[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 33.018319] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 36.437241] random: sshd: uninitialized urandom read (32 bytes read) [ 37.130686] random: sshd: uninitialized urandom read (32 bytes read) [ 38.513415] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.25' (ECDSA) to the list of known hosts. [ 44.067207] random: sshd: uninitialized urandom read (32 bytes read) 2018/05/08 19:12:17 fuzzer started 2018/05/08 19:12:17 dialing manager at 10.128.0.26:35805 [ 63.492555] can: request_module (can-proto-0) failed. [ 63.503566] can: request_module (can-proto-0) failed. 2018/05/08 19:12:38 kcov=true, comps=false 2018/05/08 19:12:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r0, 0x3a, 0x0, &(0x7f0000000000), 0x0) 2018/05/08 19:12:39 executing program 2: pipe(&(0x7f0000f59ff8)={0x0, 0x0}) splice(r0, &(0x7f00000e2000), r1, &(0x7f00000d1000), 0x2, 0x0) 2018/05/08 19:12:39 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) 2018/05/08 19:12:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/47) ioctl$TCGETA(r0, 0x8004552d, &(0x7f0000000000)) 2018/05/08 19:12:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00001e0ff7)='pagemap\x00') preadv(r0, &(0x7f0000b24fb0)=[{&(0x7f00000000c0)=""/8, 0x8}], 0x1, 0x2000000000) 2018/05/08 19:12:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000210000)=0x2, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x1000, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x15c7}, 0x1c) 2018/05/08 19:12:40 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080), &(0x7f00000000c0)=0x8) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/05/08 19:12:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000bae4139700000000ff00009400000000e5000095001a0000000000"], &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) write(r1, &(0x7f0000000080)="260000005e0009000000df623339410e590000000001000000ffffff00000000000000000000", 0x26) [ 67.802946] IPVS: ftp: loaded support on port[0] = 21 [ 67.838394] IPVS: ftp: loaded support on port[0] = 21 [ 67.874786] IPVS: ftp: loaded support on port[0] = 21 [ 67.890926] IPVS: ftp: loaded support on port[0] = 21 [ 67.932542] IPVS: ftp: loaded support on port[0] = 21 [ 67.944811] IPVS: ftp: loaded support on port[0] = 21 [ 68.030478] IPVS: ftp: loaded support on port[0] = 21 [ 68.049815] IPVS: ftp: loaded support on port[0] = 21 [ 70.033380] ip (4746) used greatest stack depth: 54456 bytes left [ 70.541105] ip (4779) used greatest stack depth: 54088 bytes left [ 71.125744] ip (4831) used greatest stack depth: 53784 bytes left [ 71.500306] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.506803] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.521219] device bridge_slave_0 entered promiscuous mode [ 71.535147] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.541610] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.558272] device bridge_slave_0 entered promiscuous mode [ 71.588572] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.595121] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.609111] device bridge_slave_0 entered promiscuous mode [ 71.627187] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.633659] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.662305] device bridge_slave_0 entered promiscuous mode [ 71.680701] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.687209] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.707545] device bridge_slave_0 entered promiscuous mode [ 71.762184] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.768688] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.795405] device bridge_slave_1 entered promiscuous mode [ 71.811717] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.818185] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.834186] device bridge_slave_1 entered promiscuous mode [ 71.853444] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.859900] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.870527] device bridge_slave_0 entered promiscuous mode [ 71.885409] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.891857] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.915840] device bridge_slave_1 entered promiscuous mode [ 71.941659] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.948153] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.962634] device bridge_slave_1 entered promiscuous mode [ 71.974472] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.981087] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.002267] device bridge_slave_1 entered promiscuous mode [ 72.016239] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.022711] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.037805] device bridge_slave_0 entered promiscuous mode [ 72.046917] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.053389] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.065192] device bridge_slave_0 entered promiscuous mode [ 72.084093] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.092535] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.101191] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.107625] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.139417] device bridge_slave_1 entered promiscuous mode [ 72.155689] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.165859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.173734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.256083] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.262563] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.274610] device bridge_slave_1 entered promiscuous mode [ 72.286461] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.293016] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.327993] device bridge_slave_1 entered promiscuous mode [ 72.336933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.348891] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.364807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.372959] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.384938] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.393356] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.485526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.528132] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.644538] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.675443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.735277] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.971897] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.992930] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.053682] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.090903] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.103444] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.206832] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.251938] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.301827] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.326186] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.349972] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.363543] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.385994] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.420788] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.459800] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.466797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.496743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.503791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.537399] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.544422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.564515] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.573339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.617710] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.633454] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.640471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.669942] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.688551] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.700985] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.707997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.748448] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.755888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.763294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.774716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.824126] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.831548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.852917] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.860292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.906576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.922422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.957608] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.964576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.009519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.016652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.046654] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.053658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.147873] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.155515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.283370] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.293527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.423765] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.449859] team0: Port device team_slave_0 added [ 74.493592] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.516681] team0: Port device team_slave_0 added [ 74.525429] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.534853] team0: Port device team_slave_0 added [ 74.569280] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.581966] team0: Port device team_slave_0 added [ 74.606949] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.622549] team0: Port device team_slave_0 added [ 74.662193] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.696418] team0: Port device team_slave_1 added [ 74.723649] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.752470] team0: Port device team_slave_1 added [ 74.777880] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.799117] team0: Port device team_slave_1 added [ 74.820271] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.847188] team0: Port device team_slave_0 added [ 74.871845] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.882445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.897950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.927801] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.944519] team0: Port device team_slave_0 added [ 74.950524] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.964412] team0: Port device team_slave_1 added [ 74.981376] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.991657] team0: Port device team_slave_1 added [ 75.003244] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.014648] team0: Port device team_slave_0 added [ 75.021902] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.029194] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.038562] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.060320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.088009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.122158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.160908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.186353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.196372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.223755] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.232286] team0: Port device team_slave_1 added [ 75.241663] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.249183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.263474] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.272695] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.291056] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.299777] team0: Port device team_slave_1 added [ 75.310713] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.322341] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.336396] team0: Port device team_slave_1 added [ 75.349357] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.376673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.396976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.432579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.454062] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.467328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.476929] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.487612] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.515393] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.522869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.538848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.554144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.569792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.581676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.591233] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.600593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.610670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.619632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.642634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.660138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.684969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.709306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.724399] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.732160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.740171] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.748428] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.759439] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.768344] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.788456] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.797415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.812952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.834982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.856337] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.874189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.894563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.902910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.911389] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.923188] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.931203] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.940339] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.952075] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.963180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.981881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.006666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.024962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.043592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.058569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.074797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.083538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.096376] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.119299] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.139754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.152426] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.169794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.188280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.203697] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.214898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.224483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.235224] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.250737] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.260834] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.277285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.305632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.332959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.364247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.393994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.403803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.414334] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.422948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.431476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.451675] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.464457] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.478982] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.488962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.505058] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.523483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.656883] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.665093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.683222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.483161] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.489672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.496521] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.502985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.548607] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.560348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.584407] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.590887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.597706] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.604135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.635011] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.670247] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.676728] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.683616] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.690127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.731126] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.759928] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.766431] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.773363] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.779818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.842653] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.854689] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.861158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.868069] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.874525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.906804] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.918085] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.924562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.931392] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.937857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.946790] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.963938] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.970410] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.977298] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.983780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.993012] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.229158] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.235691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.242568] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.249051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.315788] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.584064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.600935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.621904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.648930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.664874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.673929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.681973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 87.546391] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.569714] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.585870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.617962] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.690577] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.786283] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.056146] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.086193] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.305897] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.401656] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.430804] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.530501] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.540350] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.573188] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.842982] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.909848] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 89.092807] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.099272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.111891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.262236] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.268562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.282332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.353007] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.359642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.371600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.403259] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.409553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.418918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.464446] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.471973] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.479053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.493054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.519128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.552923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.773325] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.779708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.790722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.826740] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.842361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.863723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.151736] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.203923] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.263575] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.282839] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.320607] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.350015] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.613610] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.685427] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/08 19:13:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00001e0ff7)='pagemap\x00') preadv(r0, &(0x7f0000b24fb0)=[{&(0x7f00000000c0)=""/8, 0x8}], 0x1, 0x2000000000) 2018/05/08 19:13:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r0, 0x3a, 0x0, &(0x7f0000000000), 0x0) 2018/05/08 19:13:08 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) 2018/05/08 19:13:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00001e0ff7)='pagemap\x00') preadv(r0, &(0x7f0000b24fb0)=[{&(0x7f00000000c0)=""/8, 0x8}], 0x1, 0x2000000000) 2018/05/08 19:13:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/47) ioctl$TCGETA(r0, 0x8004552d, &(0x7f0000000000)) 2018/05/08 19:13:08 executing program 2: pipe(&(0x7f0000f59ff8)={0x0, 0x0}) splice(r0, &(0x7f00000e2000), r1, &(0x7f00000d1000), 0x2, 0x0) 2018/05/08 19:13:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000bae4139700000000ff00009400000000e5000095001a0000000000"], &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) write(r1, &(0x7f0000000080)="260000005e0009000000df623339410e590000000001000000ffffff00000000000000000000", 0x26) 2018/05/08 19:13:08 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080), &(0x7f00000000c0)=0x8) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/05/08 19:13:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000210000)=0x2, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x1000, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x15c7}, 0x1c) 2018/05/08 19:13:09 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r0, 0x3a, 0x0, &(0x7f0000000000), 0x0) 2018/05/08 19:13:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/47) ioctl$TCGETA(r0, 0x8004552d, &(0x7f0000000000)) 2018/05/08 19:13:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00001e0ff7)='pagemap\x00') preadv(r0, &(0x7f0000b24fb0)=[{&(0x7f00000000c0)=""/8, 0x8}], 0x1, 0x2000000000) 2018/05/08 19:13:09 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) 2018/05/08 19:13:09 executing program 2: pipe(&(0x7f0000f59ff8)={0x0, 0x0}) splice(r0, &(0x7f00000e2000), r1, &(0x7f00000d1000), 0x2, 0x0) 2018/05/08 19:13:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000bae4139700000000ff00009400000000e5000095001a0000000000"], &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) write(r1, &(0x7f0000000080)="260000005e0009000000df623339410e590000000001000000ffffff00000000000000000000", 0x26) 2018/05/08 19:13:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000210000)=0x2, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x1000, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x15c7}, 0x1c) 2018/05/08 19:13:09 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r0, 0x3a, 0x0, &(0x7f0000000000), 0x0) 2018/05/08 19:13:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000bae4139700000000ff00009400000000e5000095001a0000000000"], &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) write(r1, &(0x7f0000000080)="260000005e0009000000df623339410e590000000001000000ffffff00000000000000000000", 0x26) 2018/05/08 19:13:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/47) ioctl$TCGETA(r0, 0x8004552d, &(0x7f0000000000)) 2018/05/08 19:13:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000bae4139700000000ff00009400000000e5000095001a0000000000"], &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) write(r1, &(0x7f0000000080)="260000005e0009000000df623339410e590000000001000000ffffff00000000000000000000", 0x26) 2018/05/08 19:13:09 executing program 2: pipe(&(0x7f0000f59ff8)={0x0, 0x0}) splice(r0, &(0x7f00000e2000), r1, &(0x7f00000d1000), 0x2, 0x0) 2018/05/08 19:13:09 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080), &(0x7f00000000c0)=0x8) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/05/08 19:13:09 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) 2018/05/08 19:13:10 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = gettid() syz_open_dev$evdev(&(0x7f0000012fee)='/dev/input/event#\x00', 0x0, 0x0) tkill(r1, 0x7) 2018/05/08 19:13:10 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f000098cfe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x9d}, 0x8) 2018/05/08 19:13:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000adcff8)=[{0x6, 0x0, 0x0, 0x9f}]}, 0x10) sendto$inet(r0, &(0x7f0000e9bf14), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000618ec1)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0d61c0d32e11b38e9dd18c58f6bd779650fc30d93653bdaecf323c9f62ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e3168", 0x80, 0x51, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 2018/05/08 19:13:10 executing program 7: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cpuset\x00', 0x0, &(0x7f0000000280)) 2018/05/08 19:13:10 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.sched_load_balance\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0x3) 2018/05/08 19:13:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000bae4139700000000ff00009400000000e5000095001a0000000000"], &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) write(r1, &(0x7f0000000080)="260000005e0009000000df623339410e590000000001000000ffffff00000000000000000000", 0x26) 2018/05/08 19:13:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000210000)=0x2, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x1000, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x15c7}, 0x1c) 2018/05/08 19:13:10 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.sched_load_balance\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0x3) 2018/05/08 19:13:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000adcff8)=[{0x6, 0x0, 0x0, 0x9f}]}, 0x10) sendto$inet(r0, &(0x7f0000e9bf14), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000618ec1)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0d61c0d32e11b38e9dd18c58f6bd779650fc30d93653bdaecf323c9f62ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e3168", 0x80, 0x51, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 2018/05/08 19:13:10 executing program 5: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f00000002c0)) [ 97.325116] sctp: [Deprecated]: syz-executor1 (pid 6739) Use of struct sctp_assoc_value in delayed_ack socket option. [ 97.325116] Use struct sctp_sack_info instead 2018/05/08 19:13:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000bae4139700000000ff00009400000000e5000095001a0000000000"], &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) write(r1, &(0x7f0000000080)="260000005e0009000000df623339410e590000000001000000ffffff00000000000000000000", 0x26) 2018/05/08 19:13:10 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.sched_load_balance\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0x3) 2018/05/08 19:13:10 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x5, r1, 0x800000, &(0x7f0000000040)={&(0x7f00000033c0)=""/4096, 0x1000}) 2018/05/08 19:13:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000adcff8)=[{0x6, 0x0, 0x0, 0x9f}]}, 0x10) sendto$inet(r0, &(0x7f0000e9bf14), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000618ec1)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0d61c0d32e11b38e9dd18c58f6bd779650fc30d93653bdaecf323c9f62ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e3168", 0x80, 0x51, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 2018/05/08 19:13:11 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f000098cfe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x9d}, 0x8) 2018/05/08 19:13:11 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000d80)={{0x3, 0x0, 0x0, 0x0, "12bced685d1a5afe5df7e8d0a3a5bee0b731edd11c591eb7cb373aa219ee8d56f83bf316d4212e5c69e1f0fb"}}) 2018/05/08 19:13:11 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.sched_load_balance\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0x3) 2018/05/08 19:13:11 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080), &(0x7f00000000c0)=0x8) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/05/08 19:13:11 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x5, r1, 0x800000, &(0x7f0000000040)={&(0x7f00000033c0)=""/4096, 0x1000}) 2018/05/08 19:13:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000adcff8)=[{0x6, 0x0, 0x0, 0x9f}]}, 0x10) sendto$inet(r0, &(0x7f0000e9bf14), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000618ec1)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0d61c0d32e11b38e9dd18c58f6bd779650fc30d93653bdaecf323c9f62ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e3168", 0x80, 0x51, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 2018/05/08 19:13:11 executing program 7: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cpuset\x00', 0x0, &(0x7f0000000280)) 2018/05/08 19:13:11 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = gettid() syz_open_dev$evdev(&(0x7f0000012fee)='/dev/input/event#\x00', 0x0, 0x0) tkill(r1, 0x7) 2018/05/08 19:13:11 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000d80)={{0x3, 0x0, 0x0, 0x0, "12bced685d1a5afe5df7e8d0a3a5bee0b731edd11c591eb7cb373aa219ee8d56f83bf316d4212e5c69e1f0fb"}}) 2018/05/08 19:13:11 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = gettid() syz_open_dev$evdev(&(0x7f0000012fee)='/dev/input/event#\x00', 0x0, 0x0) tkill(r1, 0x7) 2018/05/08 19:13:11 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x5, r1, 0x800000, &(0x7f0000000040)={&(0x7f00000033c0)=""/4096, 0x1000}) 2018/05/08 19:13:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000016c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002780)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) [ 98.301719] sctp: [Deprecated]: syz-executor1 (pid 6794) Use of struct sctp_assoc_value in delayed_ack socket option. [ 98.301719] Use struct sctp_sack_info instead 2018/05/08 19:13:11 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x5, r1, 0x800000, &(0x7f0000000040)={&(0x7f00000033c0)=""/4096, 0x1000}) 2018/05/08 19:13:11 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f000098cfe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x9d}, 0x8) 2018/05/08 19:13:11 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000d80)={{0x3, 0x0, 0x0, 0x0, "12bced685d1a5afe5df7e8d0a3a5bee0b731edd11c591eb7cb373aa219ee8d56f83bf316d4212e5c69e1f0fb"}}) 2018/05/08 19:13:11 executing program 5: clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a2effc), &(0x7f00007c4000)) r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff}) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x2, r0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) wait4(r2, 0x0, 0x80000000, &(0x7f0000000080)) 2018/05/08 19:13:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000016c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002780)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/05/08 19:13:11 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000d80)={{0x3, 0x0, 0x0, 0x0, "12bced685d1a5afe5df7e8d0a3a5bee0b731edd11c591eb7cb373aa219ee8d56f83bf316d4212e5c69e1f0fb"}}) 2018/05/08 19:13:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000016c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002780)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) [ 98.774466] sctp: [Deprecated]: syz-executor1 (pid 6824) Use of struct sctp_assoc_value in delayed_ack socket option. [ 98.774466] Use struct sctp_sack_info instead 2018/05/08 19:13:12 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = gettid() syz_open_dev$evdev(&(0x7f0000012fee)='/dev/input/event#\x00', 0x0, 0x0) tkill(r1, 0x7) 2018/05/08 19:13:12 executing program 7: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cpuset\x00', 0x0, &(0x7f0000000280)) 2018/05/08 19:13:12 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = gettid() syz_open_dev$evdev(&(0x7f0000012fee)='/dev/input/event#\x00', 0x0, 0x0) tkill(r1, 0x7) 2018/05/08 19:13:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000016c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002780)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/05/08 19:13:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f000098cfe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x9d}, 0x8) 2018/05/08 19:13:12 executing program 5: clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a2effc), &(0x7f00007c4000)) r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff}) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x2, r0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) wait4(r2, 0x0, 0x80000000, &(0x7f0000000080)) 2018/05/08 19:13:12 executing program 6: clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a2effc), &(0x7f00007c4000)) r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff}) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x2, r0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) wait4(r2, 0x0, 0x80000000, &(0x7f0000000080)) 2018/05/08 19:13:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000016c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002780)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/05/08 19:13:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000016c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002780)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/05/08 19:13:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000016c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002780)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) [ 99.392195] sctp: [Deprecated]: syz-executor1 (pid 6863) Use of struct sctp_assoc_value in delayed_ack socket option. [ 99.392195] Use struct sctp_sack_info instead 2018/05/08 19:13:12 executing program 6: clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a2effc), &(0x7f00007c4000)) r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff}) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x2, r0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) wait4(r2, 0x0, 0x80000000, &(0x7f0000000080)) 2018/05/08 19:13:12 executing program 5: clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a2effc), &(0x7f00007c4000)) r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff}) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x2, r0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) wait4(r2, 0x0, 0x80000000, &(0x7f0000000080)) 2018/05/08 19:13:12 executing program 4: clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a2effc), &(0x7f00007c4000)) r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff}) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x2, r0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) wait4(r2, 0x0, 0x80000000, &(0x7f0000000080)) 2018/05/08 19:13:12 executing program 3: ioperm(0x0, 0x1000, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x4000) 2018/05/08 19:13:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00004aaffc)=0x1ffa, 0x4) 2018/05/08 19:13:12 executing program 3: ioperm(0x0, 0x1000, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x4000) 2018/05/08 19:13:13 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = gettid() syz_open_dev$evdev(&(0x7f0000012fee)='/dev/input/event#\x00', 0x0, 0x0) tkill(r1, 0x7) 2018/05/08 19:13:13 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x2, 0x4) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x2a, &(0x7f000089a000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/05/08 19:13:13 executing program 6: clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a2effc), &(0x7f00007c4000)) r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff}) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x2, r0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) wait4(r2, 0x0, 0x80000000, &(0x7f0000000080)) 2018/05/08 19:13:13 executing program 5: clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a2effc), &(0x7f00007c4000)) r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff}) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x2, r0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) wait4(r2, 0x0, 0x80000000, &(0x7f0000000080)) 2018/05/08 19:13:13 executing program 4: clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a2effc), &(0x7f00007c4000)) r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff}) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x2, r0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) wait4(r2, 0x0, 0x80000000, &(0x7f0000000080)) 2018/05/08 19:13:13 executing program 3: ioperm(0x0, 0x1000, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x4000) 2018/05/08 19:13:13 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = gettid() syz_open_dev$evdev(&(0x7f0000012fee)='/dev/input/event#\x00', 0x0, 0x0) tkill(r1, 0x7) 2018/05/08 19:13:13 executing program 7: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cpuset\x00', 0x0, &(0x7f0000000280)) 2018/05/08 19:13:13 executing program 3: ioperm(0x0, 0x1000, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x4000) 2018/05/08 19:13:13 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x2, 0x4) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x2a, &(0x7f000089a000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/05/08 19:13:13 executing program 4: clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a2effc), &(0x7f00007c4000)) r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff}) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x2, r0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) wait4(r2, 0x0, 0x80000000, &(0x7f0000000080)) 2018/05/08 19:13:13 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000380)=""/4096) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)) close(r0) 2018/05/08 19:13:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) unshare(0x400) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r0, 0x0) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x8) 2018/05/08 19:13:13 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x12013, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setname(0xf, &(0x7f0000000140)='*:md5sumeth1ppp1bdevcgroup\x00') 2018/05/08 19:13:13 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x2, 0x4) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x2a, &(0x7f000089a000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/05/08 19:13:13 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x12013, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setname(0xf, &(0x7f0000000140)='*:md5sumeth1ppp1bdevcgroup\x00') 2018/05/08 19:13:14 executing program 0: clone(0x0, &(0x7f0000000100), &(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) clone(0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000001180)) getpriority(0x1, 0x0) 2018/05/08 19:13:14 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000380)=""/4096) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)) close(r0) 2018/05/08 19:13:14 executing program 7: unshare(0x8000400) r0 = socket(0x15, 0x80005, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x471b) 2018/05/08 19:13:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) unshare(0x400) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r0, 0x0) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x8) 2018/05/08 19:13:14 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x12013, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setname(0xf, &(0x7f0000000140)='*:md5sumeth1ppp1bdevcgroup\x00') 2018/05/08 19:13:14 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x2, 0x4) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x2a, &(0x7f000089a000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/05/08 19:13:14 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000380)=""/4096) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)) close(r0) 2018/05/08 19:13:14 executing program 4: unshare(0x40600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000400)=""/213, &(0x7f0000000040)=0xd5) 2018/05/08 19:13:14 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x12013, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setname(0xf, &(0x7f0000000140)='*:md5sumeth1ppp1bdevcgroup\x00') 2018/05/08 19:13:14 executing program 4: unshare(0x40600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000400)=""/213, &(0x7f0000000040)=0xd5) 2018/05/08 19:13:14 executing program 7: unshare(0x8000400) r0 = socket(0x15, 0x80005, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x471b) 2018/05/08 19:13:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) unshare(0x400) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r0, 0x0) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x8) 2018/05/08 19:13:14 executing program 1: unshare(0x8000400) r0 = socket(0x15, 0x80005, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x471b) 2018/05/08 19:13:14 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000006ff6)='/dev/dsp#\x00', 0x1, 0x2) write$fuse(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x1, @fuse_notify_delete_out}, 0x28) writev(r0, &(0x7f0000000000), 0x1b1) 2018/05/08 19:13:14 executing program 7: unshare(0x8000400) r0 = socket(0x15, 0x80005, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x471b) 2018/05/08 19:13:14 executing program 4: unshare(0x40600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000400)=""/213, &(0x7f0000000040)=0xd5) 2018/05/08 19:13:15 executing program 0: clone(0x0, &(0x7f0000000100), &(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) clone(0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000001180)) getpriority(0x1, 0x0) 2018/05/08 19:13:15 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000006ff6)='/dev/dsp#\x00', 0x1, 0x2) write$fuse(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x1, @fuse_notify_delete_out}, 0x28) writev(r0, &(0x7f0000000000), 0x1b1) 2018/05/08 19:13:15 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000380)=""/4096) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)) close(r0) 2018/05/08 19:13:15 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000380)=""/4096) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)) close(r0) 2018/05/08 19:13:15 executing program 1: unshare(0x8000400) r0 = socket(0x15, 0x80005, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x471b) 2018/05/08 19:13:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) unshare(0x400) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r0, 0x0) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x8) 2018/05/08 19:13:15 executing program 7: unshare(0x8000400) r0 = socket(0x15, 0x80005, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x471b) 2018/05/08 19:13:15 executing program 4: unshare(0x40600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000400)=""/213, &(0x7f0000000040)=0xd5) 2018/05/08 19:13:15 executing program 4: clone(0x0, &(0x7f0000000100), &(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) clone(0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000001180)) getpriority(0x1, 0x0) 2018/05/08 19:13:15 executing program 1: unshare(0x8000400) r0 = socket(0x15, 0x80005, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x471b) 2018/05/08 19:13:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000000380)=@raw, &(0x7f0000ac3000)="47505d04", 0xb5, 0x67, &(0x7f0000000080)=""/103}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x2f}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0xfecd, &(0x7f0000011f3d)=""/195}, 0x48) 2018/05/08 19:13:15 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x240002, 0x0) sendto$ax25(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) 2018/05/08 19:13:15 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000006ff6)='/dev/dsp#\x00', 0x1, 0x2) write$fuse(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x1, @fuse_notify_delete_out}, 0x28) writev(r0, &(0x7f0000000000), 0x1b1) 2018/05/08 19:13:15 executing program 1: r0 = memfd_create(&(0x7f0000000140)='\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020006"], 0x13) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/08 19:13:15 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x240002, 0x0) sendto$ax25(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) 2018/05/08 19:13:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000000380)=@raw, &(0x7f0000ac3000)="47505d04", 0xb5, 0x67, &(0x7f0000000080)=""/103}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x2f}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0xfecd, &(0x7f0000011f3d)=""/195}, 0x48) 2018/05/08 19:13:16 executing program 0: clone(0x0, &(0x7f0000000100), &(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) clone(0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000001180)) getpriority(0x1, 0x0) 2018/05/08 19:13:16 executing program 4: clone(0x0, &(0x7f0000000100), &(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) clone(0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000001180)) getpriority(0x1, 0x0) 2018/05/08 19:13:16 executing program 1: r0 = memfd_create(&(0x7f0000000140)='\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020006"], 0x13) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/08 19:13:16 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x240002, 0x0) sendto$ax25(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) 2018/05/08 19:13:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000000380)=@raw, &(0x7f0000ac3000)="47505d04", 0xb5, 0x67, &(0x7f0000000080)=""/103}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x2f}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0xfecd, &(0x7f0000011f3d)=""/195}, 0x48) 2018/05/08 19:13:16 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000006ff6)='/dev/dsp#\x00', 0x1, 0x2) write$fuse(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x1, @fuse_notify_delete_out}, 0x28) writev(r0, &(0x7f0000000000), 0x1b1) 2018/05/08 19:13:16 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000380)=""/4096) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)) close(r0) 2018/05/08 19:13:16 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000380)=""/4096) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)) close(r0) 2018/05/08 19:13:16 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x240002, 0x0) sendto$ax25(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) 2018/05/08 19:13:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000000380)=@raw, &(0x7f0000ac3000)="47505d04", 0xb5, 0x67, &(0x7f0000000080)=""/103}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x2f}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0xfecd, &(0x7f0000011f3d)=""/195}, 0x48) 2018/05/08 19:13:16 executing program 1: r0 = memfd_create(&(0x7f0000000140)='\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020006"], 0x13) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/08 19:13:16 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020006"], 0x13) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/08 19:13:17 executing program 0: clone(0x0, &(0x7f0000000100), &(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) clone(0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000001180)) getpriority(0x1, 0x0) 2018/05/08 19:13:17 executing program 4: clone(0x0, &(0x7f0000000100), &(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) clone(0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000001180)) getpriority(0x1, 0x0) 2018/05/08 19:13:17 executing program 7: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000000c0)="24000000210025f0071c0165fffffc2102000016ffec000182a9000c08000a3a0496529d", 0x24) 2018/05/08 19:13:17 executing program 5: unshare(0x8000400) r0 = socket(0x1e, 0x1, 0x0) shutdown(r0, 0x0) 2018/05/08 19:13:17 executing program 1: r0 = memfd_create(&(0x7f0000000140)='\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020006"], 0x13) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/08 19:13:17 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020006"], 0x13) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/08 19:13:17 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg(r1, &(0x7f0000007300)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000003a80)="7855fb3fb20eab35ac627681192dc47e2c3bbedfdf68abbd4b6dec03cfa481caf84b549b0882e52bf87cfd452511d45953", 0x31}], 0x1, &(0x7f0000004a80)}}], 0x1, 0x8000) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000001700)=""/4096, 0x1000}], 0x1, &(0x7f0000000340)=""/80, 0x50}, 0x0) 2018/05/08 19:13:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xbb, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) close(r0) getpeername$packet(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000001c0)=0x14) 2018/05/08 19:13:17 executing program 7: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000000c0)="24000000210025f0071c0165fffffc2102000016ffec000182a9000c08000a3a0496529d", 0x24) [ 104.336893] alg: No test for gcm(aes-generic) (gcm_base(ctr(aes-generic),ghash-generic)) 2018/05/08 19:13:17 executing program 5: unshare(0x8000400) r0 = socket(0x1e, 0x1, 0x0) shutdown(r0, 0x0) 2018/05/08 19:13:17 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020006"], 0x13) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 105.091879] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/08 19:13:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xbb, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) close(r0) getpeername$packet(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000001c0)=0x14) 2018/05/08 19:13:18 executing program 0: keyctl$get_security(0x11, 0x0, &(0x7f00000003c0)=""/242, 0xf2) 2018/05/08 19:13:18 executing program 5: unshare(0x8000400) r0 = socket(0x1e, 0x1, 0x0) shutdown(r0, 0x0) 2018/05/08 19:13:18 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg(r1, &(0x7f0000007300)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000003a80)="7855fb3fb20eab35ac627681192dc47e2c3bbedfdf68abbd4b6dec03cfa481caf84b549b0882e52bf87cfd452511d45953", 0x31}], 0x1, &(0x7f0000004a80)}}], 0x1, 0x8000) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000001700)=""/4096, 0x1000}], 0x1, &(0x7f0000000340)=""/80, 0x50}, 0x0) 2018/05/08 19:13:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg(r1, &(0x7f0000007300)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000003a80)="7855fb3fb20eab35ac627681192dc47e2c3bbedfdf68abbd4b6dec03cfa481caf84b549b0882e52bf87cfd452511d45953", 0x31}], 0x1, &(0x7f0000004a80)}}], 0x1, 0x8000) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000001700)=""/4096, 0x1000}], 0x1, &(0x7f0000000340)=""/80, 0x50}, 0x0) 2018/05/08 19:13:18 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x0, @loopback=0x7f000001}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x0, @loopback=0x7f000001}], 0x10) 2018/05/08 19:13:18 executing program 7: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000000c0)="24000000210025f0071c0165fffffc2102000016ffec000182a9000c08000a3a0496529d", 0x24) 2018/05/08 19:13:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xbb, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) close(r0) getpeername$packet(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000001c0)=0x14) [ 105.329932] ================================================================== [ 105.337371] BUG: KMSAN: uninit-value in __sctp_v6_cmp_addr+0x49a/0x850 [ 105.344048] CPU: 1 PID: 7187 Comm: syz-executor4 Not tainted 4.17.0-rc3+ #88 [ 105.351234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.360580] Call Trace: [ 105.363181] dump_stack+0x185/0x1d0 [ 105.366816] ? __sctp_v6_cmp_addr+0x49a/0x850 [ 105.371314] kmsan_report+0x142/0x240 [ 105.375124] __msan_warning_32+0x6c/0xb0 [ 105.379189] __sctp_v6_cmp_addr+0x49a/0x850 [ 105.383517] sctp_inet6_cmp_addr+0x3dc/0x400 [ 105.387928] ? sctp_inet6_af_supported+0xf0/0xf0 [ 105.392692] sctp_bind_addr_match+0x18b/0x2f0 [ 105.397194] sctp_do_bind+0x97d/0xdf0 [ 105.401000] sctp_setsockopt_bindx+0x6c4/0x8f0 [ 105.405584] sctp_setsockopt+0x1c50/0x11600 [ 105.409908] ? kmsan_set_origin_inline+0x6b/0x120 [ 105.414743] ? __msan_poison_alloca+0x15c/0x1d0 [ 105.419404] ? __fdget+0x4e/0x60 [ 105.422763] ? __fget_light+0x56/0x710 [ 105.426645] ? sctp_shutdown+0x270/0x270 [ 105.430699] sock_common_setsockopt+0x136/0x170 [ 105.435377] ? sock_common_recvmsg+0x270/0x270 [ 105.439959] __sys_setsockopt+0x4af/0x560 [ 105.444107] __x64_sys_setsockopt+0x15c/0x1c0 [ 105.448587] do_syscall_64+0x154/0x220 [ 105.452470] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.457642] RIP: 0033:0x455979 [ 105.460821] RSP: 002b:00007f54d1902c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 105.468526] RAX: ffffffffffffffda RBX: 00007f54d19036d4 RCX: 0000000000455979 [ 105.475791] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000013 [ 105.483127] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 105.490394] R10: 0000000020000180 R11: 0000000000000246 R12: 00000000ffffffff [ 105.497661] R13: 00000000000005ec R14: 00000000006fcec0 R15: 0000000000000000 [ 105.504928] [ 105.506541] Uninit was created at: [ 105.510170] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 105.515259] kmsan_kmalloc+0x94/0x100 [ 105.519048] __kmalloc_node+0xe25/0x11f0 [ 105.523106] kvmalloc_node+0x1a1/0x2e0 [ 105.526982] xt_replace_table+0x35e/0xbd0 [ 105.531121] __do_replace+0x2bc/0x1020 [ 105.535005] do_ip6t_set_ctl+0x739/0x930 [ 105.539057] nf_setsockopt+0x476/0x4d0 [ 105.542930] ipv6_setsockopt+0x1e2/0x340 [ 105.546994] tcp_setsockopt+0x1bb/0x1f0 [ 105.550957] sock_common_setsockopt+0x136/0x170 [ 105.555610] __sys_setsockopt+0x4af/0x560 [ 105.559739] __x64_sys_setsockopt+0x15c/0x1c0 [ 105.564215] do_syscall_64+0x154/0x220 [ 105.568087] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.573250] ================================================================== [ 105.580587] Disabling lock debugging due to kernel taint [ 105.586028] Kernel panic - not syncing: panic_on_warn set ... [ 105.586028] [ 105.593385] CPU: 1 PID: 7187 Comm: syz-executor4 Tainted: G B 4.17.0-rc3+ #88 [ 105.601943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.611375] Call Trace: [ 105.613963] dump_stack+0x185/0x1d0 [ 105.617579] panic+0x39d/0x940 [ 105.620784] ? __sctp_v6_cmp_addr+0x49a/0x850 [ 105.625280] kmsan_report+0x238/0x240 [ 105.629071] __msan_warning_32+0x6c/0xb0 [ 105.633117] __sctp_v6_cmp_addr+0x49a/0x850 [ 105.637421] sctp_inet6_cmp_addr+0x3dc/0x400 [ 105.641835] ? sctp_inet6_af_supported+0xf0/0xf0 [ 105.646580] sctp_bind_addr_match+0x18b/0x2f0 [ 105.651071] sctp_do_bind+0x97d/0xdf0 [ 105.654864] sctp_setsockopt_bindx+0x6c4/0x8f0 [ 105.659439] sctp_setsockopt+0x1c50/0x11600 [ 105.663753] ? kmsan_set_origin_inline+0x6b/0x120 [ 105.668588] ? __msan_poison_alloca+0x15c/0x1d0 [ 105.673253] ? __fdget+0x4e/0x60 [ 105.676620] ? __fget_light+0x56/0x710 [ 105.680508] ? sctp_shutdown+0x270/0x270 [ 105.684559] sock_common_setsockopt+0x136/0x170 [ 105.689211] ? sock_common_recvmsg+0x270/0x270 [ 105.693770] __sys_setsockopt+0x4af/0x560 [ 105.697914] __x64_sys_setsockopt+0x15c/0x1c0 [ 105.702415] do_syscall_64+0x154/0x220 [ 105.706295] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.711475] RIP: 0033:0x455979 [ 105.714650] RSP: 002b:00007f54d1902c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 105.722343] RAX: ffffffffffffffda RBX: 00007f54d19036d4 RCX: 0000000000455979 [ 105.729609] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000013 [ 105.736871] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 105.744141] R10: 0000000020000180 R11: 0000000000000246 R12: 00000000ffffffff [ 105.751399] R13: 00000000000005ec R14: 00000000006fcec0 R15: 0000000000000000 [ 105.759164] Dumping ftrace buffer: [ 105.762696] (ftrace buffer empty) [ 105.766379] Kernel Offset: disabled [ 105.769980] Rebooting in 86400 seconds..