INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.29' (ECDSA) to the list of known hosts. 2018/04/29 18:54:52 fuzzer started 2018/04/29 18:54:53 dialing manager at 10.128.0.26:34153 syzkaller login: [ 50.542291] can: request_module (can-proto-0) failed. [ 50.553235] can: request_module (can-proto-0) failed. 2018/04/29 18:55:00 kcov=true, comps=false 2018/04/29 18:55:03 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendto$inet6(r0, &(0x7f0000000040), 0xff5a, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x200000000002, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x19) 2018/04/29 18:55:03 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002f00)={0x8, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) socketpair$ax25(0x3, 0x3, 0x8, &(0x7f0000000000)) 2018/04/29 18:55:03 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000d19fee)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = inotify_init() r2 = dup3(r1, r0, 0x80000) fcntl$getown(r1, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getown(r2, 0x9) stat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) sendmsg$netlink(r2, &(0x7f0000001d00)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000380)={0x10, 0x2a, 0x0, 0x0, 0x25dfdbff}, 0x10}], 0x1, &(0x7f0000001c40)=[@cred={0x20, 0x1, 0x2, 0x0, r3}, @rights={0x10, 0x1, 0x1}], 0x30, 0x4008081}, 0x0) fcntl$notify(r1, 0x0, 0x282) 2018/04/29 18:55:03 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x82, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b80)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 2018/04/29 18:55:03 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/raw6\x00') 2018/04/29 18:55:03 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:03 executing program 2: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000000040)="010000000000060000071a80000001cc", 0x10) 2018/04/29 18:55:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') bind$alg(r0, &(0x7f0000466000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000000), 0x80000000) [ 55.393579] IPVS: ftp: loaded support on port[0] = 21 [ 55.554692] IPVS: ftp: loaded support on port[0] = 21 [ 55.605985] IPVS: ftp: loaded support on port[0] = 21 [ 55.677409] IPVS: ftp: loaded support on port[0] = 21 [ 55.776281] IPVS: ftp: loaded support on port[0] = 21 [ 55.879070] IPVS: ftp: loaded support on port[0] = 21 [ 56.036852] IPVS: ftp: loaded support on port[0] = 21 [ 56.208505] IPVS: ftp: loaded support on port[0] = 21 [ 57.628380] ip (4722) used greatest stack depth: 54264 bytes left [ 58.007717] ip (4752) used greatest stack depth: 54184 bytes left [ 58.490391] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.496895] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.533213] device bridge_slave_0 entered promiscuous mode [ 58.665118] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.671631] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.704749] device bridge_slave_0 entered promiscuous mode [ 58.744282] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.750818] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.781337] device bridge_slave_1 entered promiscuous mode [ 58.894432] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.900945] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.939189] device bridge_slave_1 entered promiscuous mode [ 58.966987] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.973532] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.999357] device bridge_slave_0 entered promiscuous mode [ 59.050081] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.111588] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.118130] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.168232] device bridge_slave_0 entered promiscuous mode [ 59.189090] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.225219] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.231767] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.264885] device bridge_slave_1 entered promiscuous mode [ 59.310633] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.329746] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.336281] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.373257] device bridge_slave_0 entered promiscuous mode [ 59.393653] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.403179] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.409652] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.446811] device bridge_slave_1 entered promiscuous mode [ 59.476559] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.483127] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.504467] device bridge_slave_0 entered promiscuous mode [ 59.518327] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.535296] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.541776] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.569289] device bridge_slave_0 entered promiscuous mode [ 59.605273] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.611773] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.638736] device bridge_slave_1 entered promiscuous mode [ 59.669950] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.678829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.713133] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.719635] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.762472] device bridge_slave_1 entered promiscuous mode [ 59.808814] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.815342] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.835515] device bridge_slave_1 entered promiscuous mode [ 59.889227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.903389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.912319] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.994390] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.000903] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.049322] device bridge_slave_0 entered promiscuous mode [ 60.080886] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.093902] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.130993] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.139829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.174610] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.239340] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.245858] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.285283] device bridge_slave_1 entered promiscuous mode [ 60.307484] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.392701] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.405195] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.414072] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.425431] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.513371] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.653922] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.661010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.682138] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.693631] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.773338] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.809906] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.819968] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.828445] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.835359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.884453] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.891480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.930214] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.937196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.960803] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.014724] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.021781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.075528] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.092458] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.099905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.120463] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.200420] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.245666] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.253255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.315185] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.322309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.337823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.344941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.431821] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.439908] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.449578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.528322] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.569141] team0: Port device team_slave_0 added [ 61.596923] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.608508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.672105] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.681091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.711660] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.721837] team0: Port device team_slave_0 added [ 61.740305] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.763634] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.792577] team0: Port device team_slave_1 added [ 61.857195] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.891378] team0: Port device team_slave_0 added [ 61.937503] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.948741] team0: Port device team_slave_1 added [ 61.998221] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.017781] team0: Port device team_slave_0 added [ 62.039711] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.055270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.078869] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.105109] team0: Port device team_slave_1 added [ 62.123582] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.134678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.156443] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.204493] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.214578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.233575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.258909] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.271820] team0: Port device team_slave_0 added [ 62.278984] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.296900] team0: Port device team_slave_0 added [ 62.321174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.329227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.354092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.366485] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.375642] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.384777] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.408273] team0: Port device team_slave_1 added [ 62.429265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.451799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.479118] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.497596] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.508621] team0: Port device team_slave_0 added [ 62.518837] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.543064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.554130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.565073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.575848] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.592995] team0: Port device team_slave_1 added [ 62.606875] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.614548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.631106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.665065] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.684746] team0: Port device team_slave_1 added [ 62.703980] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.711694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.728449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.744294] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.755457] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.771961] team0: Port device team_slave_1 added [ 62.795317] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.802770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.816378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.839992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.865646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.891475] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.904140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.919472] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.949215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.956729] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.964706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.989455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.006233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.022357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.044365] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.054133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.063931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.091779] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.104278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.113451] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.123567] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.131255] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.138551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.171475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.194072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.221017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.247848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.267956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.283014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.290997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.298808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.306852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.318110] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.338560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.348153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.359925] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.368617] team0: Port device team_slave_0 added [ 63.377882] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.393372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.406343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.438337] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.446233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.471372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.504620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.517965] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.530735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.573986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.591790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.616626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.650406] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.659887] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.672159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.686231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.704870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.733603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.750804] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.765736] team0: Port device team_slave_1 added [ 63.790515] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.797959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.811165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.996413] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.003901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.017181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.060584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.075750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.101923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.276170] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.283521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.299680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.432810] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.440413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.455344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.659246] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.666703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.691014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.772637] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.779140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.786079] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.792525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.845106] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.851797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.864397] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.870881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.877728] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.884170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.897518] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.921696] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.928180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.935676] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.942147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.964729] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.187357] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.193851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.200690] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.207147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.215476] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.235734] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.242214] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.249109] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.255560] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.287149] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.466076] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.472585] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.479414] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.485855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.524515] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.552233] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.558738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.565589] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.572129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.606143] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.911588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.930379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.967410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.989699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.015403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.027267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.307146] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.313620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.320489] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.326916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.404221] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.935813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.121366] ip (5845) used greatest stack depth: 53992 bytes left [ 74.670330] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.708825] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.025148] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.050343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.111957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.297606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.363460] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.482118] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.582835] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.795353] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.843629] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.945799] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.157183] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.216214] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.307829] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.314232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.331875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.414990] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.460724] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.467804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.489926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.655278] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.663209] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.669412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.698714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.721407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.740846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.775599] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.781857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.795570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.031122] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.037949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.050736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.143472] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.149823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.163963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.201271] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.306417] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.422147] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.464746] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.564656] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.616910] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.826763] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.006966] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.046108] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.055844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.067097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.877533] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/29 18:55:32 executing program 0: r0 = socket(0xa, 0x2, 0x0) socket$packet(0x11, 0x400000002, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000000080)=""/137, &(0x7f0000000140)=0x89) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @random="0db44ddad888"}, 0x8, {0x2}, 'syzkaller0\x00'}) 2018/04/29 18:55:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f000066b000)=""/1, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) r2 = gettid() dup3(r0, r1, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 2018/04/29 18:55:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x7fffffff}) 2018/04/29 18:55:32 executing program 6: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='cifs.spnego\x00', 0x0) 2018/04/29 18:55:32 executing program 3: setrlimit(0x7, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) 2018/04/29 18:55:32 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000d19fee)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = inotify_init() r2 = dup3(r1, r0, 0x80000) fcntl$getown(r1, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getown(r2, 0x9) stat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) sendmsg$netlink(r2, &(0x7f0000001d00)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000380)={0x10, 0x2a, 0x0, 0x0, 0x25dfdbff}, 0x10}], 0x1, &(0x7f0000001c40)=[@cred={0x20, 0x1, 0x2, 0x0, r3}, @rights={0x10, 0x1, 0x1}], 0x30, 0x4008081}, 0x0) fcntl$notify(r1, 0x0, 0x282) 2018/04/29 18:55:32 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, &(0x7f0000664fc0)) lseek(r0, 0x0, 0x0) 2018/04/29 18:55:32 executing program 7: connect$pppoe(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'bcsh0\x00'}}, 0x1e) 2018/04/29 18:55:32 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) 2018/04/29 18:55:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001780)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000000)=""/241) 2018/04/29 18:55:32 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x2) getpeername$netrom(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) 2018/04/29 18:55:32 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='[*[\x00', 0x0) write(r0, &(0x7f0000000000)="f7ea42337e", 0x5) sendfile(r0, r0, &(0x7f0000001000), 0xffff) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {r1, r2/1000+30000}}, 0x100) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x10, r0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x0, 0x7530}}, 0x0) 2018/04/29 18:55:32 executing program 2: socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) socketpair(0x14, 0x0, 0x0, &(0x7f0000000080)) connect$inet(0xffffffffffffffff, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) 2018/04/29 18:55:33 executing program 7: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x440002, 0x0) socket$inet(0x2, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x78, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="21252a2626766d6e657430236d64357375c24d99e426c744526818e46d776c61b8f1f93cdf907c19fc592b4f093502501732e04504c9af8dda6808b022864a4966a3d03f2faa1819109374bfdf80b83f4627c706be225439e602000eeb8f6d3f0bf6e9") 2018/04/29 18:55:33 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x52000, 0x0) 2018/04/29 18:55:33 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 2018/04/29 18:55:33 executing program 0: r0 = socket(0xa, 0x2, 0x0) socket$packet(0x11, 0x400000002, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000000080)=""/137, &(0x7f0000000140)=0x89) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:33 executing program 1: unshare(0x60000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={"6c6f0000fb552255ffffd9f5e2580a08"}) 2018/04/29 18:55:33 executing program 6: r0 = add_key$user(&(0x7f0000004940)='user\x00', &(0x7f0000004980)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000049c0)="8d", 0x1, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) keyctl$invalidate(0x15, r0) 2018/04/29 18:55:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f000066b000)=""/1, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) r2 = gettid() dup3(r0, r1, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 2018/04/29 18:55:33 executing program 3: mkdir(&(0x7f0000b17ff8)='./file0\x00', 0x0) r0 = open(&(0x7f00001d4ff8)='./file0\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x800000000402, 0xffffffffffffffff) 2018/04/29 18:55:33 executing program 6: syz_emit_ethernet(0x2a, &(0x7f0000aeb000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14}, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, @icmp=@address_reply={0x12}}}}}, &(0x7f0000000000)) 2018/04/29 18:55:33 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') [ 84.372221] IPVS: ftp: loaded support on port[0] = 21 2018/04/29 18:55:33 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/04/29 18:55:33 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) connect$inet(r0, &(0x7f00000dcff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x0) 2018/04/29 18:55:33 executing program 6: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) [ 84.732393] device lo entered promiscuous mode 2018/04/29 18:55:34 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)={0x0, r1}) syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) syslog(0xa, &(0x7f00000000c0)=""/69, 0x45) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) 2018/04/29 18:55:34 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 2018/04/29 18:55:34 executing program 7: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 2018/04/29 18:55:34 executing program 6: umount2(&(0x7f0000000000)='../file0\x00', 0x0) 2018/04/29 18:55:34 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) connect$inet(r0, &(0x7f00000dcff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x0) 2018/04/29 18:55:34 executing program 1: unshare(0x60000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={"6c6f0000fb552255ffffd9f5e2580a08"}) 2018/04/29 18:55:34 executing program 5: getpid() mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000024000/0xc00000)=nil, 0xc00000, 0x8003, &(0x7f0000a1a000)=0x40000000003, 0x7, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000801feb)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) sched_setattr(0x0, &(0x7f00000000c0)={0x30, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x101}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'veth0_to_bond\x00'}) 2018/04/29 18:55:34 executing program 0: r0 = socket(0xa, 0x2, 0x0) socket$packet(0x11, 0x400000002, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000000080)=""/137, &(0x7f0000000140)=0x89) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:34 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uinput\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) close(r0) 2018/04/29 18:55:34 executing program 6: r0 = memfd_create(&(0x7f0000000040)="6367726f75706c6f7b29ed6b657972696e672c29657468302b00", 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 2018/04/29 18:55:34 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 2018/04/29 18:55:34 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/7, 0xfffffffffffffdae) 2018/04/29 18:55:34 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0x90, [0x20000440, 0x0, 0x0, 0x200006b8, 0x200006e8], 0x0, &(0x7f0000000080), &(0x7f0000000440)=[{}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x108) 2018/04/29 18:55:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) [ 85.506854] kernel msg: ebtables bug: please report to author: Valid hook without chain 2018/04/29 18:55:34 executing program 7: clone(0x571bcbb58af98941, &(0x7f0000001000), &(0x7f0000000000), &(0x7f0000001000), &(0x7f0000db7000)) 2018/04/29 18:55:34 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x3, &(0x7f0000000040)=""/4096, 0xb743478b0b68caf0) 2018/04/29 18:55:34 executing program 4: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000010, 0x1000000000803, 0x0) sendmsg$nl_route(r0, &(0x7f00009cc000)={&(0x7f00002e5000)={0x10}, 0xc, &(0x7f0000b2b000)={&(0x7f0000efb000)=ANY=[@ANYBLOB="300000001c00010300000000000000000a000000", @ANYBLOB="00000b0214000100fe80000000000000000000ff"], 0x2}, 0x1}, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000be4ff0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) [ 86.011525] device lo entered promiscuous mode [ 86.120148] IPVS: ftp: loaded support on port[0] = 21 2018/04/29 18:55:35 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="2400000058001f0014b21008000904000200071008000100ffff00030800020001000000", 0x24) 2018/04/29 18:55:35 executing program 6: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) 2018/04/29 18:55:35 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:35 executing program 7: perf_event_open(&(0x7f0000740000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000725000)="6e732f697063005a55c9bac4b669d9bad30ee7b7471b5c5f139e478c5a80a81227fd426ec4d35d9ee37ec1d755e7d669cbb166b81f3ae5c0c48610224cbf53738cb8f9180ae4b6a40a39ca5f8c5a080d5278362b557b12c04d1d3f24f413fb41c6e32889dd") syz_open_procfs(0x0, &(0x7f00009b7ff9)='ns/ipc\x00') 2018/04/29 18:55:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) io_setup(0x8, &(0x7f0000000100)) 2018/04/29 18:55:35 executing program 2: r0 = timerfd_create(0x5, 0x80000) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000040)=""/7, 0x7) 2018/04/29 18:55:35 executing program 1: unshare(0x60000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={"6c6f0000fb552255ffffd9f5e2580a08"}) 2018/04/29 18:55:35 executing program 0: r0 = socket(0xa, 0x2, 0x0) socket$packet(0x11, 0x400000002, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000000080)=""/137, &(0x7f0000000140)=0x89) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:35 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000100)=0x0) io_destroy(r0) 2018/04/29 18:55:35 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10002, 0x0) 2018/04/29 18:55:35 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) fallocate(r1, 0x3, 0x0, 0xffff) 2018/04/29 18:55:35 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) sendto$inet(r0, &(0x7f0000588fff), 0xfffffffffffffea7, 0x20020006, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000c82fec)={0x0, 0x20000000012c6, 0xffffffffffffa66d}, 0x14) shutdown(r0, 0x1) 2018/04/29 18:55:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) io_setup(0x8, &(0x7f0000000100)) 2018/04/29 18:55:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) bind$inet(r0, &(0x7f0000516ff0)={0x2, 0x4e21, @multicast2=0xe0000002}, 0x10) 2018/04/29 18:55:35 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) 2018/04/29 18:55:35 executing program 6: syz_emit_ethernet(0xfcbc, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv6={0x86dd, {0x0, 0x6, "8f7a9e", 0x8, 0x88, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f00000001c0)) 2018/04/29 18:55:35 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000002c0)) 2018/04/29 18:55:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000001d40)={"6c6f0000ff7f0000000000001860f404", 0xfff}) 2018/04/29 18:55:36 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000001, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:36 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000001600)={&(0x7f0000000240)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f00000002c0)}, 0x0) 2018/04/29 18:55:36 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/29 18:55:36 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0xffffffffffffff40, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000500)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2}, 0x10) connect$unix(r0, &(0x7f00000001c0)=@abs, 0x6e) 2018/04/29 18:55:36 executing program 0: r0 = socket(0xa, 0x2, 0x0) socket$packet(0x11, 0x400000002, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000000080)=""/137, &(0x7f0000000140)=0x89) sendmmsg$inet_sctp(r0, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:36 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:36 executing program 1: unshare(0x60000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={"6c6f0000fb552255ffffd9f5e2580a08"}) [ 87.278662] device lo entered promiscuous mode [ 87.325508] device lo left promiscuous mode 2018/04/29 18:55:36 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=@getlink={0x20, 0x12, 0x103}, 0x20}, 0x1}, 0x0) 2018/04/29 18:55:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) [ 87.351614] device lo entered promiscuous mode 2018/04/29 18:55:36 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000001600)={&(0x7f0000000240)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f00000002c0)}, 0x0) 2018/04/29 18:55:36 executing program 0: r0 = socket(0xa, 0x2, 0x0) socket$packet(0x11, 0x400000002, 0x300) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:36 executing program 4: symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000004000)='./file0\x00') open(&(0x7f0000000100)='./file0\x00', 0x102, 0x20) 2018/04/29 18:55:36 executing program 6: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 2018/04/29 18:55:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:36 executing program 7: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) alarm(0x0) 2018/04/29 18:55:36 executing program 2: timer_create(0x1, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000180)) timer_gettime(0x0, &(0x7f00000001c0)) 2018/04/29 18:55:36 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 2018/04/29 18:55:36 executing program 6: perf_event_open(&(0x7f0000940000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlockall() 2018/04/29 18:55:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0xffffffffffffffe0}, {0x16}]}) clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000804000)) mknod(&(0x7f000086c000)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000885ff8)='./file0\x00', &(0x7f0000735000), &(0x7f0000abffd0)) seccomp(0x0, 0x1, &(0x7f0000028ff0)) clone(0x0, &(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) open(&(0x7f000022b000)='./file0\x00', 0x401, 0x0) 2018/04/29 18:55:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000180), 0x0) [ 87.922148] audit: type=1326 audit(1525028136.920:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6915 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455979 code=0xffff0000 2018/04/29 18:55:37 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:37 executing program 4: clone(0x0, &(0x7f0000000140), &(0x7f0000000240), &(0x7f00000000c0), &(0x7f00000001c0)) msync(&(0x7f0000fef000/0xe000)=nil, 0xe000, 0x0) 2018/04/29 18:55:37 executing program 6: unshare(0x2000400) syz_emit_ethernet(0x2a, &(0x7f0000de6fd6)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1=0xe0000001}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 2018/04/29 18:55:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:37 executing program 2: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000000700)="1c") [ 88.823117] audit: type=1326 audit(1525028137.821:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6915 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455979 code=0xffff0000 2018/04/29 18:55:38 executing program 0: r0 = socket(0xa, 0x2, 0x0) socket$packet(0x11, 0x400000002, 0x300) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getscheduler(0x0) 2018/04/29 18:55:38 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0xffffffffffffffe0}, {0x16}]}) clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000804000)) mknod(&(0x7f000086c000)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000885ff8)='./file0\x00', &(0x7f0000735000), &(0x7f0000abffd0)) seccomp(0x0, 0x1, &(0x7f0000028ff0)) clone(0x0, &(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) open(&(0x7f000022b000)='./file0\x00', 0x401, 0x0) 2018/04/29 18:55:38 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000080), 0xb, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x2, 0x0) 2018/04/29 18:55:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:38 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, &(0x7f0000c60ff0), 0x0, &(0x7f0000964000), 0x0, 0x0) 2018/04/29 18:55:38 executing program 2: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000299f3e)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 89.316718] capability: warning: `syz-executor2' uses 32-bit capabilities (legacy support in use) [ 89.336231] audit: type=1326 audit(1525028138.334:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6960 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455979 code=0xffff0000 2018/04/29 18:55:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:38 executing program 4: setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'security.', "74086e750000000000000000008c00"}, &(0x7f0000000080)='{system*\x00', 0x9, 0x0) 2018/04/29 18:55:38 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x1, 0x0) write$fuse(r0, &(0x7f0000000140)={0x28, 0x2, 0x0, @fuse_notify_inval_inode_out}, 0x28) 2018/04/29 18:55:38 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000003b80)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x4) 2018/04/29 18:55:38 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) vmsplice(r0, &(0x7f0000000180)=[{}, {&(0x7f0000000040)="f6", 0x1}], 0x2, 0x0) 2018/04/29 18:55:38 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x1, 0x0) close(r0) 2018/04/29 18:55:38 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffc01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000001000), &(0x7f0000000000), &(0x7f0000001000), &(0x7f0000db7000)) 2018/04/29 18:55:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:39 executing program 0: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:39 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:39 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x1, 0x0) close(r0) 2018/04/29 18:55:39 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140)="9a", 0x1, r0) keyctl$revoke(0x3, r0) 2018/04/29 18:55:39 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000003b80)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x4) 2018/04/29 18:55:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") flistxattr(r0, &(0x7f0000000180)=""/45, 0x2d) 2018/04/29 18:55:39 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x1, 0x0) close(r0) 2018/04/29 18:55:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:39 executing program 6: timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000080)=0x0) timer_getoverrun(r0) 2018/04/29 18:55:39 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x1, 0x0) close(r0) 2018/04/29 18:55:39 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100), 0x4) 2018/04/29 18:55:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x28d, &(0x7f0000000240), 0x2d6}, 0x4004000) madvise(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x3) 2018/04/29 18:55:39 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:39 executing program 6: open$dir(&(0x7f0000000100)='./file0\x00', 0x1fffb, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write(r0, &(0x7f0000001300)="d88a8d38", 0x4) sendfile(r0, r0, &(0x7f0000000040), 0x7527fb3200000000) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x7, 0x9}, &(0x7f0000000140)=0x18) truncate(&(0x7f0000000400)='./file0\x00', 0x2) sendfile(r2, r1, &(0x7f0000002b80), 0x7fffffff) 2018/04/29 18:55:39 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x1, 0x0) close(r0) 2018/04/29 18:55:40 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:40 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000100)) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) r1 = syz_open_dev$loop(&(0x7f00000d7000)='/dev/loop#\x00', 0xfffffffffffffffe, 0x0) r2 = syz_open_dev$loop(&(0x7f0000e98000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x7fffffff) 2018/04/29 18:55:40 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:40 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregs(0x11, r1, 0x0, &(0x7f0000000000)=""/188) 2018/04/29 18:55:40 executing program 1: r0 = socket$inet(0x2, 0x200000000003, 0x2) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 2018/04/29 18:55:40 executing program 7: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x1, 0x0) write$fuse(r0, &(0x7f0000000140)={0x28, 0x3, 0x0, @fuse_notify_inval_inode_out={0x0, 0x7}}, 0x28) 2018/04/29 18:55:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:40 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x1, 0x0) close(r0) 2018/04/29 18:55:40 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregs(0x15, r1, 0x0, &(0x7f0000000000)=""/188) 2018/04/29 18:55:40 executing program 6: setitimer(0x2, &(0x7f0000000040), 0x0) 2018/04/29 18:55:41 executing program 0: r0 = socket(0x0, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:41 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:41 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) umount2(&(0x7f0000000080)='./f-0e0\x00', 0x0) 2018/04/29 18:55:41 executing program 6: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) 2018/04/29 18:55:41 executing program 1: capset(&(0x7f00000003c0)={0x19980330}, &(0x7f0000000400)) shmget(0x1, 0x1000, 0xa, &(0x7f0000fff000/0x1000)=nil) 2018/04/29 18:55:41 executing program 4: close(0xffffffffffffffff) 2018/04/29 18:55:41 executing program 2: prctl$intptr(0x2000000000029, 0xd6) 2018/04/29 18:55:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f00000000c0)={{0x0, 0x7530}}, &(0x7f00000001c0)) 2018/04/29 18:55:41 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) close(r0) 2018/04/29 18:55:41 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) io_setup(0x0, &(0x7f000034e000)) r1 = socket$netlink(0x10, 0x3, 0x0) sendfile(r1, r0, &(0x7f0000014000)=0x100000, 0x10001) 2018/04/29 18:55:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280), 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:41 executing program 7: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000040)=""/59) fstatfs(0xffffffffffffffff, &(0x7f0000000580)=""/4096) 2018/04/29 18:55:42 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') 2018/04/29 18:55:42 executing program 0: r0 = socket(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000240)) 2018/04/29 18:55:42 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) close(r0) 2018/04/29 18:55:42 executing program 7: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000000080), &(0x7f0000000040), &(0x7f0000f8b000), &(0x7f0000804000)) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x10) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000180), &(0x7f00006fcff0)) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r2, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000d93ff6)=@abs, 0x2ae) r3 = syz_open_procfs(r0, &(0x7f0000000200)='environ\x00') r4 = dup2(r2, r1) exit(0x0) open(&(0x7f00000ed000)='./file0\x00', 0x401, 0x0) write(0xffffffffffffffff, &(0x7f00000b5000), 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)=r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002700)={{{@in6=@remote, @in6}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000002800)=0xe8) dup2(r4, r3) 2018/04/29 18:55:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:42 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:42 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'bcsh0\x00', 0x2001}) r1 = socket$unix(0x1, 0x2, 0x0) dup2(r1, r0) 2018/04/29 18:55:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000240)={'nat\x00'}, &(0x7f0000000180)=0x103) 2018/04/29 18:55:42 executing program 1: r0 = open(&(0x7f00000004c0)='./file0\x00', 0xc000, 0x64) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000500)={0x0, 0xffffffff7fffffff}, &(0x7f0000000540)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000580)={r1, 0x2}, 0x8) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r3 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) set_mempolicy(0x8002, &(0x7f0000000000)=0x807, 0x6) sendfile(r2, r3, &(0x7f00000ddff8), 0x102000001) 2018/04/29 18:55:42 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) close(r0) 2018/04/29 18:55:42 executing program 0: r0 = socket(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:42 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'bcsh0\x00', 0x2001}) r1 = socket$unix(0x1, 0x2, 0x0) dup2(r1, r0) 2018/04/29 18:55:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0xe8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000140), &(0x7f00000004c0)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES64, @ANYBLOB="58776bb3594562620e54cb5cc388dfc6300d8f9248f4752e6e27c0b2cb1887ebf466886a4c7ff6540a009848f352163b0803906162947fa828dbd58e303eaf24fb92139c766e06c9f6ea2aedb608a813098ea7633e42e49a4291179404e0786bab543b673ae40c7e99fa89ec67c021131bdc859c036509fb564e55112ebadf0b8514fd2baf51c5affb0c23567aceec144fcc3d800d723b6fc78ee1f92517679ed7dc85610b36bdc556e629d99cea66f1c1977748496678ea1e062e043d47405f7227be71d88482952033aa98671c697b"]}, 0x160) ioctl$sock_ifreq(r0, 0x890b, &(0x7f00000000c0)={"696662300200", @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)}}) 2018/04/29 18:55:43 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x1, 0x0) close(0xffffffffffffffff) 2018/04/29 18:55:43 executing program 0: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:43 executing program 1: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000400)=""/208) 2018/04/29 18:55:43 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20004001, &(0x7f00000000c0)={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600)=[{{&(0x7f0000000040)=@rc, 0xa, &(0x7f0000001580), 0x0, &(0x7f0000001600)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000002640)={0x0, 0x989680}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='bridge_slave_1\x00', 0x271) writev(r0, &(0x7f0000000500), 0x26b) 2018/04/29 18:55:43 executing program 7: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000000080), &(0x7f0000000040), &(0x7f0000f8b000), &(0x7f0000804000)) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x10) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000180), &(0x7f00006fcff0)) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r2, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000d93ff6)=@abs, 0x2ae) r3 = syz_open_procfs(r0, &(0x7f0000000200)='environ\x00') r4 = dup2(r2, r1) exit(0x0) open(&(0x7f00000ed000)='./file0\x00', 0x401, 0x0) write(0xffffffffffffffff, &(0x7f00000b5000), 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)=r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002700)={{{@in6=@remote, @in6}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000002800)=0xe8) dup2(r4, r3) 2018/04/29 18:55:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:43 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:43 executing program 0: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000900)={0x73, 0x79, 0x7a, 0x0}) 2018/04/29 18:55:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) 2018/04/29 18:55:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:43 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @rand_addr}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 2018/04/29 18:55:43 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) 2018/04/29 18:55:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:44 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0xc0000, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x52000, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000000)=0x50) write$binfmt_misc(r0, &(0x7f0000000400)={'syz0'}, 0x4) 2018/04/29 18:55:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000900)={0x73, 0x79, 0x7a, 0x0}) 2018/04/29 18:55:44 executing program 0: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740), 0x0, 0x0) 2018/04/29 18:55:44 executing program 6: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f0000000240)="eb", 0x1, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000001240)="ab", 0x1) 2018/04/29 18:55:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlockall() 2018/04/29 18:55:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:44 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:44 executing program 7: clone(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/29 18:55:44 executing program 6: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/63, 0x3f}], 0x1) 2018/04/29 18:55:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000900)={0x73, 0x79, 0x7a, 0x0}) 2018/04/29 18:55:44 executing program 2: setrlimit(0x7, &(0x7f0000becff0)) perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:44 executing program 0: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740), 0x0, 0x0) 2018/04/29 18:55:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="15", 0x1, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:44 executing program 4: pipe(&(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@random="cdbf0e000084", @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @loopback={0x0, 0x1}, @dev={0xfe, 0x80}, [], "800000e77f000400"}}}}}}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000340)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'syz_tun\x00'}) 2018/04/29 18:55:44 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@nat={'nat\x00', 0x19, 0x3, 0x2a0, [0x20000040, 0x0, 0x0, 0x2000024c, 0x20000380], 0x0, &(0x7f0000000000), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'bcsf0\x00', 'dummy0\x00', 'bond_slave_1\x00', 'bridge0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xac, 0xdc, 0x10c, [@connbytes={'connbytes\x00', 0x18}]}, [@snat={'snat\x00', 0xc, {{@random="21df34cf66f0"}}}]}, @arpreply={'arpreply\x00', 0xc, {{@random="10c79b1011ab"}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'lo\x00', 'vlan0\x00', 'ifb0\x00', 'bond_slave_1\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xd4, 0xd4, 0x104, [@pkttype={'pkttype\x00', 0x4}, @time={'time\x00', 0x18}]}}, @snat={'snat\x00', 0xc, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}]}, 0x340) 2018/04/29 18:55:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000900)={0x73, 0x79, 0x7a, 0x0}) 2018/04/29 18:55:45 executing program 2: setrlimit(0x7, &(0x7f0000becff0)) perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 96.026268] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/04/29 18:55:45 executing program 0: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740), 0x0, 0x0) 2018/04/29 18:55:45 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x200408d2, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:45 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/11, 0xb}], 0x1) 2018/04/29 18:55:45 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) 2018/04/29 18:55:45 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x4) 2018/04/29 18:55:45 executing program 1: keyctl$join(0x1, &(0x7f0000000900)={0x73, 0x79, 0x7a, 0x0}) 2018/04/29 18:55:45 executing program 2: setrlimit(0x7, &(0x7f0000becff0)) perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:45 executing program 1: keyctl$join(0x1, &(0x7f0000000900)={0x73, 0x79, 0x7a}) 2018/04/29 18:55:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x0, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/159, 0x9f}], 0x1, 0x4000) 2018/04/29 18:55:45 executing program 0: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000740)=[{&(0x7f0000000040)=@in={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f00000004c0), 0x24e, &(0x7f00000005c0)}], 0x924924924924a02, 0x0) 2018/04/29 18:55:45 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="000000000000090000000000000000fbff28b81edbd90885b06c0bcfe0788e65fd7a950976842a292042d3138a86a8cd"], 0x1) 2018/04/29 18:55:45 executing program 2: setrlimit(0x7, &(0x7f0000becff0)) perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:45 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/11, 0xb}], 0x1) 2018/04/29 18:55:45 executing program 1: keyctl$join(0x1, &(0x7f0000000900)={0x73, 0x79, 0x7a}) 2018/04/29 18:55:45 executing program 0: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x2) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="0068d5351d650000d740000000d95e000600000002"]) ioctl(r0, 0x100000008936, &(0x7f0000000000)) 2018/04/29 18:55:46 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0xc539) 2018/04/29 18:55:46 executing program 2: perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:46 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/11, 0xb}], 0x1) 2018/04/29 18:55:46 executing program 1: keyctl$join(0x1, &(0x7f0000000900)={0x73, 0x79, 0x7a}) 2018/04/29 18:55:46 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:46 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000200)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @broadcast=0xffffffff}, @gre={{0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x0, 0x8, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x0, 0x57}}}}}}, 0x0) 2018/04/29 18:55:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x0, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:46 executing program 6: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee7cdfffffff6aa6bd58d1443474482e85040fb4947ebabe7928c335b0000000001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) 2018/04/29 18:55:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000100)="15", 0x1, 0x0, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/29 18:55:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f0000f53fff), 0x0, 0x20000802, &(0x7f000006d000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 2018/04/29 18:55:46 executing program 2: perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:46 executing program 6: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 2018/04/29 18:55:46 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) close(r0) syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x2) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) 2018/04/29 18:55:46 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/11, 0xb}], 0x1) 2018/04/29 18:55:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f0000000440)=""/231, 0xe7}, {&(0x7f0000000540)=""/86, 0x56}, {&(0x7f00000005c0)=""/23, 0x17}], 0x3, 0x0) 2018/04/29 18:55:46 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x3c058533fd59b3f3, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 2018/04/29 18:55:46 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) sendto$inet6(r0, &(0x7f0000000040), 0xff5a, 0xfffffffffffffffc, &(0x7f0000000040)={0xa, 0x0, 0x200000000002, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x19) r1 = dup2(r0, r0) ioctl$sock_netrom_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) 2018/04/29 18:55:48 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6050a09c00081100fe80000000000000000000000000000000aa00004e2000089078"], &(0x7f0000000040)) 2018/04/29 18:55:48 executing program 7: readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000040)=""/11, 0xb}], 0x1) 2018/04/29 18:55:48 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000240)) 2018/04/29 18:55:48 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x6e, &(0x7f00006c6ff0), 0x0, &(0x7f00009dffb8)=ANY=[]}, 0x0) close(r0) 2018/04/29 18:55:48 executing program 2: perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:48 executing program 6: perf_event_open(&(0x7f0000757f88)={0x1, 0x67, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000140), 0x0, 0x14) 2018/04/29 18:55:48 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000000)) 2018/04/29 18:55:48 executing program 6: perf_event_open(&(0x7f0000757f88)={0x1, 0x67, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000140), 0x0, 0x14) 2018/04/29 18:55:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x14, 0x2, 0x6, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/29 18:55:48 executing program 7: readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000040)=""/11, 0xb}], 0x1) 2018/04/29 18:55:48 executing program 2: setrlimit(0x0, &(0x7f0000becff0)) perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:48 executing program 0: utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x77359400}}, 0x0) 2018/04/29 18:55:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x7, &(0x7f00000005c0), 0x0) 2018/04/29 18:55:48 executing program 1: socketpair(0x0, 0x8000b, 0x8, &(0x7f00000002c0)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/29 18:55:48 executing program 0: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00002c3000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000002c0)) poll(&(0x7f0000002f00)=[{r1, 0x4181}], 0x1, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000c58000)=[{}], 0x1, 0x8000000000000075, &(0x7f0000654ff8), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x100000003, 0x32, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 2018/04/29 18:55:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000d7efec)=ANY=[@ANYBLOB="140000000301ffffffb6579251fff200020000"], 0x13}, 0x1}, 0x0) 2018/04/29 18:55:48 executing program 2: setrlimit(0x0, &(0x7f0000becff0)) perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:49 executing program 6: set_mempolicy(0x0, &(0x7f00000000c0), 0x0) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000053b000)) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/29 18:55:49 executing program 1: socketpair(0x0, 0x8000b, 0x8, &(0x7f00000002c0)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/29 18:55:49 executing program 4: socketpair(0x0, 0x8000b, 0x8, &(0x7f00000002c0)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/29 18:55:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000b40), 0x0, 0x20020003, &(0x7f0000000b00)={0x2, 0x0, @loopback=0x7f000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 2018/04/29 18:55:49 executing program 2: setrlimit(0x0, &(0x7f0000becff0)) perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:49 executing program 0: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00002c3000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000002c0)) poll(&(0x7f0000002f00)=[{r1, 0x4181}], 0x1, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000c58000)=[{}], 0x1, 0x8000000000000075, &(0x7f0000654ff8), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x100000003, 0x32, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:49 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:49 executing program 7: readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000040)=""/11, 0xb}], 0x1) [ 100.931909] random: crng init done 2018/04/29 18:55:50 executing program 2: setrlimit(0x7, &(0x7f0000becff0)) perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:50 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) 2018/04/29 18:55:50 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uinput\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000040)=""/11, 0xb}], 0x1) 2018/04/29 18:55:50 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000340)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000004e40)) 2018/04/29 18:55:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000640)=@ipv6_delroute={0x24, 0x19, 0x60d, 0x0, 0x0, {0xa}, [@RTA_PRIORITY={0x8, 0x6, 0xffffffffffffffff}]}, 0x24}, 0x1}, 0x0) 2018/04/29 18:55:50 executing program 6: r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) 2018/04/29 18:55:50 executing program 2: setrlimit(0x7, &(0x7f0000becff0)) perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:50 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uinput\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000040)=""/11, 0xb}], 0x1) 2018/04/29 18:55:50 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) 2018/04/29 18:55:50 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000100)) 2018/04/29 18:55:50 executing program 5: getrlimit(0xd, &(0x7f0000000000)) 2018/04/29 18:55:50 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:50 executing program 6: shmget(0x1, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 2018/04/29 18:55:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000180), 0x127) 2018/04/29 18:55:50 executing program 2: setrlimit(0x7, &(0x7f0000becff0)) perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/29 18:55:50 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000ffd000/0x2000)=nil], &(0x7f0000000080), &(0x7f00000000c0), 0x0) 2018/04/29 18:55:50 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uinput\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000040)=""/11, 0xb}], 0x1) 2018/04/29 18:55:50 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) 2018/04/29 18:55:50 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x4, 0x7, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)}, 0x10) 2018/04/29 18:55:50 executing program 6: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000001280), 0x0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4}, 0x0) 2018/04/29 18:55:50 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:51 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4000000000000004, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r0, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) 2018/04/29 18:55:51 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180), 0x0) 2018/04/29 18:55:51 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) 2018/04/29 18:55:51 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f00000000c0), 0x339) 2018/04/29 18:55:51 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000040)="b7", &(0x7f0000000100)=""/222}, 0x18) 2018/04/29 18:55:51 executing program 5: io_setup(0x8, &(0x7f00004eb000)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_getevents(r0, 0x0, 0x75, &(0x7f000011d000), &(0x7f00000000c0)={0x0, 0x989680}) 2018/04/29 18:55:51 executing program 0: clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 2018/04/29 18:55:51 executing program 3: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:51 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180), 0x0) 2018/04/29 18:55:51 executing program 4: ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 2018/04/29 18:55:51 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) shutdown(r0, 0x1) 2018/04/29 18:55:51 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00003b8ffc)=0x51) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fdd000)=0x3) 2018/04/29 18:55:51 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x571bcbb58af98941, &(0x7f0000001000), &(0x7f0000000000), &(0x7f0000001000), &(0x7f0000db7000)) 2018/04/29 18:55:51 executing program 2: msgrcv(0x0, &(0x7f0000e3b000)=ANY=[@ANYBLOB="00000000008000000000000000000000000000000000000000000000000000000000000000001c0000000000000000000000000000000000000000000000000000000000000000000000000000000000010100000000e6ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00009c8000)="636c6561725f72656673007edb") writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) msgsnd(0x0, &(0x7f00001aeff8)={0x2}, 0x8, 0x0) 2018/04/29 18:55:52 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180), 0x0) 2018/04/29 18:55:52 executing program 4: ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 2018/04/29 18:55:52 executing program 3: mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:52 executing program 5: unshare(0x8000400) syz_emit_ethernet(0x0, &(0x7f00000001c0)=ANY=[], &(0x7f0000000040)) 2018/04/29 18:55:52 executing program 2: syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6050a09c00081100fe80007b1924560000000000000000bbfe8000000000000000000000000000aa00004e2000089078"], &(0x7f0000000040)) 2018/04/29 18:55:52 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000040)=""/241) 2018/04/29 18:55:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000540)={{0x0, 0x0, r1}}) 2018/04/29 18:55:52 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) shutdown(r0, 0x1) 2018/04/29 18:55:52 executing program 4: ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 2018/04/29 18:55:52 executing program 7: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0x1, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 2018/04/29 18:55:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) 2018/04/29 18:55:52 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/158) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x60, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 2018/04/29 18:55:52 executing program 2: getrandom(&(0x7f0000000140)=""/23, 0xffffffffffffffab, 0x3) 2018/04/29 18:55:52 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000340)={'filter\x00'}, &(0x7f00000003c0)=0x44) 2018/04/29 18:55:52 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) shutdown(r0, 0x1) 2018/04/29 18:55:52 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 2018/04/29 18:55:52 executing program 2: migrate_pages(0x0, 0x3, &(0x7f00000000c0)=0x7, &(0x7f0000000100)) 2018/04/29 18:55:52 executing program 7: io_setup(0x8, &(0x7f00004eb000)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000bcf3f)}]) io_getevents(r0, 0x0, 0x75, &(0x7f000011d000), &(0x7f00000000c0)={0x0, 0x989680}) 2018/04/29 18:55:53 executing program 3: mknod(&(0x7f0000000000)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480), &(0x7f0000000080)) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) clone(0x203, &(0x7f0000000300), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000180)) 2018/04/29 18:55:53 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 2018/04/29 18:55:53 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) 2018/04/29 18:55:53 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) shutdown(r0, 0x1) 2018/04/29 18:55:53 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/158) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x60, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 2018/04/29 18:55:53 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000040)=""/125) 2018/04/29 18:55:53 executing program 5: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000540)={'filter\x00'}, &(0x7f00000005c0)=0x54) 2018/04/29 18:55:53 executing program 7: io_setup(0x8, &(0x7f00004eb000)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000bcf3f)}]) io_getevents(r0, 0x0, 0x75, &(0x7f000011d000), &(0x7f00000000c0)={0x0, 0x989680}) 2018/04/29 18:55:53 executing program 5: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) sync_file_range(r0, 0x82, 0x0, 0x5) 2018/04/29 18:55:53 executing program 1: r0 = socket$inet(0x2, 0x3, 0x5) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x5411, &(0x7f0000000000)={"65727370616e3000000000000200"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_tables_targets\x00') 2018/04/29 18:55:53 executing program 7: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 2018/04/29 18:55:53 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 2018/04/29 18:55:53 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa08004500001c0000000000019078ac14ffaa000000000000000000089078ec8f90b2c7a21180560bf90929035d72ffe73ad8e58338342d74af66c569977590eab00f1163e4a329d5600e9e3402a0de0567bc1f2ff7071212fa71021455dfea7529aac0b7640304d86835ddd69d0dc9b6135202a5a57060d8a259c93ee95795602b5f79e21e0433d0880a36a97379d57bc0f68d8a1fd22c3ed2edb6f61c6fc3a606dd514b34ca405b3adcbba670f1fa7f9f5bf67b01a4c212dce3f64842a5116a9ebb08dd28eb6dd644fe2609af8d008c2fc458598f66"], 0x0) 2018/04/29 18:55:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x40000004e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000002640)="5b5331d25a71c6a64f00d90720f785f88f9e63f90f76c48feee314083a181eefab2af8a65643ebc8c2b907fdebdd7b6aabd04ebe5b3133ae10d25c8992f969f3462f985649a0d1aeb7d535535fe9ce30e21dc14811cdff61456d7141cc19a8c86d8c80ccc6639cbb396c5307933f3d1c5a346d2d3a47311974a4970abaccab9b06afbdf003eb24b16c82af83155e9b5533db3eeb4e9c0722105fdc7585c77f5238ae3d12f08c8ab6dcf0edb2490a54ac46932250eb853d86d10cff49f40797062fee0affd74773c634", 0xc9}], 0x1, &(0x7f0000003640)}}], 0x1, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000100)='Q', 0x1}], 0x1, &(0x7f0000000240)}, 0x0) recvmmsg(r0, &(0x7f000000ef00)=[{{&(0x7f000000b700)=@in={0x0, 0x0, @broadcast}, 0x80, &(0x7f000000ccc0)=[{&(0x7f000000bcc0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f000000cd00)=@ipx, 0x80, &(0x7f000000dec0), 0x0, &(0x7f000000df00)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 2018/04/29 18:55:53 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) [ 224.597030] INFO: rcu_sched detected stalls on CPUs/tasks: [ 224.602748] (detected by 1, t=120002 jiffies, g=18259, c=18258, q=68) [ 224.609462] All QSes seen, last rcu_sched kthread activity 120002 (4294891894-4294771892), jiffies_till_next_fqs=3, root ->qsmask 0x0 [ 224.621602] syz-executor0 R running task 60256 7767 4558 0x00000008 [ 224.628991] Call Trace: [ 224.631582] [ 224.633773] sched_show_task+0x600/0x730 [ 224.637875] rcu_check_callbacks+0x292f/0x2cd0 [ 224.642494] update_process_times+0x132/0x1a0 [ 224.647085] tick_sched_timer+0x33b/0x4b0 [ 224.651329] ? tick_setup_sched_timer+0x5e0/0x5e0 [ 224.656237] __hrtimer_run_queues+0xc03/0x15d0 [ 224.660936] hrtimer_interrupt+0x426/0xaf0 [ 224.665205] ? hrtimer_init+0x5b0/0x5b0 [ 224.669199] local_apic_timer_interrupt+0x66/0x230 [ 224.674152] smp_apic_timer_interrupt+0x5a/0x90 [ 224.678841] apic_timer_interrupt+0xf/0x20 [ 224.683082] [ 224.685345] RIP: 0010:msan_get_shadow_origin_ptr+0x101/0x230 [ 224.691147] RSP: 0018:ffff88014c89f410 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff12 [ 224.698878] RAX: ffff8801cc89f4d8 RBX: ffffffff8b311000 RCX: ffff88021fff1520 [ 224.706155] RDX: 0000000000000520 RSI: 0000000000000004 RDI: 0000000000000000 [ 224.713437] RBP: ffff88014c89f440 R08: 0000000000000000 R09: 0000000000000002 [ 224.720714] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88014c89f4d8 [ 224.727995] R13: 0000000000000000 R14: ffffffff8b310000 R15: ffff88014c89f4d8 [ 224.735297] ? smp_call_function_single+0x365/0x4f0 [ 224.740340] __msan_metadata_ptr_for_load_4+0x10/0x20 [ 224.745550] smp_call_function_single+0x373/0x4f0 [ 224.750469] ? flush_tlb_all+0x40/0x40 [ 224.754375] ? flush_tlb_all+0x40/0x40 [ 224.758284] smp_call_function_many+0x65d/0xde0 [ 224.762976] ? flush_tlb_all+0x40/0x40 [ 224.766879] ? __msan_poison_alloca+0x15c/0x1d0 [ 224.771573] ? flush_tlb_all+0x40/0x40 [ 224.775473] on_each_cpu+0xd6/0x160 [ 224.779116] ? flush_tlb_all+0x40/0x40 [ 224.783026] flush_tlb_kernel_range+0x165/0x1e0 [ 224.787757] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 224.793142] __purge_vmap_area_lazy+0x1f7/0x3b0 [ 224.797890] vm_unmap_aliases+0x627/0x6c0 [ 224.802085] change_page_attr_set_clr+0x65c/0x1d90 [ 224.807132] set_memory_ro+0xd0/0x100 [ 224.811035] bpf_prog_select_runtime+0x3a5/0xa40 [ 224.816443] bpf_prepare_filter+0x1a96/0x1b10 [ 224.821039] __get_filter+0x5b7/0x7d0 [ 224.824953] sk_attach_filter+0x72/0x2e0 [ 224.829119] sock_setsockopt+0x344f/0x4830 [ 224.833457] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 224.838889] SYSC_setsockopt+0x344/0x570 [ 224.843054] SyS_setsockopt+0x76/0xa0 [ 224.846951] do_syscall_64+0x309/0x430 [ 224.850874] ? SYSC_recv+0xe0/0xe0 [ 224.854440] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 224.859638] RIP: 0033:0x455979 [ 224.862833] RSP: 002b:00007fdb6abddc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 224.870560] RAX: ffffffffffffffda RBX: 00007fdb6abde6d4 RCX: 0000000000455979 [ 224.877848] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 224.885127] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 224.892407] R10: 0000000020b86000 R11: 0000000000000246 R12: 00000000ffffffff [ 224.901255] R13: 0000000000000578 R14: 00000000006fc3e0 R15: 0000000000000000 [ 224.908567] rcu_sched kthread starved for 120002 jiffies! g18259 c18258 f0x2 RCU_GP_WAIT_FQS(3) ->state=0x0 ->cpu=0 [ 224.919141] rcu_sched R running task 61968 8 2 0x80000000 [ 224.926532] Call Trace: [ 224.929151] __schedule+0x674/0x730 [ 224.932792] ? schedule+0x1cc/0x2f0 [ 224.936441] schedule+0x1cc/0x2f0 [ 224.939925] schedule_timeout+0x3e7/0x570 [ 224.944091] ? run_local_timers+0x100/0x100 [ 224.948435] rcu_gp_kthread+0x21e1/0x38d0 [ 224.952621] ? rcu_barrier_func+0x120/0x120 [ 224.956962] kthread+0x539/0x720 [ 224.960366] ? rcu_barrier_func+0x120/0x120 [ 224.964708] ? kthread_blkcg+0xf0/0xf0 [ 224.968611] ret_from_fork+0x35/0x40