INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.27' (ECDSA) to the list of known hosts. 2018/04/20 09:34:04 fuzzer started 2018/04/20 09:34:05 dialing manager at 10.128.0.26:41811 2018/04/20 09:34:11 kcov=true, comps=false 2018/04/20 09:34:14 executing program 0: getcwd(&(0x7f0000000000)=""/28, 0x1c) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x80) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000080)=0xc, 0x4) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), 0x4) ioctl$int_out(r0, 0x0, &(0x7f0000000100)) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000140)={0x401}, 0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000180)={{0x5, 0x3}, 0x1, 0x6, 0x1508, {0x800, 0x3ff}, 0x3, 0x7ff}) getsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280), 0x4) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000002c0)={'nat\x00'}, &(0x7f0000000340)=0x78) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000380)) sendto(r0, &(0x7f00000003c0)="d34d2e9cc7bfc245cf6d2c4c808b4c5a82bf698a7cc01864999135cd513eae69ffa1964e468a15041205c149f8ec1b34a6f1d3ccf550029b22adbe29e01923749b9379a776005416a29a8ace1daf7436102b70011457f63b0fdd8a30ad8a5e9dc44aab88e3a9a29ab4b478661c09a679a4460b77de3008b6699e5aec3e5fa0acbd61fbc2f323fc8bcb1e7b7a3c55e0e2", 0x90, 0x4004, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000480)={0x4b93, 0x2000000000000000, 0x5}) r1 = add_key(&(0x7f00000004c0)='logon\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000540)="ed63f8163e5365dd6b590f651e18c4a10ee3d382ea7ff2737340b02ccdff93a64f2f1596cc51eb0e7dbd4572b793299490b68974d65292aa64786fd4f59a722b221426b67ecc552ab6e5f3c23f445d1977c209705a5bf53cb3797f987e64090abf8866078694205d21af8b4159a19309a82268bdd033e0b0bf7fd2212f6dfb2275f110acbcf476f19ff409d09a01e3feff4c45b10074d97f2185", 0x9a, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000600)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000007c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x48, r2, 0x10, 0x70bd26, 0x25dfdbfc, {0x6}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x8010) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000800)={{0x2, 0x23, 0x4000000, 0x6, 0x2, 0x101}, 0x976e, 0x8001, 0x2, 0x1, 0xe25d, "7b143f224e9db774c74caf1ba6b5efb2fcb31de52e2d35f4d8ee6fe92c563d5b370e968dc5be0b481c4f281d56593807d7ad3ff657758d39d5ec379d41a314e28160e393b417e6d644124c079456eda3c5e0696476849aafd8f12f315fab5f04accd502291fb058545bb647112fcc82f87c15091ae73e206cc8252e02000a3f9"}) r3 = syz_open_dev$sg(&(0x7f00000008c0)='/dev/sg#\x00', 0x7f, 0x109400) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000900), &(0x7f0000000940)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000980)={0x0, 0x1f, 0x1, 0x0, 0x4, 0xffff, 0xf000000000000000, 0x0, {0x0, @in={{0x2, 0x4e24}}, 0x9, 0xfb8, 0x4, 0x0, 0x7}}, &(0x7f0000000a40)=0xb0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000a80)={r4, 0x8}, &(0x7f0000000ac0)=0x8) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000b00)=0x100) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000b40)={r4, 0x9, 0x4, [0x1, 0x2, 0x7, 0x8]}, 0x10) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000c00)=""/168) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000cc0)=0x7, 0x4) remap_file_pages(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x82840) 2018/04/20 09:34:14 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@sco, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_ipx_SIOCAIPXPRISLT(r0, 0x89e1, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0xfffffffffffffffe, 0x7}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000200)=""/89) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x80000, 0x0) accept4$bt_l2cap(r0, &(0x7f00000002c0), &(0x7f0000000300)=0xe, 0x0) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f00000003c0)={r2, @in6={{0xa, 0x4e21, 0xff, @mcast1={0xff, 0x1, [], 0x1}, 0x2}}, [0x400, 0x17600000000, 0x4fa, 0x100, 0xffffffffffffffff, 0x5, 0x6, 0x4, 0x2, 0x3, 0xffffffff00000000, 0x5, 0x0, 0x27a, 0xfffffffffffffff7]}, &(0x7f00000004c0)=0x100) rt_sigreturn() getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000540)={r1, 0x3c, &(0x7f0000000500)=[@in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e21, @loopback=0x7f000001}, @in6={0xa, 0x4e20, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0xfffffffffffff801}]}, &(0x7f0000000580)=0x10) getpeername$packet(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000600)=0x14) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000700)={@can={0x1d, r4}, {&(0x7f0000000640)=""/65, 0x41}, &(0x7f00000006c0), 0x20}, 0xa0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000800)) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000880)={0x5, &(0x7f0000000840)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f00000008c0)={r6}) name_to_handle_at(r3, &(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x84, 0xc4c, "dba24f678bad2289474d9c566a80e93d7f954b310f7c653b9cf411f40f7e40745475d3e6892a63925f0d19473aa84cb20158e901decaa3a2cabb8023d4fd5d9a9b3a29d13c4170005a964bfb68e2f17a4af47a911249b05c98b3274bd57cc010ad5a808ec4b9f588e13593134108e400ba975b5dbecc68baa8cf0a84"}, &(0x7f0000000a00), 0x1000) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000a40)={0x10001, 0x20000}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r5, 0x84, 0x1c, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$KDSETLED(r5, 0x4b32, 0x5a19) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) epoll_create(0xffffffffffff3f75) ioctl$TIOCSTI(r5, 0x5412, 0x6) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) setsockopt$inet6_group_source_req(r5, 0x29, 0x2f, &(0x7f0000000bc0)={0x2, {{0xa, 0x4e23, 0x100000000, @dev={0xfe, 0x80, [], 0x17}, 0x40}}, {{0xa, 0x4e22, 0x6, @loopback={0x0, 0x1}, 0x7}}}, 0x108) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000d00)={0x3, 0x0, 0x0, 0x80000001}) ioctl$DRM_IOCTL_AGP_ALLOC(r5, 0xc0206434, &(0x7f0000000d40)={0x1, r7, 0x10000, 0x2}) ioctl$TCSETAW(r5, 0x5407, &(0x7f0000000d80)={0x1, 0xb4, 0x783, 0x400, 0x4, 0xaf7e, 0xfff, 0x7f, 0x0, 0xfc80}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000dc0)={0x9be2, 0x8004, 0x8, 0x89, r1}, &(0x7f0000000e00)=0x10) 2018/04/20 09:34:14 executing program 7: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x20400, 0x0) connect$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e) futimesat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x0, 0x7530}}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e20, 0x1, @empty, 0x669}}}, &(0x7f00000004c0)=0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000500)={0x0, 0x2}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000580)=@assoc_value={0x0, 0x3}, &(0x7f00000005c0)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000780)={&(0x7f0000000140)=@in6={0xa, 0x4e21, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x8d5}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000180)="77520cabb1135a6aec71cab7bcfee96411ff22422a0f9398893d0d97c9957a16893295432057249ad3bb71b7f1e37728b784249b42e7d1646a7504644f8a2a26adfe47ba0bb43b519cdb57a6c8e174f102399b7afd5cc9d78976e8dc13c9d3a167fcb0f7e878f0212b3b5fa85b302def537ba2b9177742b640dad3e09e12e57d4e9322389e4b9ef454d617a28fe686047ccec5c5484602428042512408a83e19fbe2be50ef44026cc50bf8ac7568efca76bea19740bc736bde70508ac12feea69f64e637d3c8102c1aa295", 0xcb}, {&(0x7f0000000280)="87a4a02dba0a82361cf6f06563be7b2758de802bc99a232f3cf2ffa1d73b3e197bdc7bf4effe529c1964a31215b97a4437ed23ffd64eea9767b3636ab03085abb32472e814d872bfcc309e71c1ce8b0e64d91a74c55566abbf63434c507462b62b60d174658cd21f7382d97c8e49b1c8c6c69583eb8258369fafd9c05e9c089522dc660fafde497df177c848f4933e17dd49f0f77b362f9c99544f90dd15aa46806aedc34b975567e6", 0xa9}, {&(0x7f0000000340)="daa0c3e8d683638219955191561de36bddb05f4c245b6bfd3c3db4c1b215693068f6d3f18c6229efef47851a2e92865e0a86651466ae4ef1efbaf2159d5107e02559b054323e4f78353162249df3d9555336e0466fe4df8c137ff3635ddcddadd0", 0x61}], 0x3, &(0x7f0000000600)=[@init={0x18, 0x84, 0x0, {0x916, 0x9, 0xad, 0x8}}, @sndrcv={0x30, 0x84, 0x1, {0x2, 0x7, 0x2, 0x1, 0x8, 0x401, 0xf32, 0x0, r1}}, @sndinfo={0x20, 0x84, 0x2, {0x1000, 0x204, 0x0, 0x20, r2}}, @init={0x18, 0x84, 0x0, {0x6c21, 0x7, 0xfffffffffffff80e, 0x7}}, @init={0x18, 0x84, 0x0, {0x6, 0x100000000, 0x7, 0x1ff}}, @init={0x18, 0x84, 0x0, {0xa88, 0x0, 0x4, 0xa869}}, @init={0x18, 0x84, 0x0, {0x2, 0x8, 0x5a, 0x9}}, @sndinfo={0x20, 0x84, 0x2, {0x7fffffff, 0x0, 0x1ff, 0x7, r3}}], 0x180, 0x20000000}, 0x20040050) fdatasync(r0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000840)={r2, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x8f}}}, &(0x7f0000000900)=0x84) llistxattr(&(0x7f0000000940)='./file0/file0\x00', &(0x7f0000000980)=""/4096, 0x1000) sendfile(r0, r0, &(0x7f0000001980), 0x8) arch_prctl(0x1004, &(0x7f00000019c0)="c6a8120658f6cc14010bbe46c6a6d7f173814310df8519ad3e46e293c8a1ddc36a182d368d5a401a19750a077da483a0ed7f70a740a671e7ecd568918e1a5d8e76cd25089eb9b5171ab520457f6a20a2737d2f02012b0aa0930c59ac2bad2b2f64fd3c66fc207a92e32f0689966733280142ac7eeaaad1b3b590c8dacd76b1ecb7affa9efeb4791c") setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001a80)={r1, 0xb72000, 0x2, 0x80000000}, 0x10) syz_mount_image$reiserfs(&(0x7f0000001ac0)='reiserfs\x00', &(0x7f0000001b00)='./file0/file0\x00', 0xe3, 0x4, &(0x7f0000001e40)=[{&(0x7f0000001b40)="cb8f733bdac4519f6cd4f76aa7182b392957d90e26c004e1f3523cdec90cd524a6698c812dda2913359329442647b65b73a0ee424b5273419a531d2f9d84a5056c1f74657b90bb4182869a3b968d301c1c68095744caf92baeee37a396c949ec9f89e951004cd35762a3429a6f2cd516e5dbabebc70be095414b82a5e63591478402b8cee2a44968", 0x88, 0x21}, {&(0x7f0000001c00)="8b1dba97d5072cd883f19e20efa03cbeaaf47cd43a950cc55998e07ede000e481f9aa0d2ee5c9328825d708a743246e01052702a15efc79dc314a483f148e979fea63cad24be086dac236a2b4e0d50f1c1a5ef3bb4bb78e16466c1f98d4dabd59962c9de6b913c486b903da3a441170d982c9239263b03e8866ad8e26a19cc2d6adf3e4a8a5bdd4d2364946d580e1e37f9c7f3ac0f79ec2d6cb5d5b4d5331caa1709e26abc7d9017b4e76eb7d3987ad1e1", 0xb1, 0xfffffffffffff814}, {&(0x7f0000001cc0)="b90f479fd52c839ecdbaddbfdb773a17493767bfb4059e2c9f6c3677c64d5e25bd19b0e94c64ba08758924c7746b09788370a546c5b1f6e8aee6d474d18ed3f42df6986bd0757a9969fd11a7dc9ef9ab9e740fe0670a54745591a4ca2cd0b3b0c9a8b5494ec503eb49e83ba0cb0b1f3fb86f52825259fe20ba7f2ca376bc4afe4e4ede4a73169dacb1452f64d1a541b82823dfc859213f4cad94109470fe3a3dc8b9c4da75f95f5fa452cf709927e4d0e29b00cbdad79a8dd47ffe9e95f4963d68d3083f5374954c0ccc096a0a", 0xcd, 0x101}, {&(0x7f0000001dc0)="ab548a0ffd3feca527f1db46590fbd18d5f77b6dc901c4938d2612f0811d2e0994b4b3ddb3e490919caa012f20c3e54eaf4f4e3c5b84c22fac83c664375ccf6a649fbf78920c7c2bb06ea4bf6163a0e80bdfad525f70176b188a3cefc9eed590b6f13c354fb337fd08944e9eca2601b966a038340059160e25", 0x79, 0x100000001}], 0x2001000, &(0x7f0000001ec0)={[{@jdev={'jdev', 0x3d, './file0/file0'}, 0x2c}, {@noattrs='noattrs', 0x2c}, {@data_ordered='data=ordered', 0x2c}, {@tails_off='tails=off', 0x2c}, {@barrier_flush='barrier=flush', 0x2c}, {@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation', 0x2c}, {@balloc_border='block-allocator=border', 0x2c}, {@balloc_test4='block-allocator=test4', 0x2c}, {@grpjquota='grpjquota', 0x2c}]}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001f80)=@assoc_value={0x0}, &(0x7f0000001fc0)=0x8) setsockopt$ax25_int(r0, 0x101, 0x7, &(0x7f0000002000)=0x2, 0x4) r5 = msgget(0x3, 0x1) msgctl$IPC_RMID(r5, 0x0) setxattr(&(0x7f0000002040)='./file0\x00', &(0x7f0000002080)=@random={'os2.', 'selinux\\%\x00'}, &(0x7f00000020c0)=']{eth0bdev^procmime_type\x00', 0x19, 0x3) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000002100)={0x7, 0x9, 0x6, 'queue1\x00', 0x80000001}) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f00000021c0)={0x1, 0x28, 0x9, 0x7fffffff, 0x1, 0x2}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000002200)={0x7f, 0x3fff8000000, 0x3ff}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000022c0)={0x7, &(0x7f0000002280)=[{}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000002300)={r6, 0x1}) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000002340)={0x0, 0x20}) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000002380)={r4, 0xfffffffffffffffa}, &(0x7f00000023c0)=0x8) ioctl$TCSETS(r0, 0x5402, &(0x7f0000002400)={0x10000, 0x7, 0x20, 0x9, 0xc2e, 0x8, 0x4, 0x7, 0xec7, 0x28de, 0x1, 0x401}) 2018/04/20 09:34:14 executing program 1: r0 = getpgrp(0x0) r1 = getpid() setpgid(r0, r1) sched_getscheduler(r0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x500, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e24, @multicast1=0xe0000001}, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18, r4, 0xc, 0x70bd29, 0x25dfdbfc, {0xb}, [@IPVS_CMD_ATTR_SERVICE={0x4, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x8011}) getsockname$packet(r2, &(0x7f0000004340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000004380)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000043c0)={@mcast2={0xff, 0x2, [], 0x1}, 0x5e, r5}) sendmsg(r2, &(0x7f00000047c0)={0x0, 0x0, &(0x7f0000004600)=[{&(0x7f0000004400)="8a27a63cbae52f37c2a8b04160d78d695faa7c020fbf2eb35e54d146344ac99357dc30e31fc4b520fe6738714ffe33d27e5aa0a1cf5690a29b895e270c230df28727e7e4c33bdb05f1bd29c7eb120c18069776b40813117ea29d", 0x5a}, {&(0x7f0000004480)="cf806a3b82ec2eab7198bf2e3ce395ae369abc55e45b6a105141e8ea00e74fd6065a8b9e0d6990d514f74f77032f58dec74e3f908c43accdacd4cd2efeacd34db11579ad093f91f60c2f7fc8931ac0c4404c2a0ac1a03d85d0656e020b376f80bbcc5fec0b788e14b03a39a4627fb66d5b75a3a0ac9cd889cfdffc9b434e0adc3088928c00b4e10de67bc0ca", 0x8c}, {&(0x7f0000004540)="013b9459ced3e601744d476f2e10313fcc593f5f4bd7f0a4f471deb120937c87a99c67b1960993755be2c8f1cf82201baface27add680aec51c67b10d6244bbb64dd925027a6799f5cd8c544c8f07024752806b98985a03d28b3e1c962d27f814379d3292c61578dd70ecfd10de841f04b3f64af7e5e40c0e12efe15138d29ede20150c50986d2c707d7242619a98b3cce02ef343e2f8752cbf99d37ac", 0x9d}], 0x3, &(0x7f0000004640)=[{0x30, 0x110, 0x2, "afb72c131a5d4781c6fc2219dfbcd6bf6ac6c8289e2f6b030d9f41d669"}, {0x30, 0x114, 0x80000001, "d20f189c071f37c996b9d2d9c967a90b45e1dc3a6c5a1957f3f44080398a"}, {0x100, 0x1, 0x6, "5fba2bc98454e89624d0299f26239ca1444dbec75e1820fb4735b3086bc9dab30e3c56af8ff923713995dfad3674ca0fd6e038e0415c95dfb665f28393da15b85533ac6f253a269d4828c58062d1ace416e962ee80bae4a2ec47ba117fb800b5956a235d87d807d80371bb344a6b6d0407377b78abf7c8e70c0738745183b788fdca91f4fe09d091f131ab17f219dd08bcc3f0ed2dc972e2fa33164c1959606203ab269cd9471711c3ae1e002207bd8a27f39b502dda48135be19a8471898a49fc0173f308180c1a7148b10f2e32e5544d7472dad9a640cc0e90dc1fab12ec5327651b400c20808feccc09a9d4f2"}], 0x160, 0x40000}, 0x41) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3) r6 = getpgrp(r1) socket$inet_sctp(0x2, 0x1, 0x84) accept$packet(r2, &(0x7f0000004800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000004840)=0x14) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000004880)={0xd67, 0x0, 0x1, 0x9}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f00000048c0)={0x5, r7}) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000004900)) sync() r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004940)='/dev/hwrng\x00', 0x80, 0x0) r9 = accept4$bt_l2cap(r8, &(0x7f0000004980), &(0x7f00000049c0)=0xe, 0x80000) unlinkat(r2, &(0x7f0000004a00)='./file0\x00', 0x200) read(r9, &(0x7f0000004a40)=""/90, 0x5a) ptrace$pokeuser(0x6, r6, 0x200, 0xfffffffffffffffb) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r8, 0x84, 0x7, &(0x7f0000004ac0)={0x3}, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000004b00)={0x81, 0xc, 0x2, 0x3, 0x0}, &(0x7f0000004b40)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000004b80)={r10, 0x9, 0x0, 0x3, 0x8, 0xa4}, &(0x7f0000004bc0)=0x14) nanosleep(&(0x7f0000004c00)={0x77359400}, 0x0) 2018/04/20 09:34:14 executing program 4: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00005ec000)={0x0, 0x0}) bind$unix(r0, &(0x7f0000000040)=@file={0x1, "131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f2f66696c653000"}, 0x6e) 2018/04/20 09:34:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000847f95), &(0x7f0000000040)}, 0x18) 2018/04/20 09:34:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="3000000010000108000000000000000000000000", @ANYBLOB="000000000000000008000d0000008a0008001b0000000000"], 0x2}, 0x1}, 0x0) 2018/04/20 09:34:14 executing program 6: syzkaller login: [ 45.185774] ip (3751) used greatest stack depth: 54688 bytes left [ 45.210356] ip (3753) used greatest stack depth: 54672 bytes left [ 45.910951] ip (3814) used greatest stack depth: 54408 bytes left [ 46.595756] ip (3884) used greatest stack depth: 54200 bytes left [ 46.810420] ip (3901) used greatest stack depth: 53960 bytes left [ 46.821597] ip (3903) used greatest stack depth: 53656 bytes left [ 47.137354] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.143857] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.164256] device bridge_slave_0 entered promiscuous mode [ 47.177957] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.184451] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.216256] device bridge_slave_0 entered promiscuous mode [ 47.236947] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.243427] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.265140] device bridge_slave_0 entered promiscuous mode [ 47.284452] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.290982] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.308151] device bridge_slave_0 entered promiscuous mode [ 47.326346] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.332824] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.341952] device bridge_slave_0 entered promiscuous mode [ 47.355123] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.361623] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.377394] device bridge_slave_0 entered promiscuous mode [ 47.394677] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.401205] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.424441] device bridge_slave_1 entered promiscuous mode [ 47.445688] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.452221] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.477957] device bridge_slave_1 entered promiscuous mode [ 47.484958] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.491525] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.514167] device bridge_slave_1 entered promiscuous mode [ 47.524375] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.530891] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.560019] device bridge_slave_1 entered promiscuous mode [ 47.566592] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.573142] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.599945] device bridge_slave_0 entered promiscuous mode [ 47.620615] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.627156] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.655193] device bridge_slave_1 entered promiscuous mode [ 47.664486] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.673578] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.680116] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.708010] device bridge_slave_0 entered promiscuous mode [ 47.726126] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.732645] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.758009] device bridge_slave_1 entered promiscuous mode [ 47.767891] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.774349] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.793994] device bridge_slave_1 entered promiscuous mode [ 47.803733] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.813745] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.821781] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.834548] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.849553] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.890589] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.897122] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.949939] device bridge_slave_1 entered promiscuous mode [ 47.958897] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.016022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.025937] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.054933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.063397] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.073994] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.122109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.213161] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.264324] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.312927] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.847158] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.950107] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.064516] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.091212] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.127306] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.167372] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.178898] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.235702] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.274253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.283255] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.328834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.337600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.374304] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.459348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.482774] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.541510] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.113750] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.196171] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.321965] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.337839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.360624] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.384963] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.445109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.460501] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.542707] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.555463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.570464] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.585515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.600822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.633228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.642552] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.654252] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.665648] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.672792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.686756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.739421] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.746776] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.760397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.789353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.827797] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.843289] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.853530] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.865098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.903359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.922944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.938790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.954187] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.966890] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.974787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.996904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.006254] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.013459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.027017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.055598] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.065504] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.074504] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.082108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.109645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.138295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.170859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.193760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.208945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.217428] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.237829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.267796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.292011] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.300287] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.307985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.315957] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.329331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.364015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.388971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.406000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.425919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.448238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.461625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.470769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.521190] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.528644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.544206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.266194] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.272763] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.279690] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.286377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.307236] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.315124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.517730] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.524230] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.531138] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.537600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.548443] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.564115] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.570581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.577428] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.583868] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.600719] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.610528] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.616985] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.623814] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.630268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.663933] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.685688] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.692199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.699127] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.705603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.749145] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.837010] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.843554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.850440] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.856910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.906784] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.932503] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.938986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.945875] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.952336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.999529] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.021543] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.028103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.034923] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.041382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.093739] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.368729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.386714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.417180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.447220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.468257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.477303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.485378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.894440] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.139558] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.162225] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.327285] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.608848] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.645313] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.684019] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.690463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.703993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.780454] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.871085] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.928108] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.934480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.951574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.019171] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.025476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.036651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.168122] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.177177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.192001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.433110] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.441382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.457784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.496684] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.507304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.550594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.695194] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.701553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.716711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.756548] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.766355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.778179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.714716] mmap: syz-executor0 (5672) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/20 09:34:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x21) connect$inet6(r0, &(0x7f0000002fe4)={0xa}, 0x1c) write(r0, &(0x7f0000000080)="83f1ac0b0e856b58945246db14130f80b9844267404b2e13b58e3757538448393ff47a21342dddf2d64f593a0e1ea8fb7795189430f37b63", 0x38) 2018/04/20 09:34:42 executing program 5: 2018/04/20 09:34:42 executing program 4: 2018/04/20 09:34:42 executing program 2: 2018/04/20 09:34:42 executing program 6: 2018/04/20 09:34:42 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='j', 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) close(r0) 2018/04/20 09:34:42 executing program 7: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) r0 = eventfd(0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={"73737ab0", "1af836a2"}, 0x8) 2018/04/20 09:34:42 executing program 3: [ 70.768282] dccp_invalid_packet: invalid packet type 2018/04/20 09:34:42 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000540)={{}, 0x0, 0x0, 0x6}) [ 70.811421] dccp_invalid_packet: invalid packet type 2018/04/20 09:34:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000100)={"6608007465720000010000000000000000000000050053c400"}, &(0x7f0000000340)=0x24) 2018/04/20 09:34:42 executing program 6: r0 = open(&(0x7f0000011000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) fallocate(r0, 0x0, 0x0, 0xb40) mincore(&(0x7f0000004000/0x3000)=nil, 0x3000, &(0x7f0000000040)) 2018/04/20 09:34:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="6e65742f6465765f6d63617374004ba8c0ddf609ee6f8bf3e5fe89311610e7929b1d92750d58c39ccd8893c9fe54945c3d3038caee802cebf5e01f0dfa23ddf97df5c58d") preadv(r0, &(0x7f0000000200)=[{&(0x7f00000017c0)=""/93, 0x5d}], 0x1000000000000111, 0x0) 2018/04/20 09:34:42 executing program 3: r0 = getpgrp(0x0) r1 = getpid() setpgid(r0, r1) sched_getscheduler(r0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x500, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e24, @multicast1=0xe0000001}, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18, r4, 0xc, 0x70bd29, 0x25dfdbfc, {0xb}, [@IPVS_CMD_ATTR_SERVICE={0x4, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x8011}) getsockname$packet(r2, &(0x7f0000004340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000004380)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000043c0)={@mcast2={0xff, 0x2, [], 0x1}, 0x5e, r5}) sendmsg(r2, &(0x7f00000047c0)={0x0, 0x0, &(0x7f0000004600)=[{&(0x7f0000004400)="8a27a63cbae52f37c2a8b04160d78d695faa7c020fbf2eb35e54d146344ac99357dc30e31fc4b520fe6738714ffe33d27e5aa0a1cf5690a29b895e270c230df28727e7e4c33bdb05f1bd29c7eb120c18069776b40813117ea29d", 0x5a}, {&(0x7f0000004480)="cf806a3b82ec2eab7198bf2e3ce395ae369abc55e45b6a105141e8ea00e74fd6065a8b9e0d6990d514f74f77032f58dec74e3f908c43accdacd4cd2efeacd34db11579ad093f91f60c2f7fc8931ac0c4404c2a0ac1a03d85d0656e020b376f80bbcc5fec0b788e14b03a39a4627fb66d5b75a3a0ac9cd889cfdffc9b434e0adc3088928c00b4e10de67bc0ca", 0x8c}, {&(0x7f0000004540)="013b9459ced3e601744d476f2e10313fcc593f5f4bd7f0a4f471deb120937c87a99c67b1960993755be2c8f1cf82201baface27add680aec51c67b10d6244bbb64dd925027a6799f5cd8c544c8f07024752806b98985a03d28b3e1c962d27f814379d3292c61578dd70ecfd10de841f04b3f64af7e5e40c0e12efe15138d29ede20150c50986d2c707d7242619a98b3cce02ef343e2f8752cbf99d37ac", 0x9d}], 0x3, &(0x7f0000004640)=[{0x30, 0x110, 0x2, "afb72c131a5d4781c6fc2219dfbcd6bf6ac6c8289e2f6b030d9f41d669"}, {0x30, 0x114, 0x80000001, "d20f189c071f37c996b9d2d9c967a90b45e1dc3a6c5a1957f3f44080398a"}, {0x100, 0x1, 0x6, "5fba2bc98454e89624d0299f26239ca1444dbec75e1820fb4735b3086bc9dab30e3c56af8ff923713995dfad3674ca0fd6e038e0415c95dfb665f28393da15b85533ac6f253a269d4828c58062d1ace416e962ee80bae4a2ec47ba117fb800b5956a235d87d807d80371bb344a6b6d0407377b78abf7c8e70c0738745183b788fdca91f4fe09d091f131ab17f219dd08bcc3f0ed2dc972e2fa33164c1959606203ab269cd9471711c3ae1e002207bd8a27f39b502dda48135be19a8471898a49fc0173f308180c1a7148b10f2e32e5544d7472dad9a640cc0e90dc1fab12ec5327651b400c20808feccc09a9d4f2"}], 0x160, 0x40000}, 0x41) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3) r6 = getpgrp(r1) socket$inet_sctp(0x2, 0x1, 0x84) accept$packet(r2, &(0x7f0000004800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000004840)=0x14) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000004880)={0xd67, 0x0, 0x1, 0x9}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f00000048c0)={0x5, r7}) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000004900)) sync() r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004940)='/dev/hwrng\x00', 0x80, 0x0) r9 = accept4$bt_l2cap(r8, &(0x7f0000004980), &(0x7f00000049c0)=0xe, 0x80000) unlinkat(r2, &(0x7f0000004a00)='./file0\x00', 0x200) read(r9, &(0x7f0000004a40)=""/90, 0x5a) ptrace$pokeuser(0x6, r6, 0x200, 0xfffffffffffffffb) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r8, 0x84, 0x7, &(0x7f0000004ac0)={0x3}, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000004b00)={0x81, 0xc, 0x2, 0x3, 0x0}, &(0x7f0000004b40)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000004b80)={r10, 0x9, 0x0, 0x3, 0x8, 0xa4}, &(0x7f0000004bc0)=0x14) nanosleep(&(0x7f0000004c00)={0x77359400}, 0x0) 2018/04/20 09:34:42 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x80000010) sendfile(r1, r2, &(0x7f0000000000)=0x1, 0x5ab8) 2018/04/20 09:34:43 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000140)) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) recvmmsg(r0, &(0x7f000000f000)=[{{&(0x7f0000f5f000)=@l2, 0x80, &(0x7f0000b94fd0)=[{&(0x7f00002cffa5)=""/91, 0x5b}, {&(0x7f0000714000)=""/4096, 0x1000}, {&(0x7f0000272000)=""/187, 0xbb}, {&(0x7f0000543fa0)=""/96, 0x60}, {&(0x7f0000080f80)=""/128, 0x80}], 0x5, &(0x7f0000f9f000)=""/40, 0x28}}], 0x1, 0x0, &(0x7f00004e6000)={0x77359400}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'sit0\x00', {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) getpeername$inet6(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) truncate(&(0x7f0000000000)='./file0\x00', 0x6) 2018/04/20 09:34:43 executing program 1: shmget(0x2, 0x13000, 0x220, &(0x7f0000ab6000/0x13000)=nil) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) connect$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x1, 0x2, 0x7, 0x9, 0x4, "ad5411aa66e684853c10a1c2968b19673dd736922b11aca3edf6cdbbabeca00822e76cbda886df5457a345d1c47f71af9017ae84eb2ef6ce4738b7573147de", 0x37}, 0x60) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ac7000/0x2000)=nil) r1 = shmget(0x0, 0x3000, 0x7c000241, &(0x7f000029a000/0x3000)=nil) shmctl$IPC_RMID(r1, 0x0) unshare(0xc000000) 2018/04/20 09:34:43 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$packet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000280)=0x14) connect$rds(r0, &(0x7f00000001c0)={0x2, 0x4e22, @multicast2=0xe0000002}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000200)) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000180)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x2, [@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}]}, 0x18) 2018/04/20 09:34:43 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xfffffffffffffd86, &(0x7f000000d379)={&(0x7f0000000040)=ANY=[@ANYBLOB="20000000c6a52dc07533ed2991592fc5320001030000000007ffffffcc00000004000200", @ANYRES32=0x0], 0x2}, 0x1}, 0x1) 2018/04/20 09:34:43 executing program 7: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000000c0)="24000000210025f0071c0165fffffc2102000016ffec000182a9000c08000a3a0496529d", 0x24) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x10000, 0x246943) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000040)={0x8, 0x257800000000000, 0x7, 0x1, 0xfff, 0x1ff}) socket$alg(0x26, 0x5, 0x0) 2018/04/20 09:34:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040)=0xfffffffffffffff9, 0x4) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x200) listen(r1, 0x400) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, &(0x7f0000000000), 0x200000102000001) 2018/04/20 09:34:43 executing program 2: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000febffc), &(0x7f0000009ffc)=0xd0099b8b71e877c7) 2018/04/20 09:34:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(blowfish)\x00'}, 0x5c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d179f250e6e238e7734cab32b5d63eeb6920d8be3c165a8f17e8a56ef0a4b9aa1c26c6c620e7d86d0aeb6a23dca6bf5500a86ea26afd12ab9944dce3b75492578121a2c5cdd4b16a09a110a9497b5162724abf93c8370dc9ecfd575ee423332034b1945ce39c218671228a4f38fc", 0x6e) r1 = socket$inet(0x2, 0x80002, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0x98, "f761ef48b7026ab91f9e649e3cc0b22af7b9531572b5d41d0e81884a0a86681133a8847b4edadf903f51ffdd0b64e743ebf8cdf0e22c6b1581327ea88416998926681d98a60ebfebb8de539d24994a1c9b8e74d01f34a1c65c48eef2c2a2bac01a66c3a4235a5cb389b85c2c2c73b1d64e8a125866c405b83eb97b25eec5b741c42cc66331d7e0d7f5c5e0daef95617222d773c29b192713"}, &(0x7f0000000040)=0xa0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000300)={r2, 0x7c, "497ce299367f9d877d7107d9f0f8608d69030c984cae3e77dcfdbd2eb3c007cbebe132fc45bee0944e343b354d400771b96856af43368227b87571a553495459a4eab5cc462ffe8f1181db3f1a1797a7d4634858e54999ba73e904730614edaa6f34e475adad821f179c7cf5b8ca5e96a13001c2d04e0dcc16128025"}, &(0x7f0000000080)=0x84) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000004880)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="dd34f184f0904e92", 0x8}], 0x1, &(0x7f0000000100)}], 0x1, 0x0) 2018/04/20 09:34:43 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000001c0)={@rc={0x1f, {0x5, 0x75c0, 0x1, 0x9, 0x2, 0x80}, 0x4}, {&(0x7f0000000140)=""/68, 0x44}, &(0x7f0000000040), 0x8}, 0xa0) write$cgroup_pid(r1, &(0x7f0000000040), 0xd69164d6) 2018/04/20 09:34:43 executing program 1: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x8, {{0xa, 0x4e20, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x1}}}, 0x88) getsockopt$packet_int(r0, 0x107, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x2f) 2018/04/20 09:34:43 executing program 2: socketpair(0x0, 0x7, 0x5, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x7, 0x100000001, 0x1, 0x7, 0x113e, 0x2, 0x5, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r2, 0x9, 0x1, [0xffffffffffff4a2f]}, 0xa) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000200)={0x6, &(0x7f00000001c0)=[{}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000001240)={r4, &(0x7f0000000240)=""/4096}) connect$inet6(r3, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0), 0x10) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000000)={0x6, [0x0, 0x200, 0x80, 0x6, 0x401, 0x7]}, &(0x7f0000000040)=0x10) 2018/04/20 09:34:43 executing program 7: mmap(&(0x7f0000000000/0x24e000)=nil, 0x24e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000080)) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000180)={'veth1_to_bridge\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}}) waitid(0x0, 0x0, &(0x7f0000002ff9), 0x0, 0x0) 2018/04/20 09:34:43 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000002f80)="6976611adf5998ca9a79b2d9961ec2a7d2b5c6fd8ccbc0897f6a25a111ba2d3ea167c453d87e919f44bbdc737957f69130cc1bde3f1a59f965ac64cad513b58fd5a3ca07bf2f24f184956c46b19bb9879523693d2979a15254cc846356d1da56d71fcf040d0cb65ef7ea41ef22e6a6d13a9c9e311fe819a5620e24a6fbc764cdf3129e027a206dea67ae8a142372b1ad", 0x90}], 0x1}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) recvmsg(r1, &(0x7f0000001700)={&(0x7f0000001440)=@in={0x0, 0x0, @remote}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000001f80)=""/4096, 0x1000}], 0x1, &(0x7f0000001600)=""/193, 0xc1}, 0x0) 2018/04/20 09:34:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_matches\x00') syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40202) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x40011, r0, 0x0) sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000040)) 2018/04/20 09:34:43 executing program 0: r0 = memfd_create(&(0x7f0000000380)="3f32669c120bef064750da221113b7666a49bf2df92721c581", 0x0) r1 = syz_open_dev$sndseq(&(0x7f000092e000)='/dev/snd/seq\x00', 0x0, 0x2000a) r2 = dup2(r1, r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=@setlink={0x20, 0x13}, 0x20}, 0x1}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r2, &(0x7f0000000040), 0x30c) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000080)={0x233}) 2018/04/20 09:34:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f00000000c0)={0x100000001, 0xd0, "d28a8d53f1477e61d8917783d7f8b32f002816438ea8024f21b4767554f90535161f33a1f5240d78c57b4771aa9561b7406a58f1509e9575f76387ce7413c52e594aa034b0d0c1df653d8858e05cd0fae1dcf58f7fb329f3855457f3e6a944f6a3f7f82f6841de3544f72b1f948d6a63588c18e2680f9b536d48e6734f2c4c0bb54365c5b9a807e1ba21e1fb80d3d7019a1ca43835e460a06e2a561405903e26fd795eba05cf9c4b7306d52174ce23d92bceb852fd4f4f8e28164bb882a45287b276e8ab8aaa7e46011712ab7d29fb03"}) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa00ff08004500001b000000000001907800000000ffffffff0d00907800000000000000000000000000000000b3d864e73e4a0f53a861e968e548a251f4e890580e8c568843ad53cb8538d3977acb4dcbd45cfccaf502004a8eedebcc5e919fda9a14ac5569d74c2f3dd55dfc942845e45aad9be5c1493b192c83e8e1c107d870"], &(0x7f0000ea3000)) 2018/04/20 09:34:44 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = creat(&(0x7f0000000000)='/\x00', 0x80) readlinkat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/232, 0xe8) sendto(r0, &(0x7f0000000180)="d42e376c6d66a269eadf145323a24e90a87adb8e7a67236335012f7b7fbd00292b060b0573567477d3c150b1bdc34b18829b7064801f113712436fe3729ea1f846a288234066d4ae6a558bcd069f0a17615873092b3827022965349d7152e3cc4d34127cd73501f36664fa02575e731744e31f6e3d0c1c3f70fe", 0x7a, 0x80, &(0x7f0000000200)=@in={0x2, 0x4e22}, 0x80) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x65, &(0x7f0000e2efd4)=[@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}], 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'ip6tnl0\x00', 0x1}) 2018/04/20 09:34:44 executing program 3: r0 = socket(0x1e, 0x4, 0x0) setsockopt(r0, 0x10f, 0x80, &(0x7f0000000000)="00210300", 0x4) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, {0x1, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x4e22, @broadcast=0xffffffff}, 'ip6tnl0\x00'}) 2018/04/20 09:34:44 executing program 7: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) getsockopt$bt_hci(r0, 0x107, 0xf, &(0x7f0000000200)=""/25, &(0x7f0000000240)=0x19) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e21, 0x3ff, @dev={0xfe, 0x80, [], 0x17}, 0x1ff}}, 0x1011, 0x2, 0x777, 0x0, 0x20}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0xb0e4}, 0x8) 2018/04/20 09:34:44 executing program 0: pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x80800) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000340), &(0x7f0000000380)=0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xfc, 0x7f, 0xb}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000234000)={r1, &(0x7f0000000500)="fa94484cb0b277638959d43f7be4506811d66ec42dd42008773289c542db8ea79b54694d9200c1ea837d5b84552fbcbe121dcb470b4d02f93f0ce99996205450d45f0a105574aadea8bfab4ee3d426b52a5f32a0986a210ac6b4ba2cd5ffcf7396676cd45b508e776550b8e3c0b8472497d0f01f1173a2bd36397a838d6acbbe57b6bc3f06baeaf64070ab377b8cfcd296a3293f74ae60a302d1320a5d0c28b0f9ff35be26d8cbe36b00000000", &(0x7f0000000400)="1419968af279c58c0dc28149072b3cfad04ecb69d63a47f2f73fe7b84f43f785", 0x2}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040)="6f0c25f9b1bb626111380477b0f2623c10022e899fc3451254a1793f143304a443be7bda1d055a89a1978fe6216f3b9d7a912e26d1f032381304a8f964493562e11704e74ea54de522b1917ed43fb15fc213c2", &(0x7f00000000c0)="fdcdedf049c4ed1e6a683fcd86ee2500c45930d907b1b48eb2d3871c1e5641c3515da874e0b87413a8cb7790015ad8afbaa1968527f6c916d9a94eb311a7ac3e215f6eea78c430adf4d2902da308798adcd7e68c2db4c43662b49ca56d340124720d09c7a14d27b23dc5697c996e21386e15b6e8ef3c0d078401fa3330b01a1a647e2d727beda16383df42147e6caab87de94ba03a961197a62aa39df9f69c1330131a39944451396260a4e34229332f04ae750ce71e0bc59a98c525c4b49b8b"}, 0x20) fstatfs(r1, &(0x7f0000000200)=""/247) bind$bt_l2cap(r0, &(0x7f00000003c0)={0x1f, 0x3, {0x6c9b, 0x8, 0xbc, 0x765d, 0xfffffffffffffffc}, 0x3, 0x7fffffff}, 0xe) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000001c0)={0x9}) 2018/04/20 09:34:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx\x00'}, 0x58) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0xa30074fbe39330f9) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000080)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000), 0x0) r2 = accept$alg(r0, 0x0, 0x0) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) sendmsg$alg(r2, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000967000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/20 09:34:44 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x0, 0x0) set_mempolicy(0x0, &(0x7f0000000080), 0x1616) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffff) 2018/04/20 09:34:44 executing program 6: r0 = perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffefffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fgetxattr(r0, &(0x7f00000000c0)=@known='system.posix_acl_default\x00', &(0x7f0000000100), 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x20) readv(r1, &(0x7f0000000100), 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000080)={{0x80000000, 0x6, 0x81, 0x5, 0x4, 0xf8}, 0x9, 0x4, 0x4}) 2018/04/20 09:34:44 executing program 2: unshare(0x1fffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)={0x3}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f00000000c0)={0x6, 0x6, 0x5, 0x7fffffff}, 0x10) r2 = getpgrp(0xffffffffffffffff) ptrace$setopts(0x4206, r2, 0x6, 0x41) 2018/04/20 09:34:44 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x3f0000000003, &(0x7f0000000100), 0x0) getrandom(&(0x7f0000000200)=""/218, 0x336, 0x0) 2018/04/20 09:34:44 executing program 3: unshare(0x400) r0 = socket$inet_tcp(0x2, 0x1, 0x0) write(r0, &(0x7f00000001c0)="feee99d502a7fe60bb3a90460693844171fa622ccaa411eba87a179614e7d384aa49b527f2774ca7d01f595fd74753fde09e4e7e3c928d2cb65e450e0e91720584fe377f24463d2cc331ecb14600ac77a01bdb16aed148b77ff74c7fde2ef1ff10f469d62f452dc6944b93df8fe5e5046e427dab6f64c17d90c885bb92f7f72d9c2909c4a959f48126ccd6bf99c088e6be71b44d100a845091d52f57117ac6936cd04666ea02", 0xa6) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x306, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}}, 0x10, {0x2, 0x4e20, @rand_addr=0x800000000000000}, 'ip6_vti0\x00'}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x408000, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000140)={r0}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$TIOCGPGRP(r3, 0x40096102, &(0x7f0000000180)) fcntl$setsig(r0, 0xa, 0x6) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000340), &(0x7f0000000380)=0x4) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100)=0xf8, 0x4) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f00000003c0)=0x9) 2018/04/20 09:34:44 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x8000000101) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x40033, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000080)=0xfffffffffffffffd) r1 = memfd_create(&(0x7f0000000000)='/dev/snd/timer\x00', 0x1) ioctl$VT_WAITACTIVE(r1, 0x5607) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x867) bind$ax25(r1, &(0x7f0000000940)={0x3, {"c8a39dac78bfd4"}, 0x20}, 0x10) 2018/04/20 09:34:44 executing program 7: unshare(0x40600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_int(r1, 0x1, 0x26, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCCONS(r0, 0x541d) 2018/04/20 09:34:44 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) fsync(r0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000012000)=0x3fe, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000eb3fe0)=[@in={0x2, 0x0, @local={0xac, 0x14, 0x0, 0xaa}}, @in={0x2, 0x0, @broadcast=0xffffffff}], 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x65, &(0x7f0000000080)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14}}], 0x10) 2018/04/20 09:34:44 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000dc5000)='/dev/hwrng\x00', 0x0, 0x0) unshare(0x400) fchmod(r0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x7f, 0x7}) 2018/04/20 09:34:44 executing program 6: r0 = socket$inet(0x15, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798007439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a36dca30d55e4fda59435fe1fd4262d165a6ccb3f75372e1842ce015e10aad2f3479389f8ec7abe08a38776073709fb20b39b17e9fec21147cdd6390442436826385cb97f04dadc3393024b97b203b3e121d3c67c593ee9f0787a405a1d3ec1935bee8a24cb2123e4a0b98b88796b1311ea4c0dc94e61fcf4a1090f4c360818abd0dd134ae391fe99cf200991798d0cc90367c4ee08ae49075dd74dad19937e51e0812cefa80333d3ad38d5cf07a63513") setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000100)=[{0x10}, {0x10, 0x114}], 0x20}, 0x0) [ 72.670850] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app 2018/04/20 09:34:44 executing program 2: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)='ns\x00') exit(0x0) mknodat(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r2, 0x4, 0x401}, 0x3) [ 72.721987] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app 2018/04/20 09:34:44 executing program 3: mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)={0xa0000013}) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x80) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000000c0)) 2018/04/20 09:34:44 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x8}], 0xbc) 2018/04/20 09:34:44 executing program 7: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x9, 0xfffffffffffffff8, 0x9, 0x800, 0x6, 0x486, 0x1, 0x2, 0x5, 0x3b6, 0x5, 0xfffffffffffffff8}) syz_emit_ethernet(0x36, &(0x7f0000aeb000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14}, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, {[@timestamp={0x44, 0xc, 0x7, 0x1, 0x0, [{}, {}]}]}}, @icmp=@address_reply={0x12}}}}}, &(0x7f0000aebfe8)={0x1, 0x0, [0xf65, 0x3fffffffffffffc]}) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040)={0x81}, 0x2) 2018/04/20 09:34:44 executing program 1: r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x47, 0x4) r1 = socket(0x1000000012, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f0000000500)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000019003d0500000000000000000a00000000000000000000000c0009000800004f18f9a52faa4e0be9fe2e31170a108ecf1e82a4723c46434e783c5ec6966d543162c902045e849b200aac2a98295216ca98be769e4b1c74c5904eb447175e5ea021a008a428465aecc0cfd0790e417853605d78bdc3e8c237bcf99e35f0b2a7282ef2668f8fa3282cd0b9cf8953c4cfed002d41ad4f5b20547986ee9f417b07469da553baaef2193a8f884ce2f5f56a2c55528d0f6e60b493", @ANYRES32=0x0], 0x28}, 0x1}, 0x0) setsockopt$inet_buf(r1, 0x0, 0x11, &(0x7f0000000280)="bd1e09625c0457888accc820b95e1f84139fda54a524d36e17cd694160b66bbe49a2a731bf3610a1acac94ba4a7e47e8c5614a935116293c116ff7638d5c58313f62f4e8fb0fd0dfa3985becc5e1f7e0b1884ab392ee51e4e2f05a9af5859e6bb41edf5e0075999291cc2246eeeb53d3fad5819ce31adef880fd3b433b7473c9f4ce0f2bf4ac70ebd2ca07b92f5e37d9e9ad2366e4d6e66705918d6d4c442e37f436fdc7316ccffc5b917b1f9870329dd070cf89a1188db88c3d3b1f81f8e32bc4a8f43a7b27d5d83d8028540d65896d4934c70adc8a7fd0700799c01ddd2638a8b28e396fe61385", 0xe8) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) accept$alg(r1, 0x0, 0x0) getpeername$inet6(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000180)=0x1c) write$binfmt_script(r2, &(0x7f0000000380)={'#! ', './file0', [{0x20, '('}, {0x20, 'mime_type'}], 0xa, "f6278b4f3313d1b6bb"}, 0x20) inotify_init1(0x800) 2018/04/20 09:34:45 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r1}, 0x8) 2018/04/20 09:34:45 executing program 6: r0 = socket$inet(0x15, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798007439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a36dca30d55e4fda59435fe1fd4262d165a6ccb3f75372e1842ce015e10aad2f3479389f8ec7abe08a38776073709fb20b39b17e9fec21147cdd6390442436826385cb97f04dadc3393024b97b203b3e121d3c67c593ee9f0787a405a1d3ec1935bee8a24cb2123e4a0b98b88796b1311ea4c0dc94e61fcf4a1090f4c360818abd0dd134ae391fe99cf200991798d0cc90367c4ee08ae49075dd74dad19937e51e0812cefa80333d3ad38d5cf07a63513") setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000100)=[{0x10}, {0x10, 0x114}], 0x20}, 0x0) 2018/04/20 09:34:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xff6f}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x4b4, &(0x7f00001a7f05)=""/251}, 0x48) eventfd2(0xffffffffffffffbd, 0x80800) 2018/04/20 09:34:45 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) accept$packet(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x14) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) ioctl$EVIOCGLED(r1, 0x4004510f, &(0x7f0000000040)) 2018/04/20 09:34:45 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) unshare(0x8000400) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r0, 0x28, &(0x7f0000000680)}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000080)={0x6, 0x3f, 0x48d, 'queue0\x00', 0x6}) 2018/04/20 09:34:45 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x8001, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) mmap(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x3, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000048000/0x1000)=nil, 0x1000, 0x6, 0x31, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000000c0)='-\x00', 0xffffffffffffffff) r2 = add_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001000)="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", 0x1000, 0xffffffffffffffff) r3 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000200)='/dev/rfkill\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000240)={r1, r2, r3}, &(0x7f0000000280)=""/198, 0xc6, 0x0) futex(&(0x7f000000cffc)=0x4, 0x10080000000000b, 0x4, &(0x7f0000000ff0)={0x0, 0x1c9c380}, &(0x7f0000048ffc), 0x0) 2018/04/20 09:34:45 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc\x00', 0x40002, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000004c0)={0x1, 0x0, [{0x100000, 0x43, &(0x7f0000000440)=""/67}]}) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000280)={0x5, {{0xa, 0x4e21, 0x7, @mcast1={0xff, 0x1, [], 0x1}, 0x3}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff01000091d200000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff0100000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x190) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0xfffffffffffffff7, 0x9, 0xbe84}, {0x2, 0x8, 0x20000000000000, 0x1f}]}, 0x10) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000880)=0x2, 0x4) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @dev}, &(0x7f0000000680)=0xc) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000006c0)={@empty, @loopback={0x0, 0x1}, @loopback={0x0, 0x1}, 0x4, 0x26, 0xffffffffffff7a4c, 0x100, 0x8, 0x0, r2}) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8001, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000007c0)='fou\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000580)={0xffffffffffffffe1, 0x2, 'client0\x00', 0xffffffff80000001, "822928167779323b", "ed68d6015be68490e30dae8dd8c077fd5c3398e3297bf9c7a772dda13bd8c6e1", 0x3, 0x3}) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, r4, 0x10a, 0x70bd2b, 0x25dfdbfb, {0x2}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040000) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x9, {{0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xe43}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff0100000000000000fffffffc0000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000014a9e6e65e3229117656d659c7b50e5899d8c2a752d56ad33cb409a287967704"], 0x90) bind$bt_l2cap(r3, &(0x7f0000000240)={0x1f, 0x3, {0x100000001, 0x4, 0x1, 0xfff, 0x7, 0x8}, 0x4, 0x8}, 0xe) mq_notify(r3, &(0x7f0000000140)={0x0, 0xe, 0x1, @thr={&(0x7f0000000740)="660bb6e016b0cfe1d5c3def80e5ce1147504844f7dd212a9a3b769af9e29e22bc8c74560a7dfeab4139a10542ee927a3070d8ed65fb2f5c5c7f96114a42d417acff1b64038bba05b94538626358b05bb282814a05c8051ccbc07876df576a7c6f70b9054c3058d16186470e7a0d577", &(0x7f0000000800)="b09259b5637192c405297fc285b8ee44625beebbe86e8b964c16abf8fa8016ebcac90aac73ab9b6c4f47b14dc27919f38956ce0c84cfef37a342c2d90a7937f56853cfe3d0336b0ad08558f849fe18c1e1f69196607af59d747377a4fa26fbb3d10af4dc1b2da1b18b2d49"}}) 2018/04/20 09:34:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000ddfffc)=0x1, 0x374) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f00000dd000)=0x1, 0x4) connect$inet(r0, &(0x7f0000d9dff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='bridge0\x00', 0x10) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000004c0)}, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) 2018/04/20 09:34:45 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x4001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x14}, @generic={0x1, 0x8, 0x8000000}, @ldst={0x0, 0x3, 0x2, 0x2, 0x3, 0x0, 0x5}], &(0x7f0000000100)='syzkaller\x00', 0x1fa, 0x50, &(0x7f0000000280)=""/80, 0x41000, 0x1}, 0x48) r2 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f00000000c0)={'irlan0\x00', 0x81}) write(r1, &(0x7f0000000180), 0x0) bind$nfc_llcp(r0, &(0x7f0000000180)={0x27, 0x1, 0x2, 0x1, 0x6, 0x2, "986a3b24a1c4c896ec83c1d7baad4e717f6035c8cf04b086ce09b12644e264df2be56e83820eff08ea759d4b5c2e74adc5a4aa847425f3ed7c55bf4589f283", 0x33}, 0x60) 2018/04/20 09:34:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x88200, 0x10) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) prctl$void(0x1) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x20000, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)=0x4) 2018/04/20 09:34:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000ddfffc)=0x1, 0x374) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f00000dd000)=0x1, 0x4) connect$inet(r0, &(0x7f0000d9dff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='bridge0\x00', 0x10) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000004c0)}, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) 2018/04/20 09:34:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000f97000)={@multicast1=0xe0000001, @loopback=0x7f000001}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000000180)=""/67, 0x43}, {&(0x7f0000000200)=""/235, 0xeb}], 0x2) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={r2, @in={{0x2, 0x4e21, @loopback=0x7f000001}}, 0x9}, &(0x7f0000000080)=0x90) 2018/04/20 09:34:46 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) fcntl$setstatus(r0, 0x4, 0x40c00) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='ns/user\x00') ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f00000000c0)={&(0x7f0000ffd000/0x1000)=nil, 0x7, 0x1, 0x8, &(0x7f0000ffb000/0x4000)=nil, 0x6}) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000280)=""/202, 0xca}], 0x1) 2018/04/20 09:34:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xec, "a6b3ca95b616cb6ed6b5443f55c025162e4fd694be4880892d2f65d9cc19bd949161ba82de1ae8efe03045576c0ceef69eae9de09144c38bff509b11a6a0f15f51ec8fcce22c878704739b6781c465bbb771057cc8bd19c1c69e99f4250daadf11340aa14c10768b30008124399b6914f33f94640322ec0646d812307f1ef2016e44342fc745255d041cfbda77466176e8241f9c9156f6e34460c6bb778daae21a8f271c01dd569ca3a0ac2f99c1dcd36734030725f3507f1805a9ff25c0bfe5d4a41f30790c8e61f70db487f35688945b8edf7a7aca42b5f8c43288c5100152ddab01dabc665ab6cfdf3454"}, &(0x7f0000000140)=0xf4) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000180)=r1, 0x4) lstat(&(0x7f0000000300)='./f-0e0\x00', &(0x7f0000000380)) 2018/04/20 09:34:46 executing program 2: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r1 = dup3(0xffffffffffffffff, r0, 0x80000) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000380)={0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) syz_mount_image$iso9660(&(0x7f00000003c0)='iso9660\x00', &(0x7f0000000400)='./file0\x00', 0xc04, 0x0, &(0x7f0000000440), 0x1000, &(0x7f0000000480)={[{@gid={'gid', 0x3d, [0x3a87587b11f3a41, 0x78, 0x37, 0x3d]}, 0x2c}]}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x3) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, r3, 0x800, 0x70bd26, 0x25dfdbff, {0x1}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x38}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x880) r4 = syz_open_dev$sndtimer(&(0x7f0000c19000)='/dev/snd/timer\x00', 0x0, 0x1ffe) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) 2018/04/20 09:34:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000000c0), 0x2) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x42b, {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e23, @multicast1=0xe0000001}, {0x2, 0x4e23}, 0x40, 0x3, 0x7, 0x1, 0x4, 0x0, 0x7, 0x4, 0x100}) sendmmsg$alg(r1, &(0x7f0000003400)=[{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000001880)="9d258f3438eb7506a78a7b26e9b2f3512ea5d33733696cbfc704d0de54ab2f2faefaaa213598437dde5f0a520f873fecf56876b8e5def06979dfeea80ed698feaf", 0x41}, {&(0x7f0000001a00)="2777f7c0e7c7fed8fe1a16bca06bb1ebc6bd107452e6b03e8bae4ccec4caefdd38bdcfb20e72a1832b0a99ff5fd231ca214088272957435e0c557ccc363af6b8dcca", 0x42}, {&(0x7f0000001b40)="a2807add5500047e357d80ee5560fe9c2483d5cdc0e63744cb727a585fa781a55fa04657633d026c1f99369aff94335759063e082e8b1510b31956c32eda89f1045a289cb927ddf6cbb0", 0x4a}, {&(0x7f0000001c40)="8a34ec9c34bda4dc516138a1e5c30ef1c55715f5bc54695cfce0675df2655b86e91859d2eac6c879ec7fba870b6d911ae07e9df7d61680bd7ab70f527c0d522d2691b00155e3aaf075fba10e498d389946c272d5b6b1508980fb3f4d31073ef2af8be0056b4bc8d058e3a060fa03a8cdef79d6", 0x73}], 0x4, &(0x7f0000001d40), 0x0, 0x800}], 0x1, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x3f, 0x2000) ioctl$TCXONC(r3, 0x540a, 0x400) 2018/04/20 09:34:47 executing program 5: r0 = memfd_create(&(0x7f0000000080)="7d7d9574686f5e707230630100000400001e0070ff6f630ff8", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffd, "7175657565310000000000000000000000001200"}) ioctl$KDSETLED(r0, 0x4b32, 0x8) close(r2) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000001c0)) socket$inet6_sctp(0xa, 0x5, 0x84) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote={{}, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, @tick, {}, {0x0, 0x1ad5}, @result}}}], 0xffffff00) r3 = msgget(0x3, 0x80) msgctl$MSG_STAT(r3, 0xb, &(0x7f00000002c0)=""/219) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000027fb0)={0x203, @time={0x77359400}}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000240), &(0x7f0000000280)=0x4) clock_gettime(0x0, &(0x7f0000000180)) socket$inet6_sctp(0xa, 0x1, 0x84) 2018/04/20 09:34:47 executing program 1: pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) unlinkat(r0, &(0x7f0000000280)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x103000, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x3, 0x9c, [], 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f00000000c0)=""/156}, &(0x7f0000000200)=0x78) r2 = open(&(0x7f0000448000)='./file0\x00', 0x80040, 0x0) r3 = open$dir(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) fcntl$setlease(r2, 0x400, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x0) 2018/04/20 09:34:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x7, @loopback={0x0, 0x1}, 0x5}], 0xffffffffffffffe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="5c025e3917f03c9f", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000eb3ff8)={r1}, &(0x7f0000940000)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={r2}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r3, 0x2}, &(0x7f0000000100)=0x8) 2018/04/20 09:34:47 executing program 7: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, &(0x7f00000000c0), &(0x7f0000000040)=0x4) 2018/04/20 09:34:47 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x200000000301006, 0x0) getpgid(0x0) sendfile(r1, r0, 0x0, 0x1) tkill(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2000, 0x0) 2018/04/20 09:34:47 executing program 6: unshare(0x2040600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setsig(r0, 0xa, 0x41) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)) ioctl$TUNSETLINK(r1, 0x400454cd, 0x333) 2018/04/20 09:34:47 executing program 2: r0 = socket$inet(0x2, 0x9, 0x6) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in={{0x2, 0x0, @loopback=0x7f000001}}, 0x0, 0x3, 0x0, "568ba1532d9fa4a4a0b2ac7fed1ba5df6183c56aab4b149a87b45ecde423213c30734da7de0daefc4f85152077b0196e06e5a1d95840e8dc7eb18f5f2781abadec7c9d4ef97335343396d95c6c3a63db"}, 0xd8) sendto$inet(r0, &(0x7f0000e9bf14), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x1000000000004e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7009aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4000000000000", 0x7a, 0x51, &(0x7f0000e66000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000180)="ea", 0x1, 0x0, &(0x7f0000000340)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/20 09:34:47 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00006cdfa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000), 0x0) 2018/04/20 09:34:47 executing program 5: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) ptrace$setregset(0x4205, r0, 0x2, &(0x7f0000000140)={&(0x7f00000001c0)="e8cf14172d15715a9ecbf8dac41595f866739d71a67a6a552f3b8f68e1a9ba03000788ac2caa632b2bd315e8c39960258055e1c508bf10bd849c2d0270c277f00c6d38eb8594bfaa6e1aaf8f64e7bd5e335f240016580267cc2e28561730b36314e1dccaca596acb447db42c1897b3c9c6578c843bad5ccde28ab17ef8dc225deb61e0ada4394702da32b0f700ba728eaed0ab76521b9229da965dfe465269a1c00b86b349370ef80f9f45bf053d998350c632cc421c0c4b955ea09334005075770ad994bf4511d62a724981c65179ff3eebfa484b238dff21827cf05d987cbc491a449bbb5e7c03478b3b0723faaaf4", 0xf0}) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}], 0x10) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2200, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000100), 0x0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x0, @loopback=0x7f000001}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x0, @loopback=0x7f000001}], 0x10) 2018/04/20 09:34:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = gettid() fcntl$setown(r0, 0x8, r1) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0x8000d3) r2 = socket$netlink(0x10, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x2, 0x5, 0x74d, 0x3}, 0x10) socketpair$inet6(0xa, 0x6, 0xad9, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x14f5805f}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000280)={r4, 0xc2, "81ccf68ace1b228add4e1d13804e82432e7242d73b52ac66f7f88f9b207e6a4dbd937c6ba0eebd1aba46cc9f08b39aa5b56920ee345140c53f88cc1b20b5739dc4a65ae4081f8326a13360be947206d6e4426a4655ef009fd17652b56caa1a1ee2d346388843d77f9aba71c83d4b70cba5da65400c881de1ef53351ad29c7aa77d74ac55cc9f6866303703caea3ade93df01d9ffa7a77895345c9f7793874317b07a112e73f18b8285cac30594863cac70e3e0fee9b551b2c0e3a02a545a91976262"}, &(0x7f0000000380)=0xca) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8082, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r5, 0x6430) 2018/04/20 09:34:47 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/mls\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1000000000001, 0xa, 0xff, 0xffffffdf00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), &(0x7f0000000100), 0x2}, 0x300) write$sndseq(r0, &(0x7f00000002c0)=[{0x8, 0x9, 0x3, 0x7ff, @time, {0xdd0e, 0xffffffffffffffff}, {0x7, 0x8a27}, @raw32={[0x3, 0x3c, 0xff]}}, {0x1000, 0x1, 0x1a62af11, 0x1, @tick=0x2, {0x3, 0x10001}, {0x7, 0xc9}, @connect={{0xc17, 0x8}, {0x9, 0x2}}}, {0x6, 0x6bb9, 0x56e, 0x8, @tick=0x8, {0xfd8c, 0x79}, {0x3, 0x9}, @queue={0xa95a, {0x3d41, 0x8}}}, {0x80000001, 0x80000001, 0x1, 0x2, @time={0x0, 0x989680}, {0x400, 0x8}, {0x6, 0x9ca}, @control={0xff, 0x7fff, 0x3}}, {0x5, 0x100000000000000, 0x37, 0x7, @tick=0x200, {0x6, 0x3}, {0x4, 0x9}, @queue={0x803, {0xfffffffffffffffc, 0x1}}}, {0x1, 0x100000001, 0xab0c, 0x80, @time={0x0, 0x989680}, {0xd37, 0x3ff}, {0x7, 0x71}, @control={0x4, 0x9433, 0xff80000000000000}}, {0x1f, 0x200, 0x800, 0x26, @tick=0x7, {0x1, 0xffffffff7fffffff}, {0x400, 0xcd1}, @queue={0x0, {0x7, 0x24}}}, {0x7, 0x3f, 0xfffffffffffffff9, 0x100, @tick=0x6, {0x7, 0x9}, {0x200, 0xfffffffffffffffe}, @time=@time={0x77359400}}, {0x0, 0x1, 0x4bd, 0x0, @time={0x0, 0x1c9c380}, {0xee7, 0x7ff}, {}, @quote={{0x7, 0x7fff}, 0x2, &(0x7f00000000c0)={0x96, 0xffffffffffffff01, 0x2, 0x8, @tick=0x1, {0xcba, 0x800}, {0x1, 0x10001}, @quote={{0x2}, 0x3, &(0x7f0000000080)={0x6, 0x100000001, 0x1, 0x4, @time={0x77359400}, {0x800, 0x5}, {0x6d7e, 0x101}, @time=@time={0x0, 0x1c9c380}}}}}}, {0x850a, 0x6, 0x4, 0x6, @time, {0x401, 0x1}, {0x3, 0xffffffff}, @ext={0x1a, &(0x7f0000000280)="ffd09cba7fd98cc0198ce9c073dc854cf5f3c84859d5c7f59ffb"}}], 0x1e0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f00000004c0)=""/80, &(0x7f0000000540)=0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f0000000080), &(0x7f0000000180)=""/231}, 0x18) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000580)={0x4, @random="b09b7855bd47"}) 2018/04/20 09:34:47 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000046000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000014000/0x3000)=nil) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x1}) 2018/04/20 09:34:47 executing program 6: clone(0x40108001, &(0x7f0000000100)="ef5e390ed09bfcd1e9aa7ec52ad1448a0f00000000516e34030a142313afd09f00000000000000", &(0x7f0000000140), &(0x7f0000002a00), &(0x7f0000000180)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x6) 2018/04/20 09:34:47 executing program 0: r0 = memfd_create(&(0x7f0000000040)='+trusted%procnodevcgroupmd5sum\x00', 0x1) getsockname$llc(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) futex(&(0x7f0000000000), 0x85, 0x0, &(0x7f0000003ff0), &(0x7f0000000000), 0x0) 2018/04/20 09:34:47 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x3) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$poke(0x5, r1, &(0x7f0000000040), 0x6) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in={{0x2, 0x0, @loopback=0x7f000001}}, 0x0, 0x3, 0x0, "568ba1532d9fa4a4a0b2ac7fed1ba5df6183c56aab4b149a87b45ecde423213c30734da7de0daefc4f85152077b0196e06e5a1d95840e8dc7eb18f5f2781abadec7c9d4ef97335343396d95c6c3a63db"}, 0xd8) sendto$inet(r0, &(0x7f0000e9bf14), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc994", 0x5c, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) 2018/04/20 09:34:47 executing program 3: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000040)="3f88", 0x2, 0xfffffffffffffffd) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000140)=""/171) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@remote, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) 2018/04/20 09:34:47 executing program 7: msync(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x7) socket$bt_bnep(0x1f, 0x3, 0x4) 2018/04/20 09:34:47 executing program 5: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000080)=@ethernet, &(0x7f0000000100)=0x80, 0x800) sendto$inet6(r0, &(0x7f0000000140)="6058dab915c2f6af7299cc246682883256caf82d7fdef197bd54cd9d602c087dd046c5ee7002c520f92292a3ab953022a2f13b93ef113ea9d5c96c84b6b78570705bd88bdb98bc9f9acd816555019363266a25745d1e63a7a56fb88d18d883b17232c1ad9dcb9100f442d7fab243f1e2586adad750fd7a1224735bcc445760f386d3fe23524dabda5770b7e58f17aedf4ab804b4139fdd6189b387dbaef8813b8650f5fe30d22a976455c1581a44852a829927f8ecec80ea5c7a68cc2e9bb57d91e33efe69c0175576", 0xc9, 0x800, 0x0, 0x0) accept(r0, &(0x7f0000000280)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000300)=0x80) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000f80), 0xc) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000240)=0x5, 0x4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/20 09:34:47 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x400) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080)={0x6, 0x80}, 0x2) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000580)={@ipv4={[], [], @broadcast}, 0x0}, &(0x7f00000005c0)=0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x5}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000340)={r4, @in6={{0xa, 0x4e20, 0xffffffffffff7fff, @mcast1={0xff, 0x1, [], 0x1}, 0x7fff}}, 0x6, 0xe7, 0x9, 0xffffffffffffc831, 0x1b}, 0x98) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000680)={{{@in6, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e21, 0x9, 0x4e20, 0x0, 0x2, 0x80, 0x20, 0x3b, r2, r3}, {0x7f, 0x1000, 0xfffffffffffffff8, 0xb0, 0x6, 0x3, 0x0, 0x40}, {0x100000001, 0x3, 0x3ff, 0xe140}, 0x1, 0x6e6bba, 0x0, 0x1, 0x3, 0x3}, {{@in=@broadcast=0xffffffff, 0x4d4, 0x6c}, 0xa, @in6=@loopback={0x0, 0x1}, 0x0, 0x3, 0x3, 0x1, 0x1, 0x20, 0x808000000000}}, 0xe8) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1400000000000000290000004300000003040000"], 0x14}}], 0x2, 0x0) r5 = getpgrp(0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r5, 0xd344, &(0x7f0000000240)=""/204) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x81}, &(0x7f0000000100)=0xc) 2018/04/20 09:34:47 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x9}, &(0x7f0000000200)=0x8) fchdir(r0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x9, 0x6) write$cgroup_pid(r2, &(0x7f0000000100)=ANY=[], 0x1023c) fallocate(r2, 0x3, 0xffff, 0x47) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000140)) r4 = getegid() chown(&(0x7f0000000000)='./file0\x00', r3, r4) fallocate(r2, 0x3, 0x0, 0xffff) 2018/04/20 09:34:47 executing program 6: clone(0x40108001, &(0x7f0000000100)="ef5e390ed09bfcd1e9aa7ec52ad1448a0f00000000516e34030a142313afd09f00000000000000", &(0x7f0000000140), &(0x7f0000002a00), &(0x7f0000000180)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x6) 2018/04/20 09:34:47 executing program 4: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='wchan\x00') exit(0x0) sendfile(r1, r1, &(0x7f0000000040)=0x2, 0xbde) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/61) 2018/04/20 09:34:47 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffdfffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000080)={0x77359400}, 0x8) 2018/04/20 09:34:47 executing program 3: r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) write(r0, &(0x7f0000d86000)='#!\t', 0x3) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000e56000), &(0x7f00000000c0)=[&(0x7f0000000100)="00befbad9fe0139c11f5006e671d000000000000060804000000ff371dfa629b06f997a6b61fdad8954b2011eeab9070f03a62ea43ced3a093497ded27e1aedb079caf22a8b8fb1f14dd6785c4a698e086d6697b5bafd3c14fc6701feb459f17ae92ff31ee8a48f444414509a205d6deb2ada075046e5f566358733c9ba76a4072aa68662aebe4"], 0xfff) 2018/04/20 09:34:47 executing program 0: r0 = socket(0x10, 0x2000000000802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="48000000150001002bbd7000000000000a0000ff", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}, 0x1}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2288003}, 0x39, &(0x7f00000004c0)={&(0x7f0000000480)=@getnetconf={0x14, 0x52, 0x400, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1de}, 0x1, 0x0, 0x0, 0x400c000}, 0x4000) 2018/04/20 09:34:47 executing program 5: r0 = gettid() r1 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000080)) r2 = syz_open_procfs(r0, &(0x7f0000000000)='wchan\x00') sendfile(r2, r2, &(0x7f0000000040), 0xdd47) lseek(r2, 0x4000000000000, 0x0) [ 76.025702] ================================================================== [ 76.033229] BUG: KMSAN: uninit-value in __save_stack_trace+0x76f/0xa80 [ 76.039933] CPU: 1 PID: 6157 Comm: syz-executor5 Not tainted 4.16.0+ #84 [ 76.046768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.056117] Call Trace: [ 76.058712] dump_stack+0x185/0x1d0 [ 76.062352] ? __save_stack_trace+0x76f/0xa80 [ 76.066845] kmsan_report+0x142/0x240 [ 76.070655] __msan_warning_32+0x6c/0xb0 [ 76.074725] __save_stack_trace+0x76f/0xa80 [ 76.079055] ? kmsan_internal_chain_origin+0x12b/0x210 [ 76.084343] ? kmsan_set_origin+0x9e/0x160 [ 76.088594] ? kmsan_internal_poison_shadow+0x14e/0x1b0 [ 76.093960] ? kmsan_internal_chain_origin+0x12b/0x210 [ 76.099250] save_stack_trace+0xa5/0xf0 [ 76.103233] ? do_splice_direct+0x335/0x540 [ 76.108098] kmsan_internal_chain_origin+0x12b/0x210 [ 76.113214] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 76.118673] ? kmsan_set_origin_inline+0x6b/0x120 [ 76.123524] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 76.128986] ? seq_putc+0xf4/0x1d0 [ 76.132534] ? proc_pid_wchan+0x19b/0x250 [ 76.136685] ? __msan_poison_alloca+0x15c/0x1d0 [ 76.141361] ? seq_read+0xc7d/0x2260 [ 76.145078] ? get_pid_task+0x3b/0x190 [ 76.148967] kmsan_memcpy_origins+0x11d/0x170 [ 76.153464] kmsan_copy_to_user+0x132/0x160 [ 76.157787] seq_read+0x1cc9/0x2260 [ 76.161431] do_iter_read+0x880/0xd70 [ 76.165243] ? seq_open+0x360/0x360 [ 76.168870] vfs_readv+0x1ec/0x260 [ 76.172423] default_file_splice_read+0xa9a/0x1120 [ 76.177373] ? SYSC_tee+0x13d0/0x13d0 [ 76.181176] splice_direct_to_actor+0x4c6/0x1040 [ 76.185932] ? do_splice_direct+0x540/0x540 [ 76.190258] ? security_file_permission+0x28f/0x4b0 [ 76.195277] ? rw_verify_area+0x35e/0x580 [ 76.199427] do_splice_direct+0x335/0x540 [ 76.203578] do_sendfile+0x1067/0x1e40 [ 76.207478] SYSC_sendfile64+0x1b3/0x300 [ 76.211544] SyS_sendfile64+0x64/0x90 [ 76.215343] do_syscall_64+0x309/0x430 [ 76.219231] ? SYSC_sendfile+0x320/0x320 [ 76.223294] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 76.228482] RIP: 0033:0x455379 [ 76.231664] RSP: 002b:00007fb5baedac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 76.239374] RAX: ffffffffffffffda RBX: 00007fb5baedb6d4 RCX: 0000000000455379 [ 76.246650] RDX: 0000000020000040 RSI: 0000000000000013 RDI: 0000000000000013 [ 76.253922] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 76.261190] R10: 000000000000dd47 R11: 0000000000000246 R12: 00000000ffffffff [ 76.268463] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000000 [ 76.275735] [ 76.277355] Local variable description: ----counter@memcg_kmem_charge_memcg [ 76.284441] Variable was created at: [ 76.288170] memcg_kmem_charge_memcg+0x85/0x280 [ 76.292847] new_slab+0x487/0x1bb0 [ 76.296379] ================================================================== [ 76.303727] Disabling lock debugging due to kernel taint [ 76.309224] Kernel panic - not syncing: panic_on_warn set ... [ 76.309224] [ 76.316595] CPU: 1 PID: 6157 Comm: syz-executor5 Tainted: G B 4.16.0+ #84 [ 76.324730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.334083] Call Trace: [ 76.336686] dump_stack+0x185/0x1d0 [ 76.340321] panic+0x39d/0x940 [ 76.343537] ? __save_stack_trace+0x76f/0xa80 [ 76.348037] kmsan_report+0x238/0x240 [ 76.351841] __msan_warning_32+0x6c/0xb0 [ 76.355910] __save_stack_trace+0x76f/0xa80 [ 76.360340] ? kmsan_internal_chain_origin+0x12b/0x210 [ 76.365623] ? kmsan_set_origin+0x9e/0x160 [ 76.369869] ? kmsan_internal_poison_shadow+0x14e/0x1b0 [ 76.375230] ? kmsan_internal_chain_origin+0x12b/0x210 [ 76.380513] save_stack_trace+0xa5/0xf0 [ 76.384489] ? do_splice_direct+0x335/0x540 [ 76.388813] kmsan_internal_chain_origin+0x12b/0x210 [ 76.393928] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 76.399383] ? kmsan_set_origin_inline+0x6b/0x120 [ 76.404233] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 76.409707] ? seq_putc+0xf4/0x1d0 [ 76.413257] ? proc_pid_wchan+0x19b/0x250 [ 76.417404] ? __msan_poison_alloca+0x15c/0x1d0 [ 76.422072] ? seq_read+0xc7d/0x2260 [ 76.425788] ? get_pid_task+0x3b/0x190 [ 76.429680] kmsan_memcpy_origins+0x11d/0x170 [ 76.434179] kmsan_copy_to_user+0x132/0x160 [ 76.438513] seq_read+0x1cc9/0x2260 [ 76.442151] do_iter_read+0x880/0xd70 [ 76.445960] ? seq_open+0x360/0x360 [ 76.449589] vfs_readv+0x1ec/0x260 [ 76.453138] default_file_splice_read+0xa9a/0x1120 [ 76.458091] ? SYSC_tee+0x13d0/0x13d0 [ 76.461892] splice_direct_to_actor+0x4c6/0x1040 [ 76.466660] ? do_splice_direct+0x540/0x540 [ 76.470986] ? security_file_permission+0x28f/0x4b0 [ 76.476010] ? rw_verify_area+0x35e/0x580 [ 76.480167] do_splice_direct+0x335/0x540 [ 76.484323] do_sendfile+0x1067/0x1e40 [ 76.488232] SYSC_sendfile64+0x1b3/0x300 [ 76.492301] SyS_sendfile64+0x64/0x90 [ 76.496107] do_syscall_64+0x309/0x430 [ 76.500000] ? SYSC_sendfile+0x320/0x320 [ 76.504069] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 76.509256] RIP: 0033:0x455379 [ 76.512439] RSP: 002b:00007fb5baedac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 76.520151] RAX: ffffffffffffffda RBX: 00007fb5baedb6d4 RCX: 0000000000455379 [ 76.527422] RDX: 0000000020000040 RSI: 0000000000000013 RDI: 0000000000000013 [ 76.534691] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 76.541962] R10: 000000000000dd47 R11: 0000000000000246 R12: 00000000ffffffff [ 76.549230] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000000 [ 76.557040] Dumping ftrace buffer: [ 76.560576] (ftrace buffer empty) [ 76.564263] Kernel Offset: disabled [ 76.567871] Rebooting in 86400 seconds..