667] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1042.443626] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1042.485750] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1042.646520] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1042.653924] team0: Port device team_slave_0 added [ 1042.690160] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1042.697538] team0: Port device team_slave_1 added [ 1042.723564] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1042.764153] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1042.801820] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1042.808913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1042.818232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1042.838790] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1042.845882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1042.854484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1043.073977] bridge0: port 2(bridge_slave_1) entered blocking state [ 1043.080419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1043.087131] bridge0: port 1(bridge_slave_0) entered blocking state [ 1043.093511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1043.100879] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1043.215139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1043.949543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1044.030708] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1044.113587] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1044.119798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1044.127456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1044.207698] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000bc1fa8)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000615000)="8ac6101a42bc0331887b74bf7955b93232222977e2afec0319e39c2a5f666ba77d0829df485655cf8108dd6b2087155292b10c63f08a253ac7526b20738a1fde9a59fd5717ac4182a7ae182ee77f6c0d4e05cbe6a679257180c863c5078328685be3fb102b93fa25e8e2a0dd862583c672b9c4da3b21c5", 0x77) 2018/04/16 23:22:34 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000), 0x4) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0), 0x10) 2018/04/16 23:22:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x9, 0x2000000000000060, 0x0, 0x0, 0x25dfdbfe}, 0x80}, 0x1}, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r3, r3, &(0x7f00000000c0), 0x10001) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000fbf000)={{0x80}, 'port0\x00'}) sched_setattr(r1, &(0x7f0000000100)={0x30, 0x0, 0x1, 0xdf, 0xe2a7, 0x0, 0x1, 0x2}, 0x0) 2018/04/16 23:22:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)) 2018/04/16 23:22:34 executing program 1: clone(0x200, &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000000500)='./file0\x00', 0x83, 0x8) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080), 0xc) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000480), &(0x7f00006fcff0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)="636772312e8a43cb6f75702e6576656e747300", 0x0, 0x0) r1 = inotify_init1(0x4000000000000803) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000280)={{0x4, 0x5}, 'port1\x00', 0x6f40b7c95600a1e9, 0x83d, 0xff0000, 0xfffffffffffffffa, 0x8, 0x9000000000, 0x401, 0x0, 0x2, 0xe4}) r3 = getpgrp(r2) kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x400000, 0x0) setsockopt$packet_int(r4, 0x107, 0x7, &(0x7f0000000740)=0x2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)="d1d35c28c9a2940ff92d92cf5ba99dbd095c407a47aee16bd9fba4aa14c8b45950fc2ab852e6d0beb1087f244343358f379574c393d75b0d12d48fa3caa8455d0e9c92d2c81682adb435103b73129d829a840c501aa5c4284cdbc4d1729fb7666889febd3c69f3d47e8d03d1d931768918a07a614ccd6dd70e01808b3288dc1a2c203ab3252cda9e26aefcd1d5a0d633af9407d2d4bcf067a896cae139c19d2491f723dda8d03445824da761af13cad98310c06c3cfc1c03e84784a88cb75bd08c373e05cf1fd629c62714e5595e28323552b147f54a56c12801d1") ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)) r5 = socket$inet(0x2, 0xfffffffffffffffd, 0x0) connect(r5, &(0x7f0000000600)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x4, 0x80, "ab7d48bfd11a3e7a60aa13ac7038ef595132145fd73a3831bf9ebbf8ba02fddd251584133faf65deeb9e6b927bda4629855f75a594a70a003ee8e259f5ef07", 0x31}, 0x80) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000a80)="a33af9140719e3bb3bfa5097cbfa66e055f5e591237fdb26a7738177fd5ddac52529c334c8a4cc1e1d663365fd3f5d8b1c460b1a8064b854af4e59028c0c4e1af3c97e94f649b15c5fba9e2d6dbe36efb4ed110c76fc4457606b5209a808883eb39c5b60f948b4f875e2f82ac3af36a005fce179f20154bd6a5f6cfc4079170ce6fad80ef16734065f61bc2cdc2ca5c1a562f63c9f8f0286def6fed118b2637cf2873e943b13a3e52f33db60acada1c0181e978275891731a178295c6f53583c0fd378986c07ae67540b65db6a5ae647405a4b78b95abeb920a24ddfa70194bdd95bd20cb6d6561971e4fc68953bb68041eb78303c4805", 0xf7) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002}, 0x8) r6 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4000000000007, 0x181000) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000780)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@empty, r8}, 0x14) bind(r0, &(0x7f0000000680)=@nfc_llcp={0x27, 0x0, 0x1, 0x2, 0x73e, 0x6, "eb0aefa6d93c315c4580d2d7106217cb5f01ed0a6f59eed9592f177190886947a1f0c703e0f1de4057847e5fc122954fffa1b84263635a0f5ec3dc61a21711", 0x15}, 0x80) r9 = shmget(0x0, 0x9000, 0x402, &(0x7f0000ff7000/0x9000)=nil) shmctl$SHM_STAT(r9, 0xd, &(0x7f0000000280)=""/86) 2018/04/16 23:22:34 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000694ffe)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0x0, 0x4e22, 0x8}}}}}}, &(0x7f0000775000)) 2018/04/16 23:22:34 executing program 3: clone(0x200, &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000000500)='./file0\x00', 0x83, 0x8) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080), 0xc) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000480), &(0x7f00006fcff0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)="636772312e8a43cb6f75702e6576656e747300", 0x0, 0x0) r1 = inotify_init1(0x4000000000000803) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000280)={{0x4, 0x5}, 'port1\x00', 0x6f40b7c95600a1e9, 0x83d, 0xff0000, 0xfffffffffffffffa, 0x8, 0x9000000000, 0x401, 0x0, 0x2, 0xe4}) r3 = getpgrp(r2) kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x400000, 0x0) setsockopt$packet_int(r4, 0x107, 0x7, &(0x7f0000000740)=0x2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)="d1d35c28c9a2940ff92d92cf5ba99dbd095c407a47aee16bd9fba4aa14c8b45950fc2ab852e6d0beb1087f244343358f379574c393d75b0d12d48fa3caa8455d0e9c92d2c81682adb435103b73129d829a840c501aa5c4284cdbc4d1729fb7666889febd3c69f3d47e8d03d1d931768918a07a614ccd6dd70e01808b3288dc1a2c203ab3252cda9e26aefcd1d5a0d633af9407d2d4bcf067a896cae139c19d2491f723dda8d03445824da761af13cad98310c06c3cfc1c03e84784a88cb75bd08c373e05cf1fd629c62714e5595e28323552b147f54a56c12801d1") ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)) r5 = socket$inet(0x2, 0xfffffffffffffffd, 0x0) connect(r5, &(0x7f0000000600)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x4, 0x80, "ab7d48bfd11a3e7a60aa13ac7038ef595132145fd73a3831bf9ebbf8ba02fddd251584133faf65deeb9e6b927bda4629855f75a594a70a003ee8e259f5ef07", 0x31}, 0x80) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000a80)="a33af9140719e3bb3bfa5097cbfa66e055f5e591237fdb26a7738177fd5ddac52529c334c8a4cc1e1d663365fd3f5d8b1c460b1a8064b854af4e59028c0c4e1af3c97e94f649b15c5fba9e2d6dbe36efb4ed110c76fc4457606b5209a808883eb39c5b60f948b4f875e2f82ac3af36a005fce179f20154bd6a5f6cfc4079170ce6fad80ef16734065f61bc2cdc2ca5c1a562f63c9f8f0286def6fed118b2637cf2873e943b13a3e52f33db60acada1c0181e978275891731a178295c6f53583c0fd378986c07ae67540b65db6a5ae647405a4b78b95abeb920a24ddfa70194bdd95bd20cb6d6561971e4fc68953bb68041eb78303c4805", 0xf7) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002}, 0x8) r6 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4000000000007, 0x181000) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000780)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@empty, r8}, 0x14) bind(r0, &(0x7f0000000680)=@nfc_llcp={0x27, 0x0, 0x1, 0x2, 0x73e, 0x6, "eb0aefa6d93c315c4580d2d7106217cb5f01ed0a6f59eed9592f177190886947a1f0c703e0f1de4057847e5fc122954fffa1b84263635a0f5ec3dc61a21711", 0x15}, 0x80) r9 = shmget(0x0, 0x9000, 0x402, &(0x7f0000ff7000/0x9000)=nil) shmctl$SHM_STAT(r9, 0xd, &(0x7f0000000280)=""/86) 2018/04/16 23:22:34 executing program 4: clone(0x200, &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000000500)='./file0\x00', 0x83, 0x8) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080), 0xc) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000480), &(0x7f00006fcff0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)="636772312e8a43cb6f75702e6576656e747300", 0x0, 0x0) r1 = inotify_init1(0x4000000000000803) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000280)={{0x4, 0x5}, 'port1\x00', 0x6f40b7c95600a1e9, 0x83d, 0xff0000, 0xfffffffffffffffa, 0x8, 0x9000000000, 0x401, 0x0, 0x2, 0xe4}) r3 = getpgrp(r2) kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x400000, 0x0) setsockopt$packet_int(r4, 0x107, 0x7, &(0x7f0000000740)=0x2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)="d1d35c28c9a2940ff92d92cf5ba99dbd095c407a47aee16bd9fba4aa14c8b45950fc2ab852e6d0beb1087f244343358f379574c393d75b0d12d48fa3caa8455d0e9c92d2c81682adb435103b73129d829a840c501aa5c4284cdbc4d1729fb7666889febd3c69f3d47e8d03d1d931768918a07a614ccd6dd70e01808b3288dc1a2c203ab3252cda9e26aefcd1d5a0d633af9407d2d4bcf067a896cae139c19d2491f723dda8d03445824da761af13cad98310c06c3cfc1c03e84784a88cb75bd08c373e05cf1fd629c62714e5595e28323552b147f54a56c12801d1") ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)) r5 = socket$inet(0x2, 0xfffffffffffffffd, 0x0) connect(r5, &(0x7f0000000600)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x4, 0x80, "ab7d48bfd11a3e7a60aa13ac7038ef595132145fd73a3831bf9ebbf8ba02fddd251584133faf65deeb9e6b927bda4629855f75a594a70a003ee8e259f5ef07", 0x31}, 0x80) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000a80)="a33af9140719e3bb3bfa5097cbfa66e055f5e591237fdb26a7738177fd5ddac52529c334c8a4cc1e1d663365fd3f5d8b1c460b1a8064b854af4e59028c0c4e1af3c97e94f649b15c5fba9e2d6dbe36efb4ed110c76fc4457606b5209a808883eb39c5b60f948b4f875e2f82ac3af36a005fce179f20154bd6a5f6cfc4079170ce6fad80ef16734065f61bc2cdc2ca5c1a562f63c9f8f0286def6fed118b2637cf2873e943b13a3e52f33db60acada1c0181e978275891731a178295c6f53583c0fd378986c07ae67540b65db6a5ae647405a4b78b95abeb920a24ddfa70194bdd95bd20cb6d6561971e4fc68953bb68041eb78303c4805", 0xf7) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002}, 0x8) r6 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4000000000007, 0x181000) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000780)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@empty, r8}, 0x14) bind(r0, &(0x7f0000000680)=@nfc_llcp={0x27, 0x0, 0x1, 0x2, 0x73e, 0x6, "eb0aefa6d93c315c4580d2d7106217cb5f01ed0a6f59eed9592f177190886947a1f0c703e0f1de4057847e5fc122954fffa1b84263635a0f5ec3dc61a21711", 0x15}, 0x80) r9 = shmget(0x0, 0x9000, 0x402, &(0x7f0000ff7000/0x9000)=nil) shmctl$SHM_STAT(r9, 0xd, &(0x7f0000000280)=""/86) 2018/04/16 23:22:34 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000), 0x4) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0), 0x10) 2018/04/16 23:22:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x9, 0x2000000000000060, 0x0, 0x0, 0x25dfdbfe}, 0x80}, 0x1}, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r3, r3, &(0x7f00000000c0), 0x10001) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000fbf000)={{0x80}, 'port0\x00'}) sched_setattr(r1, &(0x7f0000000100)={0x30, 0x0, 0x1, 0xdf, 0xe2a7, 0x0, 0x1, 0x2}, 0x0) 2018/04/16 23:22:34 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x80000000ff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x8}, 0x1c) sendmsg$key(r0, &(0x7f0000000040)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@broadcast=0xffffffff, @in=@local={0xac, 0x14, 0x14, 0xaa}}]}, 0x38}, 0x1}, 0x0) 2018/04/16 23:22:34 executing program 0: socketpair$unix(0x1, 0x8000000003, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f00005f9000)=""/202, 0xca) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x3a5) shutdown(r0, 0x0) 2018/04/16 23:22:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x9, 0x2000000000000060, 0x0, 0x0, 0x25dfdbfe}, 0x80}, 0x1}, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r3, r3, &(0x7f00000000c0), 0x10001) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000fbf000)={{0x80}, 'port0\x00'}) sched_setattr(r1, &(0x7f0000000100)={0x30, 0x0, 0x1, 0xdf, 0xe2a7, 0x0, 0x1, 0x2}, 0x0) [ 1044.950269] device bridge_slave_1 left promiscuous mode [ 1044.955950] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:22:34 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x80000000ff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x8}, 0x1c) sendmsg$key(r0, &(0x7f0000000040)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@broadcast=0xffffffff, @in=@local={0xac, 0x14, 0x14, 0xaa}}]}, 0x38}, 0x1}, 0x0) 2018/04/16 23:22:34 executing program 7: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f00008fa000)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='K', 0x1, r0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000500)="cd", 0x1, r1) r3 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)="b33ab760d897c094255cf9fbf6a72319a95779ebe0d14f729cd653e520d29ad7ef0000000000000044c249b544230b9387fb8bd6ed266ccf59ef70995bf2e8e0ecd3fff32853747eda22d2818d08ca27e0ec821620e365a0e6b9485f2d925493f62113e33e5f8c7eba67fc19a9497f5b07e5849d2e875b066cd6401d36616fe0f3c3002801b4627ee7597689525e8e81f750a86eb580fb4690ea52246bd34b1f50ae08c5387ed8fd2498b600579f3af3f864e1c324f6928f0000000000000000", 0xc0, r1) r4 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000626000)={0x73, 0x79, 0x7a}, &(0x7f0000dde000)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r2, r3, r4}, &(0x7f00005cd000), 0x3d1, &(0x7f000010c000)={&(0x7f0000bf4ff3)={'crc32\x00'}, &(0x7f0000000080)}) [ 1044.990947] device bridge_slave_0 left promiscuous mode [ 1044.996577] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:22:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x9, 0x2000000000000060, 0x0, 0x0, 0x25dfdbfe}, 0x80}, 0x1}, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r3, r3, &(0x7f00000000c0), 0x10001) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000fbf000)={{0x80}, 'port0\x00'}) sched_setattr(r1, &(0x7f0000000100)={0x30, 0x0, 0x1, 0xdf, 0xe2a7, 0x0, 0x1, 0x2}, 0x0) [ 1045.104739] IPVS: ftp: loaded support on port[0] = 21 [ 1045.151602] team0 (unregistering): Port device team_slave_1 removed [ 1045.177222] team0 (unregistering): Port device team_slave_0 removed [ 1045.191993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1045.209900] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1045.240420] bond0 (unregistering): Released all slaves [ 1045.891633] bridge0: port 1(bridge_slave_0) entered blocking state [ 1045.898083] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.905873] device bridge_slave_0 entered promiscuous mode [ 1045.946115] bridge0: port 2(bridge_slave_1) entered blocking state [ 1045.952556] bridge0: port 2(bridge_slave_1) entered disabled state [ 1045.960332] device bridge_slave_1 entered promiscuous mode [ 1045.998743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1046.036998] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1046.158974] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1046.200752] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1046.379279] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1046.386906] team0: Port device team_slave_0 added [ 1046.416893] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1046.424836] team0: Port device team_slave_1 added [ 1046.464570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1046.503674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1046.539827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1046.581093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1046.833894] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.840310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1046.846977] bridge0: port 1(bridge_slave_0) entered blocking state [ 1046.853350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1046.860925] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1047.739504] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1047.775247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1047.834500] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1047.916627] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1047.922838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1047.930471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1048.011209] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:38 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), 0xee, 0x0, &(0x7f0000000180)="1aa346327176417cc74d05cb8d732cb1f102fb4aee379940f1cd956ca70f629dd35512c0f4f0ac23f542c9d20d327b7522d6b8540bcdeaf8f36e8f8058aa14288c158dc61a1e9762fc104dfff5800964974d9e9fb08e57f0f14f7505cd018a451c48c4f856f7b6984a17875f7aecbfa58866610356aae21b9f3968dad04ed9128de7ad2c2a5f853b812a9210dd8894b83e0f07cbe319d29772609d0cb973e9e7d6059a8e2167d0a119cb3fc1a41728b34302b79158af887d035160fbf7f6a6f971fef33eca743b8718bbfb96fbd5b9983fc4c198b647eebd038c5ea000000000000000000000000000000050d3b1"}) 2018/04/16 23:22:38 executing program 4: clone(0x200, &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000000500)='./file0\x00', 0x83, 0x8) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080), 0xc) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000480), &(0x7f00006fcff0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)="636772312e8a43cb6f75702e6576656e747300", 0x0, 0x0) r1 = inotify_init1(0x4000000000000803) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000280)={{0x4, 0x5}, 'port1\x00', 0x6f40b7c95600a1e9, 0x83d, 0xff0000, 0xfffffffffffffffa, 0x8, 0x9000000000, 0x401, 0x0, 0x2, 0xe4}) r3 = getpgrp(r2) kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x400000, 0x0) setsockopt$packet_int(r4, 0x107, 0x7, &(0x7f0000000740)=0x2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)="d1d35c28c9a2940ff92d92cf5ba99dbd095c407a47aee16bd9fba4aa14c8b45950fc2ab852e6d0beb1087f244343358f379574c393d75b0d12d48fa3caa8455d0e9c92d2c81682adb435103b73129d829a840c501aa5c4284cdbc4d1729fb7666889febd3c69f3d47e8d03d1d931768918a07a614ccd6dd70e01808b3288dc1a2c203ab3252cda9e26aefcd1d5a0d633af9407d2d4bcf067a896cae139c19d2491f723dda8d03445824da761af13cad98310c06c3cfc1c03e84784a88cb75bd08c373e05cf1fd629c62714e5595e28323552b147f54a56c12801d1") ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)) r5 = socket$inet(0x2, 0xfffffffffffffffd, 0x0) connect(r5, &(0x7f0000000600)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x4, 0x80, "ab7d48bfd11a3e7a60aa13ac7038ef595132145fd73a3831bf9ebbf8ba02fddd251584133faf65deeb9e6b927bda4629855f75a594a70a003ee8e259f5ef07", 0x31}, 0x80) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000a80)="a33af9140719e3bb3bfa5097cbfa66e055f5e591237fdb26a7738177fd5ddac52529c334c8a4cc1e1d663365fd3f5d8b1c460b1a8064b854af4e59028c0c4e1af3c97e94f649b15c5fba9e2d6dbe36efb4ed110c76fc4457606b5209a808883eb39c5b60f948b4f875e2f82ac3af36a005fce179f20154bd6a5f6cfc4079170ce6fad80ef16734065f61bc2cdc2ca5c1a562f63c9f8f0286def6fed118b2637cf2873e943b13a3e52f33db60acada1c0181e978275891731a178295c6f53583c0fd378986c07ae67540b65db6a5ae647405a4b78b95abeb920a24ddfa70194bdd95bd20cb6d6561971e4fc68953bb68041eb78303c4805", 0xf7) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002}, 0x8) r6 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4000000000007, 0x181000) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000780)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@empty, r8}, 0x14) bind(r0, &(0x7f0000000680)=@nfc_llcp={0x27, 0x0, 0x1, 0x2, 0x73e, 0x6, "eb0aefa6d93c315c4580d2d7106217cb5f01ed0a6f59eed9592f177190886947a1f0c703e0f1de4057847e5fc122954fffa1b84263635a0f5ec3dc61a21711", 0x15}, 0x80) r9 = shmget(0x0, 0x9000, 0x402, &(0x7f0000ff7000/0x9000)=nil) shmctl$SHM_STAT(r9, 0xd, &(0x7f0000000280)=""/86) 2018/04/16 23:22:38 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x80000000ff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x8}, 0x1c) sendmsg$key(r0, &(0x7f0000000040)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@broadcast=0xffffffff, @in=@local={0xac, 0x14, 0x14, 0xaa}}]}, 0x38}, 0x1}, 0x0) 2018/04/16 23:22:38 executing program 7: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f00008fa000)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='K', 0x1, r0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000500)="cd", 0x1, r1) r3 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)="b33ab760d897c094255cf9fbf6a72319a95779ebe0d14f729cd653e520d29ad7ef0000000000000044c249b544230b9387fb8bd6ed266ccf59ef70995bf2e8e0ecd3fff32853747eda22d2818d08ca27e0ec821620e365a0e6b9485f2d925493f62113e33e5f8c7eba67fc19a9497f5b07e5849d2e875b066cd6401d36616fe0f3c3002801b4627ee7597689525e8e81f750a86eb580fb4690ea52246bd34b1f50ae08c5387ed8fd2498b600579f3af3f864e1c324f6928f0000000000000000", 0xc0, r1) r4 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000626000)={0x73, 0x79, 0x7a}, &(0x7f0000dde000)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r2, r3, r4}, &(0x7f00005cd000), 0x3d1, &(0x7f000010c000)={&(0x7f0000bf4ff3)={'crc32\x00'}, &(0x7f0000000080)}) 2018/04/16 23:22:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0xfffffffffffffffe) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000483ffc)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00003ad000)=ANY=[], &(0x7f00008f1ffc), 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000180)=""/106, &(0x7f0000000100)=0x1a2) 2018/04/16 23:22:38 executing program 3: clone(0x200, &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000000500)='./file0\x00', 0x83, 0x8) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080), 0xc) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000480), &(0x7f00006fcff0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)="636772312e8a43cb6f75702e6576656e747300", 0x0, 0x0) r1 = inotify_init1(0x4000000000000803) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000280)={{0x4, 0x5}, 'port1\x00', 0x6f40b7c95600a1e9, 0x83d, 0xff0000, 0xfffffffffffffffa, 0x8, 0x9000000000, 0x401, 0x0, 0x2, 0xe4}) r3 = getpgrp(r2) kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x400000, 0x0) setsockopt$packet_int(r4, 0x107, 0x7, &(0x7f0000000740)=0x2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)="d1d35c28c9a2940ff92d92cf5ba99dbd095c407a47aee16bd9fba4aa14c8b45950fc2ab852e6d0beb1087f244343358f379574c393d75b0d12d48fa3caa8455d0e9c92d2c81682adb435103b73129d829a840c501aa5c4284cdbc4d1729fb7666889febd3c69f3d47e8d03d1d931768918a07a614ccd6dd70e01808b3288dc1a2c203ab3252cda9e26aefcd1d5a0d633af9407d2d4bcf067a896cae139c19d2491f723dda8d03445824da761af13cad98310c06c3cfc1c03e84784a88cb75bd08c373e05cf1fd629c62714e5595e28323552b147f54a56c12801d1") ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)) r5 = socket$inet(0x2, 0xfffffffffffffffd, 0x0) connect(r5, &(0x7f0000000600)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x4, 0x80, "ab7d48bfd11a3e7a60aa13ac7038ef595132145fd73a3831bf9ebbf8ba02fddd251584133faf65deeb9e6b927bda4629855f75a594a70a003ee8e259f5ef07", 0x31}, 0x80) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000a80)="a33af9140719e3bb3bfa5097cbfa66e055f5e591237fdb26a7738177fd5ddac52529c334c8a4cc1e1d663365fd3f5d8b1c460b1a8064b854af4e59028c0c4e1af3c97e94f649b15c5fba9e2d6dbe36efb4ed110c76fc4457606b5209a808883eb39c5b60f948b4f875e2f82ac3af36a005fce179f20154bd6a5f6cfc4079170ce6fad80ef16734065f61bc2cdc2ca5c1a562f63c9f8f0286def6fed118b2637cf2873e943b13a3e52f33db60acada1c0181e978275891731a178295c6f53583c0fd378986c07ae67540b65db6a5ae647405a4b78b95abeb920a24ddfa70194bdd95bd20cb6d6561971e4fc68953bb68041eb78303c4805", 0xf7) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002}, 0x8) r6 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4000000000007, 0x181000) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000780)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@empty, r8}, 0x14) bind(r0, &(0x7f0000000680)=@nfc_llcp={0x27, 0x0, 0x1, 0x2, 0x73e, 0x6, "eb0aefa6d93c315c4580d2d7106217cb5f01ed0a6f59eed9592f177190886947a1f0c703e0f1de4057847e5fc122954fffa1b84263635a0f5ec3dc61a21711", 0x15}, 0x80) r9 = shmget(0x0, 0x9000, 0x402, &(0x7f0000ff7000/0x9000)=nil) shmctl$SHM_STAT(r9, 0xd, &(0x7f0000000280)=""/86) 2018/04/16 23:22:38 executing program 0: socketpair$unix(0x1, 0x8000000003, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f00005f9000)=""/202, 0xca) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x3a5) shutdown(r0, 0x0) 2018/04/16 23:22:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x400c6615, 0x0) 2018/04/16 23:22:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x400c6615, 0x0) 2018/04/16 23:22:38 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x80000000ff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x8}, 0x1c) sendmsg$key(r0, &(0x7f0000000040)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@broadcast=0xffffffff, @in=@local={0xac, 0x14, 0x14, 0xaa}}]}, 0x38}, 0x1}, 0x0) 2018/04/16 23:22:38 executing program 7: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f00008fa000)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='K', 0x1, r0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000500)="cd", 0x1, r1) r3 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)="b33ab760d897c094255cf9fbf6a72319a95779ebe0d14f729cd653e520d29ad7ef0000000000000044c249b544230b9387fb8bd6ed266ccf59ef70995bf2e8e0ecd3fff32853747eda22d2818d08ca27e0ec821620e365a0e6b9485f2d925493f62113e33e5f8c7eba67fc19a9497f5b07e5849d2e875b066cd6401d36616fe0f3c3002801b4627ee7597689525e8e81f750a86eb580fb4690ea52246bd34b1f50ae08c5387ed8fd2498b600579f3af3f864e1c324f6928f0000000000000000", 0xc0, r1) r4 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000626000)={0x73, 0x79, 0x7a}, &(0x7f0000dde000)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r2, r3, r4}, &(0x7f00005cd000), 0x3d1, &(0x7f000010c000)={&(0x7f0000bf4ff3)={'crc32\x00'}, &(0x7f0000000080)}) 2018/04/16 23:22:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0xfffffffffffffffe) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000483ffc)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00003ad000)=ANY=[], &(0x7f00008f1ffc), 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000180)=""/106, &(0x7f0000000100)=0x1a2) 2018/04/16 23:22:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x400c6615, 0x0) [ 1048.765203] device bridge_slave_1 left promiscuous mode [ 1048.770907] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:22:38 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) execve(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000400), &(0x7f0000000580)=[&(0x7f0000000500)='lo![($bdev\'-cgroup\x00', &(0x7f0000000540)='\x00']) [ 1048.815865] device bridge_slave_0 left promiscuous mode [ 1048.821616] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:22:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x400c6615, 0x0) 2018/04/16 23:22:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0xfffffffffffffffe) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000483ffc)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00003ad000)=ANY=[], &(0x7f00008f1ffc), 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000180)=""/106, &(0x7f0000000100)=0x1a2) [ 1048.913317] IPVS: ftp: loaded support on port[0] = 21 [ 1048.966322] team0 (unregistering): Port device team_slave_1 removed [ 1048.981838] team0 (unregistering): Port device team_slave_0 removed [ 1048.995436] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1049.010725] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1049.043692] bond0 (unregistering): Released all slaves [ 1049.710202] bridge0: port 1(bridge_slave_0) entered blocking state [ 1049.716756] bridge0: port 1(bridge_slave_0) entered disabled state [ 1049.724504] device bridge_slave_0 entered promiscuous mode [ 1049.762528] bridge0: port 2(bridge_slave_1) entered blocking state [ 1049.768973] bridge0: port 2(bridge_slave_1) entered disabled state [ 1049.776716] device bridge_slave_1 entered promiscuous mode [ 1049.814384] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1049.853259] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1049.966954] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1050.006871] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1050.078967] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1050.086342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1050.198417] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1050.207348] team0: Port device team_slave_0 added [ 1050.245689] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1050.252919] team0: Port device team_slave_1 added [ 1050.286571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1050.327682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1050.359463] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1050.366564] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1050.374961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1050.395662] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1050.402737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1050.411367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1050.634582] bridge0: port 2(bridge_slave_1) entered blocking state [ 1050.640978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1050.647627] bridge0: port 1(bridge_slave_0) entered blocking state [ 1050.654005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1050.661294] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1051.103194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1051.488945] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1051.574213] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1051.653364] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1051.659585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1051.667261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1051.741310] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0xfffffffffffffffe) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000483ffc)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00003ad000)=ANY=[], &(0x7f00008f1ffc), 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000180)=""/106, &(0x7f0000000100)=0x1a2) 2018/04/16 23:22:42 executing program 7: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f00008fa000)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='K', 0x1, r0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000500)="cd", 0x1, r1) r3 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)="b33ab760d897c094255cf9fbf6a72319a95779ebe0d14f729cd653e520d29ad7ef0000000000000044c249b544230b9387fb8bd6ed266ccf59ef70995bf2e8e0ecd3fff32853747eda22d2818d08ca27e0ec821620e365a0e6b9485f2d925493f62113e33e5f8c7eba67fc19a9497f5b07e5849d2e875b066cd6401d36616fe0f3c3002801b4627ee7597689525e8e81f750a86eb580fb4690ea52246bd34b1f50ae08c5387ed8fd2498b600579f3af3f864e1c324f6928f0000000000000000", 0xc0, r1) r4 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000626000)={0x73, 0x79, 0x7a}, &(0x7f0000dde000)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r2, r3, r4}, &(0x7f00005cd000), 0x3d1, &(0x7f000010c000)={&(0x7f0000bf4ff3)={'crc32\x00'}, &(0x7f0000000080)}) 2018/04/16 23:22:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x402c4580, &(0x7f0000000200)) 2018/04/16 23:22:42 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) execve(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000400), &(0x7f0000000580)=[&(0x7f0000000500)='lo![($bdev\'-cgroup\x00', &(0x7f0000000540)='\x00']) 2018/04/16 23:22:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f000034c000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000000000), 0x4) 2018/04/16 23:22:42 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) io_setup(0x6, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000240)}]) 2018/04/16 23:22:42 executing program 0: socketpair$unix(0x1, 0x8000000003, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f00005f9000)=""/202, 0xca) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x3a5) shutdown(r0, 0x0) 2018/04/16 23:22:42 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x400442c9, &(0x7f0000000040)) 2018/04/16 23:22:42 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) execve(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000400), &(0x7f0000000580)=[&(0x7f0000000500)='lo![($bdev\'-cgroup\x00', &(0x7f0000000540)='\x00']) 2018/04/16 23:22:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x402c4580, &(0x7f0000000200)) 2018/04/16 23:22:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f000034c000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000000000), 0x4) 2018/04/16 23:22:42 executing program 5: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0xc0045540, 0x6f2000, &(0x7f00000003c0)) 2018/04/16 23:22:42 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, 0x90, "4cfc53af93e19f7c55440ff1ddd530c35c7ed60c4120f2aed83b03f37e5f577e94b424adae66c2a3ba4fb45a09745abe9f90f674151d41ae05afcd4dc00a31665141054e163f5d2559bd9897c6a576e5bef2a9cc5a9271d9c0f74268ec82d4c17a2417c670a882cb17e98087484f0ce87eba04bd1f97613be1e46643f28250aa2e6735d4c0108bfa80d9a65f07941a74"}, &(0x7f0000001340)=0x98) [ 1052.450228] device bridge_slave_1 left promiscuous mode [ 1052.455848] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:22:42 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) execve(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000400), &(0x7f0000000580)=[&(0x7f0000000500)='lo![($bdev\'-cgroup\x00', &(0x7f0000000540)='\x00']) 2018/04/16 23:22:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f000034c000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000000000), 0x4) 2018/04/16 23:22:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x402c4580, &(0x7f0000000200)) [ 1052.506161] device bridge_slave_0 left promiscuous mode [ 1052.511945] bridge0: port 1(bridge_slave_0) entered disabled state [ 1052.648638] team0 (unregistering): Port device team_slave_1 removed [ 1052.659372] team0 (unregistering): Port device team_slave_0 removed [ 1052.669404] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1052.685619] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1052.713921] bond0 (unregistering): Released all slaves [ 1053.510475] IPVS: ftp: loaded support on port[0] = 21 [ 1053.899895] bridge0: port 1(bridge_slave_0) entered blocking state [ 1053.906309] bridge0: port 1(bridge_slave_0) entered disabled state [ 1053.913500] device bridge_slave_0 entered promiscuous mode [ 1053.939717] bridge0: port 2(bridge_slave_1) entered blocking state [ 1053.946116] bridge0: port 2(bridge_slave_1) entered disabled state [ 1053.953331] device bridge_slave_1 entered promiscuous mode [ 1053.980078] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1054.006385] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1054.080103] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1054.109134] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1054.222084] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1054.229382] team0: Port device team_slave_0 added [ 1054.253882] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1054.261147] team0: Port device team_slave_1 added [ 1054.286114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1054.313662] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1054.320577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1054.329139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1054.349886] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1054.356988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1054.365592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1054.386777] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1054.393884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1054.402649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1054.636464] bridge0: port 2(bridge_slave_1) entered blocking state [ 1054.642871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1054.649529] bridge0: port 1(bridge_slave_0) entered blocking state [ 1054.655905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1054.663366] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1055.328148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1055.542837] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1055.624785] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1055.709261] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1055.715658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1055.723451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1055.804386] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f000034c000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000000000), 0x4) 2018/04/16 23:22:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb9952989", 0xb) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="26fe6bbd22e1c516390d2def920057d19b8834c5f714cf28a5f622f9a64db7c134e76f50cc0e0ee56f0defcca50b1193fb7047512fe18f51719fca6026c58c80ff0b0bc389779cc6dcff86353e65b9762dc50a5f44059df2e170abc6589ac48030b9e1b75ebefea6b5e9ee4dc386ee149e41b0d09f970e0f4862943c663255f686", 0x81}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000001700)={&(0x7f0000001440)=@in={0x0, 0x0, @remote}, 0x80, &(0x7f00000015c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001600)=""/193, 0xc1}, 0x0) 2018/04/16 23:22:46 executing program 5: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0xc0045540, 0x6f2000, &(0x7f00000003c0)) 2018/04/16 23:22:46 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x69}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0xc, 0x0, 0xa}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/16 23:22:46 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, 0x90, "4cfc53af93e19f7c55440ff1ddd530c35c7ed60c4120f2aed83b03f37e5f577e94b424adae66c2a3ba4fb45a09745abe9f90f674151d41ae05afcd4dc00a31665141054e163f5d2559bd9897c6a576e5bef2a9cc5a9271d9c0f74268ec82d4c17a2417c670a882cb17e98087484f0ce87eba04bd1f97613be1e46643f28250aa2e6735d4c0108bfa80d9a65f07941a74"}, &(0x7f0000001340)=0x98) 2018/04/16 23:22:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000052aff8)='./file0\x00', 0x0) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000033ff8)='./file0\x00', 0x0) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f0000a16ff8)='./file0\x00', &(0x7f0000df2ffd)='\x00v\t', 0x1001, &(0x7f0000a06000)) unlinkat(r0, &(0x7f000057d000)='./file0\x00', 0x200) socket$bt_rfcomm(0x1f, 0x0, 0x3) mount(&(0x7f0000d56ffb)='./file0\x00', &(0x7f0000de2ff8)='.', &(0x7f00005e9000)='cifs\x00', 0x6000, &(0x7f0000ad5000)) 2018/04/16 23:22:46 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x402c4580, &(0x7f0000000200)) 2018/04/16 23:22:46 executing program 0: socketpair$unix(0x1, 0x8000000003, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f00005f9000)=""/202, 0xca) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x3a5) shutdown(r0, 0x0) 2018/04/16 23:22:46 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, 0x90, "4cfc53af93e19f7c55440ff1ddd530c35c7ed60c4120f2aed83b03f37e5f577e94b424adae66c2a3ba4fb45a09745abe9f90f674151d41ae05afcd4dc00a31665141054e163f5d2559bd9897c6a576e5bef2a9cc5a9271d9c0f74268ec82d4c17a2417c670a882cb17e98087484f0ce87eba04bd1f97613be1e46643f28250aa2e6735d4c0108bfa80d9a65f07941a74"}, &(0x7f0000001340)=0x98) 2018/04/16 23:22:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="79ff600000c000806c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/16 23:22:46 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f00000000c0)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x4000000011) 2018/04/16 23:22:46 executing program 5: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0xc0045540, 0x6f2000, &(0x7f00000003c0)) 2018/04/16 23:22:46 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x69}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0xc, 0x0, 0xa}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/16 23:22:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb9952989", 0xb) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="26fe6bbd22e1c516390d2def920057d19b8834c5f714cf28a5f622f9a64db7c134e76f50cc0e0ee56f0defcca50b1193fb7047512fe18f51719fca6026c58c80ff0b0bc389779cc6dcff86353e65b9762dc50a5f44059df2e170abc6589ac48030b9e1b75ebefea6b5e9ee4dc386ee149e41b0d09f970e0f4862943c663255f686", 0x81}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000001700)={&(0x7f0000001440)=@in={0x0, 0x0, @remote}, 0x80, &(0x7f00000015c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001600)=""/193, 0xc1}, 0x0) 2018/04/16 23:22:46 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, 0x90, "4cfc53af93e19f7c55440ff1ddd530c35c7ed60c4120f2aed83b03f37e5f577e94b424adae66c2a3ba4fb45a09745abe9f90f674151d41ae05afcd4dc00a31665141054e163f5d2559bd9897c6a576e5bef2a9cc5a9271d9c0f74268ec82d4c17a2417c670a882cb17e98087484f0ce87eba04bd1f97613be1e46643f28250aa2e6735d4c0108bfa80d9a65f07941a74"}, &(0x7f0000001340)=0x98) 2018/04/16 23:22:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="79ff600000c000806c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) [ 1056.585193] device bridge_slave_1 left promiscuous mode [ 1056.590840] bridge0: port 2(bridge_slave_1) entered disabled state [ 1056.632994] device bridge_slave_0 left promiscuous mode [ 1056.638661] bridge0: port 1(bridge_slave_0) entered disabled state [ 1056.719364] IPVS: ftp: loaded support on port[0] = 21 [ 1056.744992] team0 (unregistering): Port device team_slave_1 removed [ 1056.755310] team0 (unregistering): Port device team_slave_0 removed [ 1056.767109] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1056.786901] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1056.815724] bond0 (unregistering): Released all slaves [ 1057.431951] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.438403] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.450401] device bridge_slave_0 entered promiscuous mode [ 1057.488723] bridge0: port 2(bridge_slave_1) entered blocking state [ 1057.495170] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.503080] device bridge_slave_1 entered promiscuous mode [ 1057.542870] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1057.582351] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1057.697536] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1057.738508] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1057.919855] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1057.927970] team0: Port device team_slave_0 added [ 1057.962374] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1057.969590] team0: Port device team_slave_1 added [ 1058.006562] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1058.048297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1058.085597] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1058.092811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1058.104052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1058.133816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1058.394948] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.401366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1058.408067] bridge0: port 1(bridge_slave_0) entered blocking state [ 1058.414467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1058.422120] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1059.281846] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1059.366916] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1059.423554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1059.459183] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1059.465386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1059.472603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1059.551188] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:49 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="79ff600000c000806c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/16 23:22:49 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f00000000c0)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x4000000011) 2018/04/16 23:22:49 executing program 5: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0xc0045540, 0x6f2000, &(0x7f00000003c0)) 2018/04/16 23:22:49 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x69}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0xc, 0x0, 0xa}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/16 23:22:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="79ff600000c000806c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/16 23:22:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb9952989", 0xb) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="26fe6bbd22e1c516390d2def920057d19b8834c5f714cf28a5f622f9a64db7c134e76f50cc0e0ee56f0defcca50b1193fb7047512fe18f51719fca6026c58c80ff0b0bc389779cc6dcff86353e65b9762dc50a5f44059df2e170abc6589ac48030b9e1b75ebefea6b5e9ee4dc386ee149e41b0d09f970e0f4862943c663255f686", 0x81}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000001700)={&(0x7f0000001440)=@in={0x0, 0x0, @remote}, 0x80, &(0x7f00000015c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001600)=""/193, 0xc1}, 0x0) 2018/04/16 23:22:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x69}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0xc, 0x0, 0xa}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/16 23:22:49 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001200)="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", 0x200}]) 2018/04/16 23:22:49 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0xffffffffffffffcc, 0x5, 0x8, 0x0, 0xf7, 0x10200, 0x8, 0xff, 0x3b7a, 0x7ff, 0x1, 0x1ff, 0xfffffffffffffffc, 0x9, 0x1, 0x5, 0x100000000, 0x800, 0x2, 0x7fffffff, 0x7, 0xab6, 0x275, 0x100000001, 0x1, 0x3, 0x1f6, 0x4, 0x1, 0x0, 0x3ff, 0x1f, 0x5, 0x1, 0x1000, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x10, 0x9, 0x0, 0x1, 0xfffffffffffffff7, 0x5, 0x1000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) read(r0, &(0x7f00000002c0)=""/106, 0x6a) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x4, 0x602) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)=""/125) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = getpid() utimes(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={{0x77359400}, {0x77359400}}) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r5, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e22}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(r7, 0x0, 0x14, &(0x7f0000000400)=0x8, 0x4) getuid() r9 = creat(&(0x7f0000000440)='./file0\x00', 0xbff5b3a32572026e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000580)={r10, 0x401}, &(0x7f00000005c0)=0xc) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000600)={0x80000001, 0x1f, 0x2}) gettid() sendmsg$nl_netfilter(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000000ffffffff7000fdf4f9000200080033000000b9f0c45ade720e30d4773acc017e2ae6000000000000000000000000"], 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x14) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/12, 0xc}], 0x5) fcntl$setown(r2, 0x8, r4) r11 = gettid() perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(r11, r11) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/16 23:22:49 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x69}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0xc, 0x0, 0xa}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/16 23:22:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb9952989", 0xb) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="26fe6bbd22e1c516390d2def920057d19b8834c5f714cf28a5f622f9a64db7c134e76f50cc0e0ee56f0defcca50b1193fb7047512fe18f51719fca6026c58c80ff0b0bc389779cc6dcff86353e65b9762dc50a5f44059df2e170abc6589ac48030b9e1b75ebefea6b5e9ee4dc386ee149e41b0d09f970e0f4862943c663255f686", 0x81}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000001700)={&(0x7f0000001440)=@in={0x0, 0x0, @remote}, 0x80, &(0x7f00000015c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001600)=""/193, 0xc1}, 0x0) 2018/04/16 23:22:49 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="79ff600000c000806c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/16 23:22:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="79ff600000c000806c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/16 23:22:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x69}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0xc, 0x0, 0xa}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/16 23:22:50 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f00000000c0)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x4000000011) [ 1060.290387] bridge0: port 3(erspan0) entered blocking state [ 1060.296408] bridge0: port 3(erspan0) entered disabled state 2018/04/16 23:22:50 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x800000000000011, 0x800000002, 0x80) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bind(r1, &(0x7f00000000c0)=@llc={0x1a, 0x33f, 0x0, 0x7fffffff, 0x100000001, 0x1f, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000140)=0x3, 0x4) [ 1060.338154] device erspan0 entered promiscuous mode [ 1060.356234] bridge0: port 3(erspan0) entered blocking state [ 1060.362168] bridge0: port 3(erspan0) entered forwarding state [ 1060.382077] device bridge_slave_1 left promiscuous mode [ 1060.387664] bridge0: port 2(bridge_slave_1) entered disabled state [ 1060.420098] device bridge_slave_0 left promiscuous mode [ 1060.425753] bridge0: port 1(bridge_slave_0) entered disabled state [ 1060.451931] IPVS: ftp: loaded support on port[0] = 21 [ 1060.480072] team0 (unregistering): Port device team_slave_1 removed [ 1060.491163] team0 (unregistering): Port device team_slave_0 removed [ 1060.502402] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1060.518134] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1060.546105] bond0 (unregistering): Released all slaves [ 1061.193580] bridge0: port 1(bridge_slave_0) entered blocking state [ 1061.200052] bridge0: port 1(bridge_slave_0) entered disabled state [ 1061.207845] device bridge_slave_0 entered promiscuous mode [ 1061.245965] bridge0: port 2(bridge_slave_1) entered blocking state [ 1061.252401] bridge0: port 2(bridge_slave_1) entered disabled state [ 1061.260471] device bridge_slave_1 entered promiscuous mode [ 1061.298714] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1061.336640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1061.448648] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1061.489131] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1061.661255] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1061.668743] team0: Port device team_slave_0 added [ 1061.699887] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1061.707510] team0: Port device team_slave_1 added [ 1061.745114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1061.783117] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1061.820822] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1061.828070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1061.843772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1061.872857] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1061.879941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1061.889209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1062.105864] bridge0: port 2(bridge_slave_1) entered blocking state [ 1062.112259] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1062.118902] bridge0: port 1(bridge_slave_0) entered blocking state [ 1062.125263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1062.132589] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1062.623150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1062.981395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1063.062347] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1063.145876] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1063.152125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1063.159777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1063.240227] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f00000000c0)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x4000000011) 2018/04/16 23:22:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000001040)=0x1ff, 0x4) connect$inet6(r0, &(0x7f00001cd000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/16 23:22:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x69}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0xc, 0x0, 0xa}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/16 23:22:53 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="79ff600000c000806c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/16 23:22:53 executing program 1: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6e, &(0x7f00000f8000)={@random="cd390b081bf2", @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "08de06", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0xffffff84, 0x0, @loopback={0x0, 0x1}, @loopback={0x0, 0x1}, [], "fca967e17f791010"}}}}}}}, 0x0) 2018/04/16 23:22:53 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x800000000000011, 0x800000002, 0x80) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bind(r1, &(0x7f00000000c0)=@llc={0x1a, 0x33f, 0x0, 0x7fffffff, 0x100000001, 0x1f, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000140)=0x3, 0x4) 2018/04/16 23:22:53 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0xffffffffffffffcc, 0x5, 0x8, 0x0, 0xf7, 0x10200, 0x8, 0xff, 0x3b7a, 0x7ff, 0x1, 0x1ff, 0xfffffffffffffffc, 0x9, 0x1, 0x5, 0x100000000, 0x800, 0x2, 0x7fffffff, 0x7, 0xab6, 0x275, 0x100000001, 0x1, 0x3, 0x1f6, 0x4, 0x1, 0x0, 0x3ff, 0x1f, 0x5, 0x1, 0x1000, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x10, 0x9, 0x0, 0x1, 0xfffffffffffffff7, 0x5, 0x1000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) read(r0, &(0x7f00000002c0)=""/106, 0x6a) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x4, 0x602) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)=""/125) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = getpid() utimes(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={{0x77359400}, {0x77359400}}) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r5, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e22}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(r7, 0x0, 0x14, &(0x7f0000000400)=0x8, 0x4) getuid() r9 = creat(&(0x7f0000000440)='./file0\x00', 0xbff5b3a32572026e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000580)={r10, 0x401}, &(0x7f00000005c0)=0xc) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000600)={0x80000001, 0x1f, 0x2}) gettid() sendmsg$nl_netfilter(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000000ffffffff7000fdf4f9000200080033000000b9f0c45ade720e30d4773acc017e2ae6000000000000000000000000"], 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x14) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/12, 0xc}], 0x5) fcntl$setown(r2, 0x8, r4) r11 = gettid() perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(r11, r11) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/16 23:22:53 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0xffffffffffffffcc, 0x5, 0x8, 0x0, 0xf7, 0x10200, 0x8, 0xff, 0x3b7a, 0x7ff, 0x1, 0x1ff, 0xfffffffffffffffc, 0x9, 0x1, 0x5, 0x100000000, 0x800, 0x2, 0x7fffffff, 0x7, 0xab6, 0x275, 0x100000001, 0x1, 0x3, 0x1f6, 0x4, 0x1, 0x0, 0x3ff, 0x1f, 0x5, 0x1, 0x1000, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x10, 0x9, 0x0, 0x1, 0xfffffffffffffff7, 0x5, 0x1000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) read(r0, &(0x7f00000002c0)=""/106, 0x6a) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x4, 0x602) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)=""/125) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = getpid() utimes(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={{0x77359400}, {0x77359400}}) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r5, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e22}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(r7, 0x0, 0x14, &(0x7f0000000400)=0x8, 0x4) getuid() r9 = creat(&(0x7f0000000440)='./file0\x00', 0xbff5b3a32572026e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000580)={r10, 0x401}, &(0x7f00000005c0)=0xc) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000600)={0x80000001, 0x1f, 0x2}) gettid() sendmsg$nl_netfilter(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000000ffffffff7000fdf4f9000200080033000000b9f0c45ade720e30d4773acc017e2ae6000000000000000000000000"], 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x14) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/12, 0xc}], 0x5) fcntl$setown(r2, 0x8, r4) r11 = gettid() perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(r11, r11) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/16 23:22:53 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x800000000000011, 0x800000002, 0x80) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bind(r1, &(0x7f00000000c0)=@llc={0x1a, 0x33f, 0x0, 0x7fffffff, 0x100000001, 0x1f, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000140)=0x3, 0x4) 2018/04/16 23:22:53 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0xffffffffffffffcc, 0x5, 0x8, 0x0, 0xf7, 0x10200, 0x8, 0xff, 0x3b7a, 0x7ff, 0x1, 0x1ff, 0xfffffffffffffffc, 0x9, 0x1, 0x5, 0x100000000, 0x800, 0x2, 0x7fffffff, 0x7, 0xab6, 0x275, 0x100000001, 0x1, 0x3, 0x1f6, 0x4, 0x1, 0x0, 0x3ff, 0x1f, 0x5, 0x1, 0x1000, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x10, 0x9, 0x0, 0x1, 0xfffffffffffffff7, 0x5, 0x1000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) read(r0, &(0x7f00000002c0)=""/106, 0x6a) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x4, 0x602) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)=""/125) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = getpid() utimes(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={{0x77359400}, {0x77359400}}) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r5, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e22}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(r7, 0x0, 0x14, &(0x7f0000000400)=0x8, 0x4) getuid() r9 = creat(&(0x7f0000000440)='./file0\x00', 0xbff5b3a32572026e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000580)={r10, 0x401}, &(0x7f00000005c0)=0xc) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000600)={0x80000001, 0x1f, 0x2}) gettid() sendmsg$nl_netfilter(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000000ffffffff7000fdf4f9000200080033000000b9f0c45ade720e30d4773acc017e2ae6000000000000000000000000"], 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x14) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/12, 0xc}], 0x5) fcntl$setown(r2, 0x8, r4) r11 = gettid() perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(r11, r11) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1063.961657] device bridge_slave_1 left promiscuous mode [ 1063.967528] bridge0: port 2(bridge_slave_1) entered disabled state [ 1064.012355] device bridge_slave_0 left promiscuous mode [ 1064.018180] bridge0: port 1(bridge_slave_0) entered disabled state [ 1064.061325] IPVS: ftp: loaded support on port[0] = 21 [ 1064.078598] team0 (unregistering): Port device team_slave_1 removed [ 1064.091320] team0 (unregistering): Port device team_slave_0 removed [ 1064.102275] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1064.120109] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1064.150948] bond0 (unregistering): Released all slaves [ 1064.169490] bridge0: port 3(erspan0) entered blocking state [ 1064.175388] bridge0: port 3(erspan0) entered disabled state [ 1064.182134] device erspan0 entered promiscuous mode [ 1064.187467] bridge0: port 3(erspan0) entered blocking state [ 1064.193236] bridge0: port 3(erspan0) entered forwarding state [ 1064.813971] bridge0: port 1(bridge_slave_0) entered blocking state [ 1064.820432] bridge0: port 1(bridge_slave_0) entered disabled state [ 1064.827869] device bridge_slave_0 entered promiscuous mode [ 1064.866678] bridge0: port 2(bridge_slave_1) entered blocking state [ 1064.873142] bridge0: port 2(bridge_slave_1) entered disabled state [ 1064.881391] device bridge_slave_1 entered promiscuous mode [ 1064.918870] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1064.956232] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1065.070275] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1065.112149] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1065.291211] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1065.298536] team0: Port device team_slave_0 added [ 1065.326946] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1065.334374] team0: Port device team_slave_1 added [ 1065.371730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1065.411234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1065.450292] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1065.457752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1065.473430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1065.503190] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1065.510422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1065.519741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1065.760293] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.766700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1065.773357] bridge0: port 1(bridge_slave_0) entered blocking state [ 1065.779734] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1066.645946] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1066.732206] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1066.817679] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1066.823908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1066.831620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1066.914442] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:22:57 executing program 7: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0xffffffffffffffcc, 0x5, 0x8, 0x0, 0xf7, 0x10200, 0x8, 0xff, 0x3b7a, 0x7ff, 0x1, 0x1ff, 0xfffffffffffffffc, 0x9, 0x1, 0x5, 0x100000000, 0x800, 0x2, 0x7fffffff, 0x7, 0xab6, 0x275, 0x100000001, 0x1, 0x3, 0x1f6, 0x4, 0x1, 0x0, 0x3ff, 0x1f, 0x5, 0x1, 0x1000, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x10, 0x9, 0x0, 0x1, 0xfffffffffffffff7, 0x5, 0x1000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) read(r0, &(0x7f00000002c0)=""/106, 0x6a) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x4, 0x602) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)=""/125) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = getpid() utimes(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={{0x77359400}, {0x77359400}}) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r5, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e22}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(r7, 0x0, 0x14, &(0x7f0000000400)=0x8, 0x4) getuid() r9 = creat(&(0x7f0000000440)='./file0\x00', 0xbff5b3a32572026e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000580)={r10, 0x401}, &(0x7f00000005c0)=0xc) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000600)={0x80000001, 0x1f, 0x2}) gettid() sendmsg$nl_netfilter(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000000ffffffff7000fdf4f9000200080033000000b9f0c45ade720e30d4773acc017e2ae6000000000000000000000000"], 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x14) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/12, 0xc}], 0x5) fcntl$setown(r2, 0x8, r4) r11 = gettid() perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(r11, r11) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/16 23:22:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) open(&(0x7f0000000000)='./file0\x00', 0x200, 0x20) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000040)=""/106) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5437, &(0x7f0000981ffe)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) dup2(r1, r0) 2018/04/16 23:22:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000001040)=0x1ff, 0x4) connect$inet6(r0, &(0x7f00001cd000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/16 23:22:57 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0xffffffffffffffcc, 0x5, 0x8, 0x0, 0xf7, 0x10200, 0x8, 0xff, 0x3b7a, 0x7ff, 0x1, 0x1ff, 0xfffffffffffffffc, 0x9, 0x1, 0x5, 0x100000000, 0x800, 0x2, 0x7fffffff, 0x7, 0xab6, 0x275, 0x100000001, 0x1, 0x3, 0x1f6, 0x4, 0x1, 0x0, 0x3ff, 0x1f, 0x5, 0x1, 0x1000, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x10, 0x9, 0x0, 0x1, 0xfffffffffffffff7, 0x5, 0x1000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) read(r0, &(0x7f00000002c0)=""/106, 0x6a) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x4, 0x602) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)=""/125) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = getpid() utimes(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={{0x77359400}, {0x77359400}}) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r5, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e22}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(r7, 0x0, 0x14, &(0x7f0000000400)=0x8, 0x4) getuid() r9 = creat(&(0x7f0000000440)='./file0\x00', 0xbff5b3a32572026e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000580)={r10, 0x401}, &(0x7f00000005c0)=0xc) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000600)={0x80000001, 0x1f, 0x2}) gettid() sendmsg$nl_netfilter(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000000ffffffff7000fdf4f9000200080033000000b9f0c45ade720e30d4773acc017e2ae6000000000000000000000000"], 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x14) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/12, 0xc}], 0x5) fcntl$setown(r2, 0x8, r4) r11 = gettid() perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(r11, r11) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/16 23:22:57 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0xffffffffffffffcc, 0x5, 0x8, 0x0, 0xf7, 0x10200, 0x8, 0xff, 0x3b7a, 0x7ff, 0x1, 0x1ff, 0xfffffffffffffffc, 0x9, 0x1, 0x5, 0x100000000, 0x800, 0x2, 0x7fffffff, 0x7, 0xab6, 0x275, 0x100000001, 0x1, 0x3, 0x1f6, 0x4, 0x1, 0x0, 0x3ff, 0x1f, 0x5, 0x1, 0x1000, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x10, 0x9, 0x0, 0x1, 0xfffffffffffffff7, 0x5, 0x1000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) read(r0, &(0x7f00000002c0)=""/106, 0x6a) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x4, 0x602) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)=""/125) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = getpid() utimes(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={{0x77359400}, {0x77359400}}) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r5, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e22}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(r7, 0x0, 0x14, &(0x7f0000000400)=0x8, 0x4) getuid() r9 = creat(&(0x7f0000000440)='./file0\x00', 0xbff5b3a32572026e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000580)={r10, 0x401}, &(0x7f00000005c0)=0xc) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000600)={0x80000001, 0x1f, 0x2}) gettid() sendmsg$nl_netfilter(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000000ffffffff7000fdf4f9000200080033000000b9f0c45ade720e30d4773acc017e2ae6000000000000000000000000"], 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x14) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/12, 0xc}], 0x5) fcntl$setown(r2, 0x8, r4) r11 = gettid() perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(r11, r11) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/16 23:22:57 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0xffffffffffffffcc, 0x5, 0x8, 0x0, 0xf7, 0x10200, 0x8, 0xff, 0x3b7a, 0x7ff, 0x1, 0x1ff, 0xfffffffffffffffc, 0x9, 0x1, 0x5, 0x100000000, 0x800, 0x2, 0x7fffffff, 0x7, 0xab6, 0x275, 0x100000001, 0x1, 0x3, 0x1f6, 0x4, 0x1, 0x0, 0x3ff, 0x1f, 0x5, 0x1, 0x1000, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x10, 0x9, 0x0, 0x1, 0xfffffffffffffff7, 0x5, 0x1000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) read(r0, &(0x7f00000002c0)=""/106, 0x6a) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x4, 0x602) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)=""/125) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = getpid() utimes(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={{0x77359400}, {0x77359400}}) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r5, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e22}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(r7, 0x0, 0x14, &(0x7f0000000400)=0x8, 0x4) getuid() r9 = creat(&(0x7f0000000440)='./file0\x00', 0xbff5b3a32572026e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000580)={r10, 0x401}, &(0x7f00000005c0)=0xc) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000600)={0x80000001, 0x1f, 0x2}) gettid() sendmsg$nl_netfilter(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000000ffffffff7000fdf4f9000200080033000000b9f0c45ade720e30d4773acc017e2ae6000000000000000000000000"], 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x14) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/12, 0xc}], 0x5) fcntl$setown(r2, 0x8, r4) r11 = gettid() perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(r11, r11) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/16 23:22:57 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x800000000000011, 0x800000002, 0x80) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bind(r1, &(0x7f00000000c0)=@llc={0x1a, 0x33f, 0x0, 0x7fffffff, 0x100000001, 0x1f, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000140)=0x3, 0x4) 2018/04/16 23:22:57 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x8}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000000040)=""/251}, 0x48) 2018/04/16 23:22:57 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x8}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000000040)=""/251}, 0x48) [ 1067.545604] bridge0: port 3(erspan0) entered blocking state [ 1067.551959] bridge0: port 3(erspan0) entered disabled state [ 1067.574755] device erspan0 entered promiscuous mode [ 1067.720284] device bridge_slave_1 left promiscuous mode [ 1067.725931] bridge0: port 2(bridge_slave_1) entered disabled state [ 1067.741291] device bridge_slave_0 left promiscuous mode [ 1067.743121] IPVS: ftp: loaded support on port[0] = 21 [ 1067.746946] bridge0: port 1(bridge_slave_0) entered disabled state [ 1067.793378] team0 (unregistering): Port device team_slave_1 removed [ 1067.803337] team0 (unregistering): Port device team_slave_0 removed [ 1067.814254] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1067.830725] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1067.858405] bond0 (unregistering): Released all slaves [ 1068.440974] bridge0: port 1(bridge_slave_0) entered blocking state [ 1068.447455] bridge0: port 1(bridge_slave_0) entered disabled state [ 1068.455452] device bridge_slave_0 entered promiscuous mode [ 1068.494745] bridge0: port 2(bridge_slave_1) entered blocking state [ 1068.501212] bridge0: port 2(bridge_slave_1) entered disabled state [ 1068.509150] device bridge_slave_1 entered promiscuous mode [ 1068.546346] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1068.583894] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1068.696346] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1068.738135] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1068.914361] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1068.921871] team0: Port device team_slave_0 added [ 1068.960147] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1068.968139] team0: Port device team_slave_1 added [ 1069.003952] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1069.010891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1069.019348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1069.058254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1069.065229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1069.073734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1069.109389] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1069.116518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1069.125270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1069.156408] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1069.163634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1069.175315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1069.432067] bridge0: port 2(bridge_slave_1) entered blocking state [ 1069.438457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1069.445136] bridge0: port 1(bridge_slave_0) entered blocking state [ 1069.451497] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1069.458803] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1069.919269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1070.315637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1070.401057] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1070.486508] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1070.492703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1070.500329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1070.586189] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:23:00 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0xffffffffffffffcc, 0x5, 0x8, 0x0, 0xf7, 0x10200, 0x8, 0xff, 0x3b7a, 0x7ff, 0x1, 0x1ff, 0xfffffffffffffffc, 0x9, 0x1, 0x5, 0x100000000, 0x800, 0x2, 0x7fffffff, 0x7, 0xab6, 0x275, 0x100000001, 0x1, 0x3, 0x1f6, 0x4, 0x1, 0x0, 0x3ff, 0x1f, 0x5, 0x1, 0x1000, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x10, 0x9, 0x0, 0x1, 0xfffffffffffffff7, 0x5, 0x1000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) read(r0, &(0x7f00000002c0)=""/106, 0x6a) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x4, 0x602) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)=""/125) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = getpid() utimes(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={{0x77359400}, {0x77359400}}) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r5, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e22}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(r7, 0x0, 0x14, &(0x7f0000000400)=0x8, 0x4) getuid() r9 = creat(&(0x7f0000000440)='./file0\x00', 0xbff5b3a32572026e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000580)={r10, 0x401}, &(0x7f00000005c0)=0xc) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000600)={0x80000001, 0x1f, 0x2}) gettid() sendmsg$nl_netfilter(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000000ffffffff7000fdf4f9000200080033000000b9f0c45ade720e30d4773acc017e2ae6000000000000000000000000"], 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x14) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/12, 0xc}], 0x5) fcntl$setown(r2, 0x8, r4) r11 = gettid() perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(r11, r11) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/16 23:23:00 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f00000000c0)="70726f63ae6d696d655f74797065776c616e316e6f64657600", 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000003, 0x5011, r1, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 2018/04/16 23:23:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x8}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000000040)=""/251}, 0x48) 2018/04/16 23:23:00 executing program 7: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0xffffffffffffffcc, 0x5, 0x8, 0x0, 0xf7, 0x10200, 0x8, 0xff, 0x3b7a, 0x7ff, 0x1, 0x1ff, 0xfffffffffffffffc, 0x9, 0x1, 0x5, 0x100000000, 0x800, 0x2, 0x7fffffff, 0x7, 0xab6, 0x275, 0x100000001, 0x1, 0x3, 0x1f6, 0x4, 0x1, 0x0, 0x3ff, 0x1f, 0x5, 0x1, 0x1000, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x10, 0x9, 0x0, 0x1, 0xfffffffffffffff7, 0x5, 0x1000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) read(r0, &(0x7f00000002c0)=""/106, 0x6a) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x4, 0x602) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)=""/125) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = getpid() utimes(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={{0x77359400}, {0x77359400}}) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r5, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e22}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(r7, 0x0, 0x14, &(0x7f0000000400)=0x8, 0x4) getuid() r9 = creat(&(0x7f0000000440)='./file0\x00', 0xbff5b3a32572026e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000580)={r10, 0x401}, &(0x7f00000005c0)=0xc) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000600)={0x80000001, 0x1f, 0x2}) gettid() sendmsg$nl_netfilter(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000000ffffffff7000fdf4f9000200080033000000b9f0c45ade720e30d4773acc017e2ae6000000000000000000000000"], 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x14) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/12, 0xc}], 0x5) fcntl$setown(r2, 0x8, r4) r11 = gettid() perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(r11, r11) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/16 23:23:00 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0xffffffffffffffcc, 0x5, 0x8, 0x0, 0xf7, 0x10200, 0x8, 0xff, 0x3b7a, 0x7ff, 0x1, 0x1ff, 0xfffffffffffffffc, 0x9, 0x1, 0x5, 0x100000000, 0x800, 0x2, 0x7fffffff, 0x7, 0xab6, 0x275, 0x100000001, 0x1, 0x3, 0x1f6, 0x4, 0x1, 0x0, 0x3ff, 0x1f, 0x5, 0x1, 0x1000, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x10, 0x9, 0x0, 0x1, 0xfffffffffffffff7, 0x5, 0x1000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) read(r0, &(0x7f00000002c0)=""/106, 0x6a) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x4, 0x602) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)=""/125) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = getpid() utimes(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={{0x77359400}, {0x77359400}}) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r5, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e22}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(r7, 0x0, 0x14, &(0x7f0000000400)=0x8, 0x4) getuid() r9 = creat(&(0x7f0000000440)='./file0\x00', 0xbff5b3a32572026e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000580)={r10, 0x401}, &(0x7f00000005c0)=0xc) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000600)={0x80000001, 0x1f, 0x2}) gettid() sendmsg$nl_netfilter(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000000ffffffff7000fdf4f9000200080033000000b9f0c45ade720e30d4773acc017e2ae6000000000000000000000000"], 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x14) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/12, 0xc}], 0x5) fcntl$setown(r2, 0x8, r4) r11 = gettid() perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(r11, r11) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/16 23:23:00 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0xffffffffffffffcc, 0x5, 0x8, 0x0, 0xf7, 0x10200, 0x8, 0xff, 0x3b7a, 0x7ff, 0x1, 0x1ff, 0xfffffffffffffffc, 0x9, 0x1, 0x5, 0x100000000, 0x800, 0x2, 0x7fffffff, 0x7, 0xab6, 0x275, 0x100000001, 0x1, 0x3, 0x1f6, 0x4, 0x1, 0x0, 0x3ff, 0x1f, 0x5, 0x1, 0x1000, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x10, 0x9, 0x0, 0x1, 0xfffffffffffffff7, 0x5, 0x1000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) read(r0, &(0x7f00000002c0)=""/106, 0x6a) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x4, 0x602) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)=""/125) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = getpid() utimes(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={{0x77359400}, {0x77359400}}) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r5, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e22}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(r7, 0x0, 0x14, &(0x7f0000000400)=0x8, 0x4) getuid() r9 = creat(&(0x7f0000000440)='./file0\x00', 0xbff5b3a32572026e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000580)={r10, 0x401}, &(0x7f00000005c0)=0xc) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000600)={0x80000001, 0x1f, 0x2}) gettid() sendmsg$nl_netfilter(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000000ffffffff7000fdf4f9000200080033000000b9f0c45ade720e30d4773acc017e2ae6000000000000000000000000"], 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x14) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/12, 0xc}], 0x5) fcntl$setown(r2, 0x8, r4) r11 = gettid() perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(r11, r11) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/16 23:23:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000001040)=0x1ff, 0x4) connect$inet6(r0, &(0x7f00001cd000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/16 23:23:00 executing program 6: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000aeeff8)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file0\x00'}, 0xa) 2018/04/16 23:23:01 executing program 6: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000aeeff8)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file0\x00'}, 0xa) 2018/04/16 23:23:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x8}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000000040)=""/251}, 0x48) 2018/04/16 23:23:01 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2}, 0x10) [ 1071.328372] device bridge_slave_1 left promiscuous mode [ 1071.334090] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:23:01 executing program 1: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002cc0)) sendmmsg$unix(r1, &(0x7f0000002e80)=[{&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000340), 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1, r1]}], 0x18}], 0x1, 0x0) r2 = accept(r1, 0x0, &(0x7f0000000280)=0x5ae) recvfrom$llc(r2, &(0x7f0000000100)=""/29, 0x1d, 0x0, &(0x7f0000000140)={0x1a, 0x207, 0x100000000, 0x200000000, 0x5, 0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) recvmmsg(r0, &(0x7f0000525000), 0x1, 0x0, 0x0) 2018/04/16 23:23:01 executing program 7: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0xffffffffffffffcc, 0x5, 0x8, 0x0, 0xf7, 0x10200, 0x8, 0xff, 0x3b7a, 0x7ff, 0x1, 0x1ff, 0xfffffffffffffffc, 0x9, 0x1, 0x5, 0x100000000, 0x800, 0x2, 0x7fffffff, 0x7, 0xab6, 0x275, 0x100000001, 0x1, 0x3, 0x1f6, 0x4, 0x1, 0x0, 0x3ff, 0x1f, 0x5, 0x1, 0x1000, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x10, 0x9, 0x0, 0x1, 0xfffffffffffffff7, 0x5, 0x1000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) read(r0, &(0x7f00000002c0)=""/106, 0x6a) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x4, 0x602) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)=""/125) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = getpid() utimes(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={{0x77359400}, {0x77359400}}) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r5, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e22}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(r7, 0x0, 0x14, &(0x7f0000000400)=0x8, 0x4) getuid() r9 = creat(&(0x7f0000000440)='./file0\x00', 0xbff5b3a32572026e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000580)={r10, 0x401}, &(0x7f00000005c0)=0xc) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000600)={0x80000001, 0x1f, 0x2}) gettid() sendmsg$nl_netfilter(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c00000000ffffffff7000fdf4f9000200080033000000b9f0c45ade720e30d4773acc017e2ae6000000000000000000000000"], 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x14) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/12, 0xc}], 0x5) fcntl$setown(r2, 0x8, r4) r11 = gettid() perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(r11, r11) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/16 23:23:01 executing program 6: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000aeeff8)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file0\x00'}, 0xa) 2018/04/16 23:23:01 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000017000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000358fe0)={r2}) write$binfmt_aout(r2, &(0x7f0000000140)={{}, "", [[]]}, 0x120) [ 1071.390950] device bridge_slave_0 left promiscuous mode [ 1071.396606] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:23:01 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2}, 0x10) 2018/04/16 23:23:01 executing program 1: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002cc0)) sendmmsg$unix(r1, &(0x7f0000002e80)=[{&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000340), 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1, r1]}], 0x18}], 0x1, 0x0) r2 = accept(r1, 0x0, &(0x7f0000000280)=0x5ae) recvfrom$llc(r2, &(0x7f0000000100)=""/29, 0x1d, 0x0, &(0x7f0000000140)={0x1a, 0x207, 0x100000000, 0x200000000, 0x5, 0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) recvmmsg(r0, &(0x7f0000525000), 0x1, 0x0, 0x0) [ 1071.518523] IPVS: ftp: loaded support on port[0] = 21 [ 1071.549680] team0 (unregistering): Port device team_slave_1 removed [ 1071.558271] irq bypass consumer (token 00000000c7994f4d) registration fails: -16 [ 1071.575254] team0 (unregistering): Port device team_slave_0 removed [ 1071.595164] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1071.636993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1071.671362] bond0 (unregistering): Released all slaves [ 1072.328746] bridge0: port 1(bridge_slave_0) entered blocking state [ 1072.335179] bridge0: port 1(bridge_slave_0) entered disabled state [ 1072.343186] device bridge_slave_0 entered promiscuous mode [ 1072.381864] bridge0: port 2(bridge_slave_1) entered blocking state [ 1072.388319] bridge0: port 2(bridge_slave_1) entered disabled state [ 1072.396301] device bridge_slave_1 entered promiscuous mode [ 1072.435512] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1072.474928] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1072.589688] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1072.632215] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1072.802327] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1072.809731] team0: Port device team_slave_0 added [ 1072.848612] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1072.856116] team0: Port device team_slave_1 added [ 1072.887779] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1072.925555] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1072.966220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1072.995939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1073.373748] bridge0: port 2(bridge_slave_1) entered blocking state [ 1073.380171] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1073.386822] bridge0: port 1(bridge_slave_0) entered blocking state [ 1073.393191] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1073.400573] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1074.207154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1074.278661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1074.365240] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1074.453596] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1074.459810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1074.467555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1074.549768] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:23:04 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f00000000c0)="70726f63ae6d696d655f74797065776c616e316e6f64657600", 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000003, 0x5011, r1, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 2018/04/16 23:23:04 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2}, 0x10) 2018/04/16 23:23:04 executing program 1: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002cc0)) sendmmsg$unix(r1, &(0x7f0000002e80)=[{&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000340), 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1, r1]}], 0x18}], 0x1, 0x0) r2 = accept(r1, 0x0, &(0x7f0000000280)=0x5ae) recvfrom$llc(r2, &(0x7f0000000100)=""/29, 0x1d, 0x0, &(0x7f0000000140)={0x1a, 0x207, 0x100000000, 0x200000000, 0x5, 0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) recvmmsg(r0, &(0x7f0000525000), 0x1, 0x0, 0x0) 2018/04/16 23:23:04 executing program 7: modify_ldt$write2(0x11, &(0x7f0000000880), 0x10) clone(0x0, &(0x7f0000000500), &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)) 2018/04/16 23:23:04 executing program 3: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002cc0)) sendmmsg$unix(r1, &(0x7f0000002e80)=[{&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000340), 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1, r1]}], 0x18}], 0x1, 0x0) r2 = accept(r1, 0x0, &(0x7f0000000280)=0x5ae) recvfrom$llc(r2, &(0x7f0000000100)=""/29, 0x1d, 0x0, &(0x7f0000000140)={0x1a, 0x207, 0x100000000, 0x200000000, 0x5, 0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) recvmmsg(r0, &(0x7f0000525000), 0x1, 0x0, 0x0) 2018/04/16 23:23:04 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x1}) creat(&(0x7f00001d3ff4)='./file0/bus\x00', 0x0) 2018/04/16 23:23:04 executing program 6: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000aeeff8)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file0\x00'}, 0xa) 2018/04/16 23:23:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000001040)=0x1ff, 0x4) connect$inet6(r0, &(0x7f00001cd000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/16 23:23:04 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2}, 0x10) 2018/04/16 23:23:05 executing program 6: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) 2018/04/16 23:23:05 executing program 1: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002cc0)) sendmmsg$unix(r1, &(0x7f0000002e80)=[{&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000340), 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1, r1]}], 0x18}], 0x1, 0x0) r2 = accept(r1, 0x0, &(0x7f0000000280)=0x5ae) recvfrom$llc(r2, &(0x7f0000000100)=""/29, 0x1d, 0x0, &(0x7f0000000140)={0x1a, 0x207, 0x100000000, 0x200000000, 0x5, 0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) recvmmsg(r0, &(0x7f0000525000), 0x1, 0x0, 0x0) 2018/04/16 23:23:05 executing program 3: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002cc0)) sendmmsg$unix(r1, &(0x7f0000002e80)=[{&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000340), 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1, r1]}], 0x18}], 0x1, 0x0) r2 = accept(r1, 0x0, &(0x7f0000000280)=0x5ae) recvfrom$llc(r2, &(0x7f0000000100)=""/29, 0x1d, 0x0, &(0x7f0000000140)={0x1a, 0x207, 0x100000000, 0x200000000, 0x5, 0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) recvmmsg(r0, &(0x7f0000525000), 0x1, 0x0, 0x0) 2018/04/16 23:23:05 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000007ff4)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 2018/04/16 23:23:05 executing program 7: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x0, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}, 0x1}, 0x0) 2018/04/16 23:23:05 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa3e3]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32", 0x43}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1075.315680] device bridge_slave_1 left promiscuous mode [ 1075.321337] bridge0: port 2(bridge_slave_1) entered disabled state [ 1075.390776] IPVS: ftp: loaded support on port[0] = 21 2018/04/16 23:23:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0xce, 0x0, 0x80000000}]}) [ 1075.417082] device bridge_slave_0 left promiscuous mode [ 1075.422726] bridge0: port 1(bridge_slave_0) entered disabled state [ 1075.541541] team0 (unregistering): Port device team_slave_1 removed [ 1075.555674] team0 (unregistering): Port device team_slave_0 removed [ 1075.565860] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1075.581904] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1075.610833] bond0 (unregistering): Released all slaves [ 1076.271401] bridge0: port 1(bridge_slave_0) entered blocking state [ 1076.278090] bridge0: port 1(bridge_slave_0) entered disabled state [ 1076.286224] device bridge_slave_0 entered promiscuous mode [ 1076.327562] bridge0: port 2(bridge_slave_1) entered blocking state [ 1076.334132] bridge0: port 2(bridge_slave_1) entered disabled state [ 1076.342515] device bridge_slave_1 entered promiscuous mode [ 1076.383906] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1076.423538] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1076.540336] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1076.583596] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1076.764421] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1076.771673] team0: Port device team_slave_0 added [ 1076.801278] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1076.808696] team0: Port device team_slave_1 added [ 1076.846657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1076.884383] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1076.924185] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1076.931426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1076.947602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1076.979970] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1076.987289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1076.999466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1077.230230] bridge0: port 2(bridge_slave_1) entered blocking state [ 1077.236638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1077.243768] bridge0: port 1(bridge_slave_0) entered blocking state [ 1077.250498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1078.122502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1078.208901] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1078.292061] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1078.298272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1078.306009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1078.387227] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:23:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0xce, 0x0, 0x80000000}]}) 2018/04/16 23:23:08 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f00000000c0)="70726f63ae6d696d655f74797065776c616e316e6f64657600", 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000003, 0x5011, r1, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 2018/04/16 23:23:08 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa3e3]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32", 0x43}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:23:08 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"64596df17c0e4200", 0x4000000000000401}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x5) 2018/04/16 23:23:08 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000007ff4)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 2018/04/16 23:23:08 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001880)}, 0x0) 2018/04/16 23:23:08 executing program 3: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002cc0)) sendmmsg$unix(r1, &(0x7f0000002e80)=[{&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000340), 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1, r1]}], 0x18}], 0x1, 0x0) r2 = accept(r1, 0x0, &(0x7f0000000280)=0x5ae) recvfrom$llc(r2, &(0x7f0000000100)=""/29, 0x1d, 0x0, &(0x7f0000000140)={0x1a, 0x207, 0x100000000, 0x200000000, 0x5, 0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) recvmmsg(r0, &(0x7f0000525000), 0x1, 0x0, 0x0) 2018/04/16 23:23:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000981ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x948) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000abb000)={0x20000006}) 2018/04/16 23:23:08 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000007ff4)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 2018/04/16 23:23:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0xce, 0x0, 0x80000000}]}) 2018/04/16 23:23:08 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000007ff4)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 2018/04/16 23:23:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000981ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x948) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000abb000)={0x20000006}) 2018/04/16 23:23:08 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa3e3]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32", 0x43}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1079.175894] device bridge_slave_1 left promiscuous mode [ 1079.181565] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:23:09 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001880)}, 0x0) 2018/04/16 23:23:09 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000007ff4)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 2018/04/16 23:23:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0xce, 0x0, 0x80000000}]}) [ 1079.251568] device bridge_slave_0 left promiscuous mode [ 1079.257297] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/16 23:23:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000981ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x948) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000abb000)={0x20000006}) 2018/04/16 23:23:09 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f00000000c0)="70726f63ae6d696d655f74797065776c616e316e6f64657600", 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000003, 0x5011, r1, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 2018/04/16 23:23:09 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000007ff4)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) [ 1079.422643] IPVS: ftp: loaded support on port[0] = 21 [ 1079.476483] team0 (unregistering): Port device team_slave_1 removed [ 1079.496766] team0 (unregistering): Port device team_slave_0 removed [ 1079.512316] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1079.541800] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1079.582901] bond0 (unregistering): Released all slaves [ 1080.202667] bridge0: port 1(bridge_slave_0) entered blocking state [ 1080.209133] bridge0: port 1(bridge_slave_0) entered disabled state [ 1080.217047] device bridge_slave_0 entered promiscuous mode [ 1080.256908] bridge0: port 2(bridge_slave_1) entered blocking state [ 1080.263375] bridge0: port 2(bridge_slave_1) entered disabled state [ 1080.271310] device bridge_slave_1 entered promiscuous mode [ 1080.310271] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1080.348094] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1080.459916] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1080.501207] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1080.671970] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1080.679890] team0: Port device team_slave_0 added [ 1080.717419] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1080.724837] team0: Port device team_slave_1 added [ 1080.757442] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1080.764565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1080.773939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1080.801737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1080.842139] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1080.849494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1080.857949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1080.887081] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1080.894201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1080.902764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1081.141922] bridge0: port 2(bridge_slave_1) entered blocking state [ 1081.148333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1081.154995] bridge0: port 1(bridge_slave_0) entered blocking state [ 1081.161405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1081.168714] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1081.631160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1082.027740] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1082.121867] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1082.204569] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1082.210770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1082.218525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1082.299202] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:23:12 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa3e3]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f00000002c0)="b805000000b9000000000f01d98f8958010967420f0966ba410066b8030066ef83b90d0000000d440fc71d00000000654a0f01c80fd42e660fd4556fb9730200000f32", 0x43}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:23:12 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001880)}, 0x0) 2018/04/16 23:23:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001880)}, 0x0) 2018/04/16 23:23:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000180)="ea0300120126f267f22e260f2364660fd32a66b9470200000f320f20470f08baf80c66b88f4c858566efbafc0cec0fc75c20dce1440f20c0663501000000440f22c0", 0x42}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000000)="bba6013c95f36b1f672296de00626b34779e08f7d7", 0x0, 0x15}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:23:12 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000040)) r1 = getpgrp(0x0) r2 = gettid() kcmp(r1, r2, 0x7, r0, r0) r3 = dup2(r0, r0) connect(r3, &(0x7f00000000c0)=@un=@abs={0x0, 0x0, 0x4e22}, 0x80) r4 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x9, 0x0, 0x401, 0x8, 0x0, 0x7, 0x10b0, 0x2, 0xf90, 0x8000, 0x3, 0x0, 0xffffffff, 0xa6a, 0x1, 0x1, 0xc42e3d3, 0x0, 0x6, 0xfffffffffffffffb, 0x7fffffff, 0x7ff, 0x40, 0xffffffff, 0x2, 0x8, 0x7b, 0x400, 0x2, 0x1f, 0x20, 0x0, 0x0, 0x200000000, 0x200, 0x1000, 0x0, 0x23, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x30100, 0x8, 0xfffffffffffffffa, 0x3, 0x9, 0x2c45, 0x7f}, r2, 0xb, r3, 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) fcntl$setown(r0, 0x8, r1) openat(r3, &(0x7f0000000200)='./file0\x00', 0x200100, 0x2) r5 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r5, 0x4010640d, &(0x7f0000000280)={0x100000001, 0x5}) getsockopt$sock_timeval(r5, 0x1, 0x14, &(0x7f00000002c0), &(0x7f0000000300)=0x10) recvmsg$netrom(r5, &(0x7f0000000680)={&(0x7f0000000340)=@full={{0x3, {"878b1c5d53753c"}, 0x8}, [{"2e9f2745f95e4b"}, {"f28f6eff2c5e33"}, {"4b381447a5ffcd"}, {"2f02971d6c4b45"}, {"a57d54e2c423be"}, {"ed5091637c77ab"}, {"cf4e6e1d1e9763"}, {"1c4b90e2b12c5e"}]}, 0x48, &(0x7f0000000640)=[{&(0x7f00000004c0)="128ca72a24980bee7aea42f54db2c787b751e32e4a874638cd146d139522ce78fb5cb4c969b97158ac9f307ce6975afbb1d12c5b72b1a8beeffbbad205c1f4bd2040c2c511a49fe206237cb7a415503b774cfa67256843d3242d8d95be172d755a446998e96af0ea48c876aa27c9df6c1d3885e7967e9aaa6a9ce8d8b87c6679c6ec361bb101e7f689ed9406773d7e02c6708c7d", 0x94}], 0x1, 0x0, 0x0, 0x4000}, 0x100) r6 = request_key(&(0x7f0000000780)='syzkaller\x00', &(0x7f00000007c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000800)='vmnet1ppp1\x00', 0xfffffffffffffffe) request_key(&(0x7f00000006c0)='asymmetric\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000740)='/dev/snd/seq\x00', r6) r7 = shmget$private(0x0, 0x3000, 0x120, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_UNLOCK(r7, 0xc) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000840)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r4, &(0x7f0000000880)={r8, r4, 0x1000}) sync_file_range(r3, 0x1, 0x4, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f00000008c0)={0xffff, 0x6, 0xe5, 'queue0\x00', 0x2}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vga_arbiter\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$llc_int(r8, 0x10c, 0x3, &(0x7f00000009c0)=0x7ff8000, 0x4) syz_emit_ethernet(0x54, &(0x7f0000000a00)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [{[{0x9100, 0x8001, 0x10f1, 0x2}], {0x8100, 0x100000000, 0x7, 0x1}}], {@mpls_uc={0x8847, {[{0x6, 0x9, 0xa9, 0xfffffffffffffff9}, {0x7fffffff, 0x9, 0xfffffffffffffffd, 0x8001}, {0x7f, 0xaa1f, 0x3ff, 0x1}, {0x5, 0x1000, 0xffffffffffffffca, 0x8}, {0x121a, 0x27f, 0x2bb, 0x3f}, {0xffffffffffffffff, 0xa4f3, 0x101, 0xfffffffffffffffa}, {0x3, 0x1, 0x8, 0x100}], @llc={@llc={0xfe, 0xbe, 'r', "d523abdcaf067b8225f9cf3f6ec5fa288594be4dcfac407f922046565e9beb"}}}}}}, &(0x7f0000000a80)={0x0, 0x3, [0x90b, 0x9ec, 0x498, 0x24f]}) ioctl$LOOP_CLR_FD(r8, 0x4c01) sched_getaffinity(r2, 0x8, &(0x7f0000000ac0)) 2018/04/16 23:23:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000981ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x948) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000abb000)={0x20000006}) 2018/04/16 23:23:12 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000007ff4)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 2018/04/16 23:23:12 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540)}}, {{&(0x7f00000004c0)=@in6={0x2, 0x2, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="10000000000000002900000032000000"], 0x10}}], 0x2, 0x0) 2018/04/16 23:23:12 executing program 4: creat(&(0x7f00000000c0)='./file0\x00', 0x62) r0 = socket$netlink(0x10, 0x3, 0xd) ioctl$int_out(r0, 0x2, &(0x7f0000001000)) r1 = syz_open_dev$sg(&(0x7f0000004ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000800)={'team0\x00'}) ioctl(r1, 0x100000001, &(0x7f0000001000)) 2018/04/16 23:23:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001880)}, 0x0) 2018/04/16 23:23:12 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540)}}, {{&(0x7f00000004c0)=@in6={0x2, 0x2, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="10000000000000002900000032000000"], 0x10}}], 0x2, 0x0) 2018/04/16 23:23:12 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001880)}, 0x0) 2018/04/16 23:23:12 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000340)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000001740)=[{&(0x7f0000001640)="083ab1c74586076326feb507b77d9e69feebfe6d1f740347e4bf4754260e4cca497a91d7b01067ab7c99ba9738591c0af7cc4be708c58babf34bf74ae25e2c13796b86553e43e7ebf867961cb745510a41f54b748991bca4a438edc69d0167b9af87c6a25ba1d0d98dfa4200b26ef4d5f1916eb6c6cf2c95bcc9b34184d3fe04db77c805c8a73c0b94404da56a931c96685a42ec6e0379c414e8dab0e67f6b0628a66ac899d84b5ea65c060331658439ce9337fe2b0463100040c6464b84884ec272eaafa6f9df36e35378af", 0xcc}], 0x1, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="fb82682a7381b25209e003f45377f79a48b12c08fee33313a6e41352f4e4b663113dc020b15b59141a9c6c9ae5087875257473ec5a83478b57fa37e808278c55c5e937f9bb40ac7df74f361d23698c5c1e8f6aca7a6264d4a9aece143643af15ce2d41473f08ed239edf70ecb0be389026ce066528244e8307f6bc0bfe306de2a00e8912fa1e4cc5b9e0ef0a25846a0ea8b411f316f6530341bd1d9440dbb0c09e8e127214b1e947d48d5cc2", 0xac}, {&(0x7f00000003c0)="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", 0x1d6}], 0x2, &(0x7f0000000600)=[{0x10, 0x0, 0x7}], 0x10}}], 0x2, 0x0) 2018/04/16 23:23:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000180)="ea0300120126f267f22e260f2364660fd32a66b9470200000f320f20470f08baf80c66b88f4c858566efbafc0cec0fc75c20dce1440f20c0663501000000440f22c0", 0x42}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000000)="bba6013c95f36b1f672296de00626b34779e08f7d7", 0x0, 0x15}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:23:12 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x73e0) sendfile(r1, r3, &(0x7f0000145000), 0x1000000000007dd) sendto$unix(r2, &(0x7f0000000040)=' ', 0x1, 0x0, &(0x7f0000000140)=@abs, 0x6e) [ 1083.126299] device bridge_slave_1 left promiscuous mode [ 1083.131996] bridge0: port 2(bridge_slave_1) entered disabled state [ 1083.197164] device bridge_slave_0 left promiscuous mode [ 1083.202929] bridge0: port 1(bridge_slave_0) entered disabled state [ 1083.213429] IPVS: ftp: loaded support on port[0] = 21 [ 1083.255645] team0 (unregistering): Port device team_slave_1 removed [ 1083.266200] team0 (unregistering): Port device team_slave_0 removed [ 1083.277881] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1083.294393] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1083.320551] bond0 (unregistering): Released all slaves [ 1083.890264] bridge0: port 1(bridge_slave_0) entered blocking state [ 1083.896701] bridge0: port 1(bridge_slave_0) entered disabled state [ 1083.904680] device bridge_slave_0 entered promiscuous mode [ 1083.943454] bridge0: port 2(bridge_slave_1) entered blocking state [ 1083.949876] bridge0: port 2(bridge_slave_1) entered disabled state [ 1083.957764] device bridge_slave_1 entered promiscuous mode [ 1083.996907] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1084.034600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1084.145224] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1084.185441] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1084.361842] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1084.369180] team0: Port device team_slave_0 added [ 1084.406674] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1084.414100] team0: Port device team_slave_1 added [ 1084.446775] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1084.489691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1084.529926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1084.560566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1084.820195] bridge0: port 2(bridge_slave_1) entered blocking state [ 1084.826600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1084.833265] bridge0: port 1(bridge_slave_0) entered blocking state [ 1084.839633] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1084.847006] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1085.708543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1085.790819] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1085.855164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1085.883220] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1085.889431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1085.897226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1085.972486] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:23:16 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x6, [], 0x1}}, 0x1c) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000005000), 0x0, &(0x7f0000000040)}, 0x0) 2018/04/16 23:23:16 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x73e0) sendfile(r1, r3, &(0x7f0000145000), 0x1000000000007dd) sendto$unix(r2, &(0x7f0000000040)=' ', 0x1, 0x0, &(0x7f0000000140)=@abs, 0x6e) 2018/04/16 23:23:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540)}}, {{&(0x7f00000004c0)=@in6={0x2, 0x2, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="10000000000000002900000032000000"], 0x10}}], 0x2, 0x0) 2018/04/16 23:23:16 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000340)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000001740)=[{&(0x7f0000001640)="083ab1c74586076326feb507b77d9e69feebfe6d1f740347e4bf4754260e4cca497a91d7b01067ab7c99ba9738591c0af7cc4be708c58babf34bf74ae25e2c13796b86553e43e7ebf867961cb745510a41f54b748991bca4a438edc69d0167b9af87c6a25ba1d0d98dfa4200b26ef4d5f1916eb6c6cf2c95bcc9b34184d3fe04db77c805c8a73c0b94404da56a931c96685a42ec6e0379c414e8dab0e67f6b0628a66ac899d84b5ea65c060331658439ce9337fe2b0463100040c6464b84884ec272eaafa6f9df36e35378af", 0xcc}], 0x1, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="fb82682a7381b25209e003f45377f79a48b12c08fee33313a6e41352f4e4b663113dc020b15b59141a9c6c9ae5087875257473ec5a83478b57fa37e808278c55c5e937f9bb40ac7df74f361d23698c5c1e8f6aca7a6264d4a9aece143643af15ce2d41473f08ed239edf70ecb0be389026ce066528244e8307f6bc0bfe306de2a00e8912fa1e4cc5b9e0ef0a25846a0ea8b411f316f6530341bd1d9440dbb0c09e8e127214b1e947d48d5cc2", 0xac}, {&(0x7f00000003c0)="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", 0x1d6}], 0x2, &(0x7f0000000600)=[{0x10, 0x0, 0x7}], 0x10}}], 0x2, 0x0) 2018/04/16 23:23:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001880)}, 0x0) 2018/04/16 23:23:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000180)="ea0300120126f267f22e260f2364660fd32a66b9470200000f320f20470f08baf80c66b88f4c858566efbafc0cec0fc75c20dce1440f20c0663501000000440f22c0", 0x42}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000000)="bba6013c95f36b1f672296de00626b34779e08f7d7", 0x0, 0x15}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:23:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f7c000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/16 23:23:16 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000), &(0x7f0000c53000), &(0x7f0000000180), &(0x7f000025e000)) 2018/04/16 23:23:16 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000340)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000001740)=[{&(0x7f0000001640)="083ab1c74586076326feb507b77d9e69feebfe6d1f740347e4bf4754260e4cca497a91d7b01067ab7c99ba9738591c0af7cc4be708c58babf34bf74ae25e2c13796b86553e43e7ebf867961cb745510a41f54b748991bca4a438edc69d0167b9af87c6a25ba1d0d98dfa4200b26ef4d5f1916eb6c6cf2c95bcc9b34184d3fe04db77c805c8a73c0b94404da56a931c96685a42ec6e0379c414e8dab0e67f6b0628a66ac899d84b5ea65c060331658439ce9337fe2b0463100040c6464b84884ec272eaafa6f9df36e35378af", 0xcc}], 0x1, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="fb82682a7381b25209e003f45377f79a48b12c08fee33313a6e41352f4e4b663113dc020b15b59141a9c6c9ae5087875257473ec5a83478b57fa37e808278c55c5e937f9bb40ac7df74f361d23698c5c1e8f6aca7a6264d4a9aece143643af15ce2d41473f08ed239edf70ecb0be389026ce066528244e8307f6bc0bfe306de2a00e8912fa1e4cc5b9e0ef0a25846a0ea8b411f316f6530341bd1d9440dbb0c09e8e127214b1e947d48d5cc2", 0xac}, {&(0x7f00000003c0)="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", 0x1d6}], 0x2, &(0x7f0000000600)=[{0x10, 0x0, 0x7}], 0x10}}], 0x2, 0x0) 2018/04/16 23:23:16 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x6, [], 0x1}}, 0x1c) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000005000), 0x0, &(0x7f0000000040)}, 0x0) 2018/04/16 23:23:16 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc, &(0x7f0000000380)=0x80, 0x0) accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r1 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) keyctl$assume_authority(0x10, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0x0) keyctl$describe(0x6, 0x0, &(0x7f0000000b40)=""/4096, 0x1000) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000100)) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="840d572a8e609edca8c2551947d6efb55b7c8c94e1be6a1cf9f0b6c187b75286d9eed3d30f1edecec627b782331d1882137024a7df67ee9edfe12e1986880dcc2053b1f5ba810719d45c279d5082b3c8d02dab1ce0b01e1f4cb973cc1ece8d0deb7664206fa5c189e384551221e8e58c9a4775aa231a6349", 0x78, 0x0) close(0xffffffffffffffff) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x0, 0x3}, 0xfff1}, 0x1}, 0x0) r3 = add_key(&(0x7f0000000a80)="6173796d6d65747269630041472e8b637f55f694fcef0e58fc2ac924f9dd8addbd7bdb020097658e7651738b0e4ab818c6e76c0d075a9aafccb8dfa463c0e04194ee37284e414193d860", &(0x7f0000000b00)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000800), 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="ad6e2301849005b80f700749ce55a60fe1e41d5768c90ac2926a4d5cb5677573b42b9cd3cd194619f6f0d5f7662113df4b522d72293454068d859944dc8bd1449d14a763b027c673a6", 0x49}], 0x1, r3) mq_timedreceive(0xffffffffffffffff, &(0x7f0000be2f7d)=""/131, 0xfffffffffffffffd, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[{}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000180)='ns/cgroup\x00') r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020d00001000000000000000000000000300060000000000020000007f00000100400000000000000300050000000000020000000000000000000000000000000800120002000100000000000000000030000000030000000000000000a58300ff01000000000000000000000000000100000000000000000000ffffe000f60182193e2de13be6"], 0x87}, 0x1}, 0x0) request_key(&(0x7f0000000700)='ceph\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a}, &(0x7f0000000780)='eth0ppp0\x00', 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x200000000000006c, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') setns(r2, 0x4000000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000007c0)={0x0, 0xd9, "23fecfc99588e0ad369783a605440a345f65b3b28d793b9faae4bc36d2d2518fbff22a062673e74a02af5d598b03601e6445df7cf4202afa7a893ebc2075647dfc6afedcb351193d4c834b3a5fcf30cc1e8ad3845ee9a43586353132a5df41e5b6bf647b88ba096744d2ada590b292781a454075544c76f20817dd5ad36296472d385df2ea7a492c70f4fc92f184b230b927cb6d75a3ab0cb99dc438a268e457c6da7ffae1ef0ff163a070012a85f6c1ca94994cf0045df4cb4570c6df9b314d0e91f7a7bf6b230ba757441f7dd964c985bc8acc5fcb77e531"}, &(0x7f0000000040)=0xe1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r5, 0x0, 0x6, [0x3, 0x1, 0xfffffffffffffffc, 0x1, 0x0, 0x81]}, &(0x7f00000002c0)=0x14) 2018/04/16 23:23:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540)}}, {{&(0x7f00000004c0)=@in6={0x2, 0x2, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="10000000000000002900000032000000"], 0x10}}], 0x2, 0x0) 2018/04/16 23:23:16 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x73e0) sendfile(r1, r3, &(0x7f0000145000), 0x1000000000007dd) sendto$unix(r2, &(0x7f0000000040)=' ', 0x1, 0x0, &(0x7f0000000140)=@abs, 0x6e) [ 1086.716360] IPv4: Oversized IP packet from 127.0.0.1 2018/04/16 23:23:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f7c000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/16 23:23:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000180)="ea0300120126f267f22e260f2364660fd32a66b9470200000f320f20470f08baf80c66b88f4c858566efbafc0cec0fc75c20dce1440f20c0663501000000440f22c0", 0x42}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000000)="bba6013c95f36b1f672296de00626b34779e08f7d7", 0x0, 0x15}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:23:16 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x6, [], 0x1}}, 0x1c) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000005000), 0x0, &(0x7f0000000040)}, 0x0) [ 1086.755273] device bridge_slave_1 left promiscuous mode [ 1086.760982] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:23:16 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000340)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000001740)=[{&(0x7f0000001640)="083ab1c74586076326feb507b77d9e69feebfe6d1f740347e4bf4754260e4cca497a91d7b01067ab7c99ba9738591c0af7cc4be708c58babf34bf74ae25e2c13796b86553e43e7ebf867961cb745510a41f54b748991bca4a438edc69d0167b9af87c6a25ba1d0d98dfa4200b26ef4d5f1916eb6c6cf2c95bcc9b34184d3fe04db77c805c8a73c0b94404da56a931c96685a42ec6e0379c414e8dab0e67f6b0628a66ac899d84b5ea65c060331658439ce9337fe2b0463100040c6464b84884ec272eaafa6f9df36e35378af", 0xcc}], 0x1, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="fb82682a7381b25209e003f45377f79a48b12c08fee33313a6e41352f4e4b663113dc020b15b59141a9c6c9ae5087875257473ec5a83478b57fa37e808278c55c5e937f9bb40ac7df74f361d23698c5c1e8f6aca7a6264d4a9aece143643af15ce2d41473f08ed239edf70ecb0be389026ce066528244e8307f6bc0bfe306de2a00e8912fa1e4cc5b9e0ef0a25846a0ea8b411f316f6530341bd1d9440dbb0c09e8e127214b1e947d48d5cc2", 0xac}, {&(0x7f00000003c0)="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", 0x1d6}], 0x2, &(0x7f0000000600)=[{0x10, 0x0, 0x7}], 0x10}}], 0x2, 0x0) 2018/04/16 23:23:16 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={&(0x7f0000dd3f32), &(0x7f0000c95f34)}}, &(0x7f00009e4000)) timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000d89fe0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/16 23:23:16 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x73e0) sendfile(r1, r3, &(0x7f0000145000), 0x1000000000007dd) sendto$unix(r2, &(0x7f0000000040)=' ', 0x1, 0x0, &(0x7f0000000140)=@abs, 0x6e) [ 1086.832988] device bridge_slave_0 left promiscuous mode [ 1086.838623] bridge0: port 1(bridge_slave_0) entered disabled state [ 1086.959265] IPVS: ftp: loaded support on port[0] = 21 [ 1087.038425] team0 (unregistering): Port device team_slave_1 removed [ 1087.051578] team0 (unregistering): Port device team_slave_0 removed [ 1087.061497] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1087.074505] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1087.103349] bond0 (unregistering): Released all slaves [ 1087.691511] bridge0: port 1(bridge_slave_0) entered blocking state [ 1087.697978] bridge0: port 1(bridge_slave_0) entered disabled state [ 1087.709700] device bridge_slave_0 entered promiscuous mode [ 1087.750367] bridge0: port 2(bridge_slave_1) entered blocking state [ 1087.756847] bridge0: port 2(bridge_slave_1) entered disabled state [ 1087.764830] device bridge_slave_1 entered promiscuous mode [ 1087.803441] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1087.843333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1087.956245] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1087.998937] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1088.170423] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1088.180251] team0: Port device team_slave_0 added [ 1088.212627] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1088.220125] team0: Port device team_slave_1 added [ 1088.256486] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1088.263731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1088.272242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1088.306395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1088.345495] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1088.352736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1088.369140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1088.398500] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1088.405602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1088.414173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1088.644209] bridge0: port 2(bridge_slave_1) entered blocking state [ 1088.650602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1088.657232] bridge0: port 1(bridge_slave_0) entered blocking state [ 1088.663596] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1088.670858] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1089.183406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1089.496963] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1089.576918] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1089.655169] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1089.661461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1089.669365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1089.742566] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:23:20 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={&(0x7f0000dd3f32), &(0x7f0000c95f34)}}, &(0x7f00009e4000)) timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000d89fe0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/16 23:23:20 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc, &(0x7f0000000380)=0x80, 0x0) accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r1 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) keyctl$assume_authority(0x10, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0x0) keyctl$describe(0x6, 0x0, &(0x7f0000000b40)=""/4096, 0x1000) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000100)) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="840d572a8e609edca8c2551947d6efb55b7c8c94e1be6a1cf9f0b6c187b75286d9eed3d30f1edecec627b782331d1882137024a7df67ee9edfe12e1986880dcc2053b1f5ba810719d45c279d5082b3c8d02dab1ce0b01e1f4cb973cc1ece8d0deb7664206fa5c189e384551221e8e58c9a4775aa231a6349", 0x78, 0x0) close(0xffffffffffffffff) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x0, 0x3}, 0xfff1}, 0x1}, 0x0) r3 = add_key(&(0x7f0000000a80)="6173796d6d65747269630041472e8b637f55f694fcef0e58fc2ac924f9dd8addbd7bdb020097658e7651738b0e4ab818c6e76c0d075a9aafccb8dfa463c0e04194ee37284e414193d860", &(0x7f0000000b00)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000800), 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="ad6e2301849005b80f700749ce55a60fe1e41d5768c90ac2926a4d5cb5677573b42b9cd3cd194619f6f0d5f7662113df4b522d72293454068d859944dc8bd1449d14a763b027c673a6", 0x49}], 0x1, r3) mq_timedreceive(0xffffffffffffffff, &(0x7f0000be2f7d)=""/131, 0xfffffffffffffffd, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[{}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000180)='ns/cgroup\x00') r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020d00001000000000000000000000000300060000000000020000007f00000100400000000000000300050000000000020000000000000000000000000000000800120002000100000000000000000030000000030000000000000000a58300ff01000000000000000000000000000100000000000000000000ffffe000f60182193e2de13be6"], 0x87}, 0x1}, 0x0) request_key(&(0x7f0000000700)='ceph\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a}, &(0x7f0000000780)='eth0ppp0\x00', 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x200000000000006c, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') setns(r2, 0x4000000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000007c0)={0x0, 0xd9, "23fecfc99588e0ad369783a605440a345f65b3b28d793b9faae4bc36d2d2518fbff22a062673e74a02af5d598b03601e6445df7cf4202afa7a893ebc2075647dfc6afedcb351193d4c834b3a5fcf30cc1e8ad3845ee9a43586353132a5df41e5b6bf647b88ba096744d2ada590b292781a454075544c76f20817dd5ad36296472d385df2ea7a492c70f4fc92f184b230b927cb6d75a3ab0cb99dc438a268e457c6da7ffae1ef0ff163a070012a85f6c1ca94994cf0045df4cb4570c6df9b314d0e91f7a7bf6b230ba757441f7dd964c985bc8acc5fcb77e531"}, &(0x7f0000000040)=0xe1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r5, 0x0, 0x6, [0x3, 0x1, 0xfffffffffffffffc, 0x1, 0x0, 0x81]}, &(0x7f00000002c0)=0x14) 2018/04/16 23:23:20 executing program 3: nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 2018/04/16 23:23:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x6, [], 0x1}}, 0x1c) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000005000), 0x0, &(0x7f0000000040)}, 0x0) 2018/04/16 23:23:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f7c000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/16 23:23:20 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000abe000), &(0x7f000011dffc)=0x4) getrandom(&(0x7f0000000000)=""/192, 0xffffffffffffffb2, 0x3) 2018/04/16 23:23:20 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x2ff}]}) 2018/04/16 23:23:20 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={&(0x7f0000dd3f32), &(0x7f0000c95f34)}}, &(0x7f00009e4000)) timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000d89fe0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) [ 1090.332542] IPv4: Oversized IP packet from 127.0.0.1 2018/04/16 23:23:20 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000abe000), &(0x7f000011dffc)=0x4) getrandom(&(0x7f0000000000)=""/192, 0xffffffffffffffb2, 0x3) 2018/04/16 23:23:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f7c000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/16 23:23:20 executing program 7: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000abe000), &(0x7f000011dffc)=0x4) getrandom(&(0x7f0000000000)=""/192, 0xffffffffffffffb2, 0x3) 2018/04/16 23:23:20 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc, &(0x7f0000000380)=0x80, 0x0) accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r1 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) keyctl$assume_authority(0x10, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0x0) keyctl$describe(0x6, 0x0, &(0x7f0000000b40)=""/4096, 0x1000) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000100)) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="840d572a8e609edca8c2551947d6efb55b7c8c94e1be6a1cf9f0b6c187b75286d9eed3d30f1edecec627b782331d1882137024a7df67ee9edfe12e1986880dcc2053b1f5ba810719d45c279d5082b3c8d02dab1ce0b01e1f4cb973cc1ece8d0deb7664206fa5c189e384551221e8e58c9a4775aa231a6349", 0x78, 0x0) close(0xffffffffffffffff) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x0, 0x3}, 0xfff1}, 0x1}, 0x0) r3 = add_key(&(0x7f0000000a80)="6173796d6d65747269630041472e8b637f55f694fcef0e58fc2ac924f9dd8addbd7bdb020097658e7651738b0e4ab818c6e76c0d075a9aafccb8dfa463c0e04194ee37284e414193d860", &(0x7f0000000b00)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000800), 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="ad6e2301849005b80f700749ce55a60fe1e41d5768c90ac2926a4d5cb5677573b42b9cd3cd194619f6f0d5f7662113df4b522d72293454068d859944dc8bd1449d14a763b027c673a6", 0x49}], 0x1, r3) mq_timedreceive(0xffffffffffffffff, &(0x7f0000be2f7d)=""/131, 0xfffffffffffffffd, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[{}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000180)='ns/cgroup\x00') r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020d00001000000000000000000000000300060000000000020000007f00000100400000000000000300050000000000020000000000000000000000000000000800120002000100000000000000000030000000030000000000000000a58300ff01000000000000000000000000000100000000000000000000ffffe000f60182193e2de13be6"], 0x87}, 0x1}, 0x0) request_key(&(0x7f0000000700)='ceph\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a}, &(0x7f0000000780)='eth0ppp0\x00', 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x200000000000006c, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') setns(r2, 0x4000000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000007c0)={0x0, 0xd9, "23fecfc99588e0ad369783a605440a345f65b3b28d793b9faae4bc36d2d2518fbff22a062673e74a02af5d598b03601e6445df7cf4202afa7a893ebc2075647dfc6afedcb351193d4c834b3a5fcf30cc1e8ad3845ee9a43586353132a5df41e5b6bf647b88ba096744d2ada590b292781a454075544c76f20817dd5ad36296472d385df2ea7a492c70f4fc92f184b230b927cb6d75a3ab0cb99dc438a268e457c6da7ffae1ef0ff163a070012a85f6c1ca94994cf0045df4cb4570c6df9b314d0e91f7a7bf6b230ba757441f7dd964c985bc8acc5fcb77e531"}, &(0x7f0000000040)=0xe1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r5, 0x0, 0x6, [0x3, 0x1, 0xfffffffffffffffc, 0x1, 0x0, 0x81]}, &(0x7f00000002c0)=0x14) 2018/04/16 23:23:20 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x2ff}]}) [ 1090.439307] device bridge_slave_1 left promiscuous mode [ 1090.445005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1090.490284] device bridge_slave_0 left promiscuous mode [ 1090.495932] bridge0: port 1(bridge_slave_0) entered disabled state [ 1090.528902] IPv4: Oversized IP packet from 127.0.0.1 [ 1090.609173] team0 (unregistering): Port device team_slave_1 removed [ 1090.628970] team0 (unregistering): Port device team_slave_0 removed [ 1090.631798] IPVS: ftp: loaded support on port[0] = 21 [ 1090.642533] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1090.657643] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1090.684652] bond0 (unregistering): Released all slaves [ 1091.336825] bridge0: port 1(bridge_slave_0) entered blocking state [ 1091.343274] bridge0: port 1(bridge_slave_0) entered disabled state [ 1091.350659] device bridge_slave_0 entered promiscuous mode [ 1091.398114] bridge0: port 2(bridge_slave_1) entered blocking state [ 1091.404545] bridge0: port 2(bridge_slave_1) entered disabled state [ 1091.426949] device bridge_slave_1 entered promiscuous mode [ 1091.508217] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1091.565140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1091.710017] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1091.763896] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1091.942582] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1091.950061] team0: Port device team_slave_0 added [ 1091.987416] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1091.994806] team0: Port device team_slave_1 added [ 1092.029237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1092.069882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1092.106602] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1092.113763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1092.129168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1092.164331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1092.413928] bridge0: port 2(bridge_slave_1) entered blocking state [ 1092.420357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1092.427055] bridge0: port 1(bridge_slave_0) entered blocking state [ 1092.433442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1092.440744] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1093.311236] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1093.343134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1093.406186] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1093.494147] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1093.500390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1093.508324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1093.590776] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:23:23 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)={[0x35, 0x34, 0x30, 0x33, 0x36]}, 0x6) 2018/04/16 23:23:23 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={&(0x7f0000dd3f32), &(0x7f0000c95f34)}}, &(0x7f00009e4000)) timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000d89fe0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/16 23:23:23 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000abe000), &(0x7f000011dffc)=0x4) getrandom(&(0x7f0000000000)=""/192, 0xffffffffffffffb2, 0x3) 2018/04/16 23:23:23 executing program 7: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000abe000), &(0x7f000011dffc)=0x4) getrandom(&(0x7f0000000000)=""/192, 0xffffffffffffffb2, 0x3) 2018/04/16 23:23:23 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc, &(0x7f0000000380)=0x80, 0x0) accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r1 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) keyctl$assume_authority(0x10, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0x0) keyctl$describe(0x6, 0x0, &(0x7f0000000b40)=""/4096, 0x1000) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000100)) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="840d572a8e609edca8c2551947d6efb55b7c8c94e1be6a1cf9f0b6c187b75286d9eed3d30f1edecec627b782331d1882137024a7df67ee9edfe12e1986880dcc2053b1f5ba810719d45c279d5082b3c8d02dab1ce0b01e1f4cb973cc1ece8d0deb7664206fa5c189e384551221e8e58c9a4775aa231a6349", 0x78, 0x0) close(0xffffffffffffffff) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x0, 0x3}, 0xfff1}, 0x1}, 0x0) r3 = add_key(&(0x7f0000000a80)="6173796d6d65747269630041472e8b637f55f694fcef0e58fc2ac924f9dd8addbd7bdb020097658e7651738b0e4ab818c6e76c0d075a9aafccb8dfa463c0e04194ee37284e414193d860", &(0x7f0000000b00)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000800), 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="ad6e2301849005b80f700749ce55a60fe1e41d5768c90ac2926a4d5cb5677573b42b9cd3cd194619f6f0d5f7662113df4b522d72293454068d859944dc8bd1449d14a763b027c673a6", 0x49}], 0x1, r3) mq_timedreceive(0xffffffffffffffff, &(0x7f0000be2f7d)=""/131, 0xfffffffffffffffd, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[{}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000180)='ns/cgroup\x00') r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020d00001000000000000000000000000300060000000000020000007f00000100400000000000000300050000000000020000000000000000000000000000000800120002000100000000000000000030000000030000000000000000a58300ff01000000000000000000000000000100000000000000000000ffffe000f60182193e2de13be6"], 0x87}, 0x1}, 0x0) request_key(&(0x7f0000000700)='ceph\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a}, &(0x7f0000000780)='eth0ppp0\x00', 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x200000000000006c, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') setns(r2, 0x4000000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000007c0)={0x0, 0xd9, "23fecfc99588e0ad369783a605440a345f65b3b28d793b9faae4bc36d2d2518fbff22a062673e74a02af5d598b03601e6445df7cf4202afa7a893ebc2075647dfc6afedcb351193d4c834b3a5fcf30cc1e8ad3845ee9a43586353132a5df41e5b6bf647b88ba096744d2ada590b292781a454075544c76f20817dd5ad36296472d385df2ea7a492c70f4fc92f184b230b927cb6d75a3ab0cb99dc438a268e457c6da7ffae1ef0ff163a070012a85f6c1ca94994cf0045df4cb4570c6df9b314d0e91f7a7bf6b230ba757441f7dd964c985bc8acc5fcb77e531"}, &(0x7f0000000040)=0xe1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r5, 0x0, 0x6, [0x3, 0x1, 0xfffffffffffffffc, 0x1, 0x0, 0x81]}, &(0x7f00000002c0)=0x14) 2018/04/16 23:23:23 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x2ff}]}) 2018/04/16 23:23:23 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={&(0x7f0000dd3f32), &(0x7f0000c95f34)}}, &(0x7f00009e4000)) timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000d89fe0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/16 23:23:23 executing program 3: nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) [ 1094.189208] IPv4: Oversized IP packet from 127.0.0.1 2018/04/16 23:23:24 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={&(0x7f0000dd3f32), &(0x7f0000c95f34)}}, &(0x7f00009e4000)) timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000d89fe0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/16 23:23:24 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000abe000), &(0x7f000011dffc)=0x4) getrandom(&(0x7f0000000000)=""/192, 0xffffffffffffffb2, 0x3) 2018/04/16 23:23:24 executing program 7: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000abe000), &(0x7f000011dffc)=0x4) getrandom(&(0x7f0000000000)=""/192, 0xffffffffffffffb2, 0x3) 2018/04/16 23:23:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f000000c000)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f00000003c0)={0x18, 0x30, 0x821, 0x0, 0x0, {0x2}, [@generic="cf"]}, 0x18}, 0x1}, 0x0) 2018/04/16 23:23:24 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000280)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./control/file1\x00', &(0x7f0000000200)) close(r0) 2018/04/16 23:23:24 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x2ff}]}) 2018/04/16 23:23:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r4, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x4b564d02}]}) [ 1094.345266] device bridge_slave_1 left promiscuous mode [ 1094.350924] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/16 23:23:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000f12000)={0x400000010, 0x0, 0x0, 0x70a1}, 0xc) r1 = dup(r0) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00005c6000)=""/6, &(0x7f00001bb000)=0x3) [ 1094.403449] device bridge_slave_0 left promiscuous mode [ 1094.409160] bridge0: port 1(bridge_slave_0) entered disabled state [ 1094.489520] IPVS: ftp: loaded support on port[0] = 21 [ 1094.523231] team0 (unregistering): Port device team_slave_1 removed [ 1094.533713] team0 (unregistering): Port device team_slave_0 removed [ 1094.543732] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1094.562575] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1094.590728] bond0 (unregistering): Released all slaves [ 1095.377248] bridge0: port 1(bridge_slave_0) entered blocking state [ 1095.383766] bridge0: port 1(bridge_slave_0) entered disabled state [ 1095.391654] device bridge_slave_0 entered promiscuous mode [ 1095.430338] bridge0: port 2(bridge_slave_1) entered blocking state [ 1095.436771] bridge0: port 2(bridge_slave_1) entered disabled state [ 1095.444664] device bridge_slave_1 entered promiscuous mode [ 1095.483334] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1095.520773] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1095.631055] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1095.672474] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1095.712741] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1095.719824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1095.757958] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1095.764920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1095.862904] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1095.871068] team0: Port device team_slave_0 added [ 1095.905968] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1095.913212] team0: Port device team_slave_1 added [ 1095.937781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1095.976527] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1096.015064] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1096.022520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1096.031006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1096.052210] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1096.059305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1096.067868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1096.299991] bridge0: port 2(bridge_slave_1) entered blocking state [ 1096.306409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1096.313095] bridge0: port 1(bridge_slave_0) entered blocking state [ 1096.319465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1096.326812] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1096.671143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1097.169573] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1097.252810] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1097.333297] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1097.339483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1097.346617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1097.424556] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:23:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000f12000)={0x400000010, 0x0, 0x0, 0x70a1}, 0xc) r1 = dup(r0) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00005c6000)=""/6, &(0x7f00001bb000)=0x3) 2018/04/16 23:23:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f000000c000)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f00000003c0)={0x18, 0x30, 0x821, 0x0, 0x0, {0x2}, [@generic="cf"]}, 0x18}, 0x1}, 0x0) 2018/04/16 23:23:27 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @multicast1=0xe0000001}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 2018/04/16 23:23:27 executing program 3: nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 2018/04/16 23:23:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r4, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x4b564d02}]}) 2018/04/16 23:23:27 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={&(0x7f0000dd3f32), &(0x7f0000c95f34)}}, &(0x7f00009e4000)) timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000d89fe0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/16 23:23:27 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000280)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./control/file1\x00', &(0x7f0000000200)) close(r0) 2018/04/16 23:23:27 executing program 7: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000280)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./control/file1\x00', &(0x7f0000000200)) close(r0) 2018/04/16 23:23:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f000000c000)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f00000003c0)={0x18, 0x30, 0x821, 0x0, 0x0, {0x2}, [@generic="cf"]}, 0x18}, 0x1}, 0x0) 2018/04/16 23:23:27 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @multicast1=0xe0000001}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 2018/04/16 23:23:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000f12000)={0x400000010, 0x0, 0x0, 0x70a1}, 0xc) r1 = dup(r0) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00005c6000)=""/6, &(0x7f00001bb000)=0x3) 2018/04/16 23:23:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r4, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x4b564d02}]}) 2018/04/16 23:23:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f000000c000)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f00000003c0)={0x18, 0x30, 0x821, 0x0, 0x0, {0x2}, [@generic="cf"]}, 0x18}, 0x1}, 0x0) 2018/04/16 23:23:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r4, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x4b564d02}]}) [ 1098.108774] device bridge_slave_1 left promiscuous mode [ 1098.114440] bridge0: port 2(bridge_slave_1) entered disabled state [ 1098.136242] device bridge_slave_0 left promiscuous mode [ 1098.141889] bridge0: port 1(bridge_slave_0) entered disabled state [ 1098.181365] IPVS: ftp: loaded support on port[0] = 21 [ 1098.224793] team0 (unregistering): Port device team_slave_1 removed [ 1098.237800] team0 (unregistering): Port device team_slave_0 removed [ 1098.250201] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1098.266572] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1098.299499] bond0 (unregistering): Released all slaves [ 1099.057063] bridge0: port 1(bridge_slave_0) entered blocking state [ 1099.063556] bridge0: port 1(bridge_slave_0) entered disabled state [ 1099.080151] device bridge_slave_0 entered promiscuous mode [ 1099.142762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1099.149211] bridge0: port 2(bridge_slave_1) entered disabled state [ 1099.167554] device bridge_slave_1 entered promiscuous mode [ 1099.216398] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1099.256177] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1099.367983] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1099.407784] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1099.576735] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1099.583879] team0: Port device team_slave_0 added [ 1099.619628] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1099.627073] team0: Port device team_slave_1 added [ 1099.664818] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1099.692755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1099.732924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1099.774686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1100.001455] bridge0: port 2(bridge_slave_1) entered blocking state [ 1100.007849] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1100.014500] bridge0: port 1(bridge_slave_0) entered blocking state [ 1100.020864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1100.028275] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1100.871350] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1100.949339] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1100.959154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1101.031256] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1101.037449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1101.045223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1101.119194] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:23:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000f12000)={0x400000010, 0x0, 0x0, 0x70a1}, 0xc) r1 = dup(r0) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00005c6000)=""/6, &(0x7f00001bb000)=0x3) 2018/04/16 23:23:31 executing program 2: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000280)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./control/file1\x00', &(0x7f0000000200)) close(r0) 2018/04/16 23:23:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @multicast1=0xe0000001}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 2018/04/16 23:23:31 executing program 1: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000280)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./control/file1\x00', &(0x7f0000000200)) close(r0) 2018/04/16 23:23:31 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000280)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./control/file1\x00', &(0x7f0000000200)) close(r0) 2018/04/16 23:23:31 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @multicast1=0xe0000001}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 2018/04/16 23:23:31 executing program 7: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000280)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./control/file1\x00', &(0x7f0000000200)) close(r0) 2018/04/16 23:23:31 executing program 3: nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 2018/04/16 23:23:31 executing program 0: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000010c0)=0x14, 0x80000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001100)=0x0) bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x8, 0x4, 0x80000000004, 0x8000000007}, 0x2c) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r2, 0xeb8) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001140)='ip6_vti0\x00', 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='ifb0\x00', 0x10) r3 = accept(r2, &(0x7f0000000040)=@pppoe={0x0, 0x0, {0x0, @link_local}}, &(0x7f00000000c0)=0x80) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0x10, 0x70bd2a, 0x25dfdbff, {0x4}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r5 = socket$inet(0x2, 0x80000, 0x3) ioctl$sock_inet_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000000180)) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) r6 = socket(0xa, 0x7, 0x3) getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001180)={0x0, 0x0, 0x0}, &(0x7f00000011c0)=0xc) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001240)={r1, r7, r8}, 0xc) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f0000001280)=0x7, 0x4) socket$inet6_sctp(0xa, 0x1, 0x84) 2018/04/16 23:23:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @multicast1=0xe0000001}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 2018/04/16 23:23:31 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @multicast1=0xe0000001}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) [ 1101.725756] Dead loop on virtual device ip6_vti0, fix it urgently! [ 1101.787127] IPVS: ftp: loaded support on port[0] = 21 [ 1101.805280] device bridge_slave_1 left promiscuous mode [ 1101.810991] bridge0: port 2(bridge_slave_1) entered disabled state [ 1101.829086] device bridge_slave_0 left promiscuous mode [ 1101.834669] bridge0: port 1(bridge_slave_0) entered disabled state [ 1101.873544] team0 (unregistering): Port device team_slave_1 removed [ 1101.884010] team0 (unregistering): Port device team_slave_0 removed [ 1101.896131] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1101.913340] bond0 (unregistering): Releasing backup interface bond_slave_0 2018/04/16 23:23:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @multicast1=0xe0000001}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 2018/04/16 23:23:31 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000b3dfc8)={&(0x7f0000000040)={0x10}, 0xff6d, &(0x7f00000005c0)={&(0x7f0000000000)={0x40, 0x1d, 0x109, 0x0, 0x0, {0x7}, [@nested={0x18, 0x1, [@typed={0x14, 0x0, @ipv6=@dev={0xfe, 0x80}}]}, @typed={0x14, 0x3, @ipv6=@local={0xfe, 0x80, [], 0xaa}}]}, 0x40}, 0x1}, 0x0) [ 1101.941179] bond0 (unregistering): Released all slaves 2018/04/16 23:23:31 executing program 4: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) [ 1101.990566] netlink: 'syz-executor6': attribute type 1 has an invalid length. [ 1101.998278] netlink: 'syz-executor6': attribute type 3 has an invalid length. [ 1102.007305] netlink: 'syz-executor6': attribute type 1 has an invalid length. [ 1102.014957] netlink: 'syz-executor6': attribute type 3 has an invalid length. [ 1102.558598] Dead loop on virtual device ip6_vti0, fix it urgently! [ 1102.736390] Dead loop on virtual device ip6_vti0, fix it urgently! [ 1102.751635] Dead loop on virtual device ip6_vti0, fix it urgently! [ 1102.788468] Dead loop on virtual device ip6_vti0, fix it urgently! [ 1102.911278] bridge0: port 1(bridge_slave_0) entered blocking state [ 1102.917801] bridge0: port 1(bridge_slave_0) entered disabled state [ 1102.926000] device bridge_slave_0 entered promiscuous mode [ 1102.965991] bridge0: port 2(bridge_slave_1) entered blocking state [ 1102.972400] bridge0: port 2(bridge_slave_1) entered disabled state [ 1102.979908] device bridge_slave_1 entered promiscuous mode [ 1103.016007] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1103.051448] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1103.166297] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1103.205289] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1103.374733] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1103.382999] team0: Port device team_slave_0 added [ 1103.418869] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1103.426363] team0: Port device team_slave_1 added [ 1103.458430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1103.497147] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1103.535295] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1103.542505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1103.551780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1103.572108] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1103.579268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1103.596243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1103.855660] bridge0: port 2(bridge_slave_1) entered blocking state [ 1103.862082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1103.868745] bridge0: port 1(bridge_slave_0) entered blocking state [ 1103.875116] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1103.882458] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1103.992125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1104.708723] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1104.790796] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1104.874321] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1104.880493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1104.887719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1104.960263] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:23:35 executing program 1: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000280)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./control/file1\x00', &(0x7f0000000200)) close(r0) 2018/04/16 23:23:35 executing program 4: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/16 23:23:35 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000280)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./control/file1\x00', &(0x7f0000000200)) close(r0) 2018/04/16 23:23:35 executing program 0: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000010c0)=0x14, 0x80000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001100)=0x0) bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x8, 0x4, 0x80000000004, 0x8000000007}, 0x2c) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r2, 0xeb8) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001140)='ip6_vti0\x00', 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='ifb0\x00', 0x10) r3 = accept(r2, &(0x7f0000000040)=@pppoe={0x0, 0x0, {0x0, @link_local}}, &(0x7f00000000c0)=0x80) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0x10, 0x70bd2a, 0x25dfdbff, {0x4}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r5 = socket$inet(0x2, 0x80000, 0x3) ioctl$sock_inet_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000000180)) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) r6 = socket(0xa, 0x7, 0x3) getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001180)={0x0, 0x0, 0x0}, &(0x7f00000011c0)=0xc) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001240)={r1, r7, r8}, 0xc) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f0000001280)=0x7, 0x4) socket$inet6_sctp(0xa, 0x1, 0x84) 2018/04/16 23:23:35 executing program 7: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000280)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./control/file1\x00', &(0x7f0000000200)) close(r0) 2018/04/16 23:23:35 executing program 2: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000280)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./control/file1\x00', &(0x7f0000000200)) close(r0) 2018/04/16 23:23:35 executing program 3: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000010c0)=0x14, 0x80000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001100)=0x0) bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x8, 0x4, 0x80000000004, 0x8000000007}, 0x2c) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r2, 0xeb8) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001140)='ip6_vti0\x00', 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='ifb0\x00', 0x10) r3 = accept(r2, &(0x7f0000000040)=@pppoe={0x0, 0x0, {0x0, @link_local}}, &(0x7f00000000c0)=0x80) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0x10, 0x70bd2a, 0x25dfdbff, {0x4}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r5 = socket$inet(0x2, 0x80000, 0x3) ioctl$sock_inet_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000000180)) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) r6 = socket(0xa, 0x7, 0x3) getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001180)={0x0, 0x0, 0x0}, &(0x7f00000011c0)=0xc) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001240)={r1, r7, r8}, 0xc) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f0000001280)=0x7, 0x4) socket$inet6_sctp(0xa, 0x1, 0x84) 2018/04/16 23:23:35 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000b3dfc8)={&(0x7f0000000040)={0x10}, 0xff6d, &(0x7f00000005c0)={&(0x7f0000000000)={0x40, 0x1d, 0x109, 0x0, 0x0, {0x7}, [@nested={0x18, 0x1, [@typed={0x14, 0x0, @ipv6=@dev={0xfe, 0x80}}]}, @typed={0x14, 0x3, @ipv6=@local={0xfe, 0x80, [], 0xaa}}]}, 0x40}, 0x1}, 0x0) [ 1105.514879] netlink: 'syz-executor6': attribute type 1 has an invalid length. [ 1105.522409] netlink: 'syz-executor6': attribute type 3 has an invalid length. [ 1105.525826] Dead loop on virtual device ip6_vti0, fix it urgently! 2018/04/16 23:23:35 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000b3dfc8)={&(0x7f0000000040)={0x10}, 0xff6d, &(0x7f00000005c0)={&(0x7f0000000000)={0x40, 0x1d, 0x109, 0x0, 0x0, {0x7}, [@nested={0x18, 0x1, [@typed={0x14, 0x0, @ipv6=@dev={0xfe, 0x80}}]}, @typed={0x14, 0x3, @ipv6=@local={0xfe, 0x80, [], 0xaa}}]}, 0x40}, 0x1}, 0x0) 2018/04/16 23:23:35 executing program 4: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/16 23:23:35 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000b3dfc8)={&(0x7f0000000040)={0x10}, 0xff6d, &(0x7f00000005c0)={&(0x7f0000000000)={0x40, 0x1d, 0x109, 0x0, 0x0, {0x7}, [@nested={0x18, 0x1, [@typed={0x14, 0x0, @ipv6=@dev={0xfe, 0x80}}]}, @typed={0x14, 0x3, @ipv6=@local={0xfe, 0x80, [], 0xaa}}]}, 0x40}, 0x1}, 0x0) [ 1105.619226] netlink: 'syz-executor6': attribute type 1 has an invalid length. [ 1105.626708] netlink: 'syz-executor6': attribute type 3 has an invalid length. [ 1105.657262] device bridge_slave_1 left promiscuous mode [ 1105.662925] bridge0: port 2(bridge_slave_1) entered disabled state [ 1105.669673] netlink: 'syz-executor6': attribute type 1 has an invalid length. [ 1105.677124] netlink: 'syz-executor6': attribute type 3 has an invalid length. [ 1105.690149] device bridge_slave_0 left promiscuous mode [ 1105.695720] bridge0: port 1(bridge_slave_0) entered disabled state [ 1105.699783] IPVS: ftp: loaded support on port[0] = 21 2018/04/16 23:23:35 executing program 4: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) [ 1105.748781] team0 (unregistering): Port device team_slave_1 removed [ 1105.766168] team0 (unregistering): Port device team_slave_0 removed [ 1105.780725] bond0 (unregistering): Releasing backup interface bond_slave_1 2018/04/16 23:23:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00002ac000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f00000001c0)) close(r0) [ 1105.805346] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1105.833870] bond0 (unregistering): Released all slaves 2018/04/16 23:23:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="1004000000100000cc000000490b0000ec0300ed00000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53ef010001000000e95dbe5a00000000000000000100000000000000848d00008000000005000000000000007659", 0x66, 0x400}], 0x0, &(0x7f0000000140)) 2018/04/16 23:23:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x8, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/16 23:23:35 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r0, 0x3, 0x0, 0xf4) [ 1106.356109] Dead loop on virtual device ip6_vti0, fix it urgently! [ 1106.527361] Dead loop on virtual device ip6_vti0, fix it urgently! [ 1106.712626] bridge0: port 1(bridge_slave_0) entered blocking state [ 1106.719119] bridge0: port 1(bridge_slave_0) entered disabled state [ 1106.727116] device bridge_slave_0 entered promiscuous mode [ 1106.764565] bridge0: port 2(bridge_slave_1) entered blocking state [ 1106.770991] bridge0: port 2(bridge_slave_1) entered disabled state [ 1106.778604] device bridge_slave_1 entered promiscuous mode [ 1106.815484] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1106.851137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1106.911164] INFO: task kworker/0:2:2090 blocked for more than 120 seconds. [ 1106.918288] Not tainted 4.17.0-rc1+ #6 [ 1106.922760] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1106.930746] kworker/0:2 D19128 2090 2 0x80000000 [ 1106.936444] Workqueue: events cgwb_release_workfn [ 1106.941309] Call Trace: [ 1106.943940] __schedule+0x801/0x1e30 [ 1106.947688] ? __sched_text_start+0x8/0x8 [ 1106.951870] ? lock_downgrade+0x8e0/0x8e0 [ 1106.956074] ? mark_held_locks+0xc9/0x160 [ 1106.960335] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 1106.964946] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 1106.970076] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1106.975126] schedule+0xef/0x430 [ 1106.978516] ? prepare_to_wait+0x194/0x4d0 [ 1106.982768] ? __schedule+0x1e30/0x1e30 [ 1106.986770] ? finish_wait+0x420/0x420 [ 1106.990682] ? graph_lock+0x170/0x170 [ 1106.994509] ? zap_class+0x720/0x720 [ 1106.998251] ? print_usage_bug+0xc0/0xc0 [ 1107.002336] ? find_held_lock+0x36/0x1c0 [ 1107.006426] bit_wait+0x18/0x90 [ 1107.009761] __wait_on_bit+0xb3/0x130 [ 1107.013616] ? bit_wait_io+0x90/0x90 [ 1107.017379] out_of_line_wait_on_bit+0x204/0x3a0 [ 1107.022191] ? check_same_owner+0x320/0x320 [ 1107.026551] ? __wait_on_bit+0x130/0x130 [ 1107.030677] ? init_wait_var_entry+0x1a0/0x1a0 [ 1107.035300] ? __might_sleep+0x95/0x190 [ 1107.039333] wb_shutdown+0x370/0x470 [ 1107.043085] ? set_wb_congested+0x70/0x70 [ 1107.047282] ? find_held_lock+0x36/0x1c0 [ 1107.051383] ? graph_lock+0x170/0x170 [ 1107.055229] ? lock_acquire+0x1dc/0x520 [ 1107.059242] cgwb_release_workfn+0x87/0x750 [ 1107.063610] ? wb_get_create+0x1dd0/0x1dd0 [ 1107.067890] ? __lock_is_held+0xb5/0x140 [ 1107.072005] process_one_work+0xc1e/0x1b50 [ 1107.076300] ? finish_task_switch+0x182/0x810 [ 1107.080865] ? pwq_dec_nr_in_flight+0x490/0x490 [ 1107.085609] ? perf_trace_lock_acquire+0xe3/0x980 [ 1107.090496] ? __schedule+0x809/0x1e30 [ 1107.094439] ? retint_kernel+0x10/0x10 [ 1107.098390] ? graph_lock+0x170/0x170 [ 1107.102241] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1107.107331] ? retint_kernel+0x10/0x10 [ 1107.111269] ? lock_acquire+0x1dc/0x520 [ 1107.115285] ? lock_downgrade+0x8e0/0x8e0 [ 1107.119471] ? lock_release+0xa10/0xa10 [ 1107.123487] ? kasan_check_read+0x11/0x20 [ 1107.127671] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 1107.132305] worker_thread+0x1cc/0x1440 [ 1107.136334] ? process_one_work+0x1b50/0x1b50 [ 1107.140881] ? graph_lock+0x170/0x170 [ 1107.144720] ? find_held_lock+0x36/0x1c0 [ 1107.148839] ? find_held_lock+0x36/0x1c0 [ 1107.152953] ? __schedule+0x1e30/0x1e30 [ 1107.156977] ? do_raw_spin_unlock+0x9e/0x2e0 [ 1107.161425] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 1107.166079] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 1107.171226] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1107.176291] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1107.181868] ? __kthread_parkme+0x1b7/0x280 [ 1107.186240] kthread+0x345/0x410 [ 1107.189640] ? process_one_work+0x1b50/0x1b50 [ 1107.194179] ? kthread_bind+0x40/0x40 [ 1107.198056] ret_from_fork+0x3a/0x50 [ 1107.201800] [ 1107.201800] Showing all locks held in the system: [ 1107.208196] 2 locks held by khungtaskd/889: [ 1107.212890] #0: 00000000b416ef84 (rcu_read_lock){....}, at: watchdog+0x1ff/0xf60 [ 1107.220626] #1: 000000002c591360 (tasklist_lock){.+.+}, at: debug_show_all_locks+0xde/0x34a [ 1107.222038] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1107.229305] 2 locks held by kworker/0:2/2090: [ 1107.241377] #0: 00000000fda19ec7 ((wq_completion)"events"){+.+.}, at: process_one_work+0xaef/0x1b50 [ 1107.250740] #1: 00000000e4e55c16 ((work_completion)(&wb->release_work)){+.+.}, at: process_one_work+0xb46/0x1b50 [ 1107.261191] 2 locks held by getty/4446: [ 1107.265163] #0: 0000000029b33f6b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1107.273418] #1: 000000006c1a895a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1107.282306] 2 locks held by getty/4447: [ 1107.286279] #0: 0000000070f20db5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1107.294532] #1: 00000000a0ff0e7c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1107.303414] 2 locks held by getty/4448: [ 1107.307384] #0: 00000000050910f3 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1107.315641] #1: 00000000b3d02f7f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1107.324510] 2 locks held by getty/4449: [ 1107.328483] #0: 0000000016117133 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1107.336738] #1: 00000000d0c7aebc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1107.345602] 2 locks held by getty/4450: [ 1107.349594] #0: 000000001b768c50 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1107.357847] #1: 000000009bfc49f1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1107.366745] 2 locks held by getty/4451: [ 1107.370717] #0: 0000000048dc11ee (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1107.378967] #1: 00000000375b0f89 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1107.387830] 2 locks held by getty/4452: [ 1107.391799] #0: 000000000d0f6ca4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1107.400049] #1: 00000000ecfe74b9 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1107.408944] [ 1107.410569] ============================================= [ 1107.410569] [ 1107.417588] NMI backtrace for cpu 1 [ 1107.421259] CPU: 1 PID: 889 Comm: khungtaskd Not tainted 4.17.0-rc1+ #6 [ 1107.428008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.437359] Call Trace: [ 1107.439953] dump_stack+0x1b9/0x294 [ 1107.443589] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1107.448342] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1107.448783] nmi_cpu_backtrace.cold.4+0x19/0xce [ 1107.460963] ? lapic_can_unplug_cpu.cold.26+0x3f/0x3f [ 1107.466153] nmi_trigger_cpumask_backtrace+0x151/0x192 [ 1107.471443] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1107.476637] watchdog+0xc10/0xf60 [ 1107.480119] ? reset_hung_task_detector+0xb0/0xb0 [ 1107.484976] ? __schedule+0x1e30/0x1e30 [ 1107.488955] ? do_raw_spin_unlock+0x9e/0x2e0 [ 1107.493367] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 1107.497951] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 1107.503057] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1107.508094] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1107.513628] ? __kthread_parkme+0x1b7/0x280 [ 1107.517931] kthread+0x345/0x410 [ 1107.521289] ? reset_hung_task_detector+0xb0/0xb0 [ 1107.526111] ? kthread_bind+0x40/0x40 [ 1107.529894] ret_from_fork+0x3a/0x50 [ 1107.533680] Sending NMI from CPU 1 to CPUs 0: [ 1107.538219] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0x6/0x10 [ 1107.539208] Kernel panic - not syncing: hung_task: blocked tasks [ 1107.552682] CPU: 1 PID: 889 Comm: khungtaskd Not tainted 4.17.0-rc1+ #6 [ 1107.559411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.568739] Call Trace: [ 1107.571311] dump_stack+0x1b9/0x294 [ 1107.574920] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1107.580092] ? printk_safe_log_store+0x260/0x260 [ 1107.584832] panic+0x22f/0x4de [ 1107.588005] ? add_taint.cold.5+0x16/0x16 [ 1107.592142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.597660] ? nmi_trigger_cpumask_backtrace+0x13a/0x192 [ 1107.603089] ? printk_safe_flush+0xd7/0x130 [ 1107.607401] watchdog+0xc21/0xf60 [ 1107.610836] ? reset_hung_task_detector+0xb0/0xb0 [ 1107.615663] ? __schedule+0x1e30/0x1e30 [ 1107.619618] ? do_raw_spin_unlock+0x9e/0x2e0 [ 1107.624008] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 1107.628579] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 1107.633663] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1107.638661] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1107.644186] ? __kthread_parkme+0x1b7/0x280 [ 1107.648487] kthread+0x345/0x410 [ 1107.651833] ? reset_hung_task_detector+0xb0/0xb0 [ 1107.656653] ? kthread_bind+0x40/0x40 [ 1107.660436] ret_from_fork+0x3a/0x50 [ 1107.664897] Dumping ftrace buffer: [ 1107.668563] (ftrace buffer empty) [ 1107.672253] Kernel Offset: disabled [ 1107.675861] Rebooting in 86400 seconds..