[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 29.552927] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 29.886874] random: sshd: uninitialized urandom read (32 bytes read) [ 30.171277] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 31.429759] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.36' (ECDSA) to the list of known hosts. [ 36.952178] random: sshd: uninitialized urandom read (32 bytes read) 2018/05/24 09:40:24 fuzzer started 2018/05/24 09:40:24 dialing manager at 10.128.0.26:46257 [ 60.081070] can: request_module (can-proto-0) failed. [ 60.091686] can: request_module (can-proto-0) failed. 2018/05/24 09:40:48 kcov=true, comps=false 2018/05/24 09:40:55 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1103, 0x0, 0x38, 0x0, 0x0, 0x0, 0x2}}, 0x38) 2018/05/24 09:40:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f00000001c0)=""/215, 0xd7, 0x0, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x40000000a, &(0x7f0000000100)=0x7, 0x4) sendto$inet(r0, &(0x7f0000000180)="13", 0x1, 0x87fd, &(0x7f0000000040)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2018/05/24 09:40:55 executing program 3: chdir(&(0x7f0000000780)='./file0\x00') symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') chdir(&(0x7f0000000140)='./file0\x00') 2018/05/24 09:40:55 executing program 7: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x9) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 2018/05/24 09:40:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) readv(r0, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/101, 0x65}, {&(0x7f0000000540)=""/101, 0x65}], 0x3a) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='hybla\x00', 0x6) recvmsg(r0, &(0x7f0000001c00)={&(0x7f00000019c0)=@hci, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001a80)=""/80, 0x50}], 0x1, &(0x7f0000001b40)=""/150, 0x96}, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="17", 0x1}], 0x1) 2018/05/24 09:40:55 executing program 5: r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/uts\x00') 2018/05/24 09:40:55 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 2018/05/24 09:40:55 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") semget(0x1, 0x0, 0x0) [ 69.017283] IPVS: ftp: loaded support on port[0] = 21 [ 69.049181] IPVS: ftp: loaded support on port[0] = 21 [ 69.074673] IPVS: ftp: loaded support on port[0] = 21 [ 69.081376] IPVS: ftp: loaded support on port[0] = 21 [ 69.108877] IPVS: ftp: loaded support on port[0] = 21 [ 69.122279] IPVS: ftp: loaded support on port[0] = 21 [ 69.122629] IPVS: ftp: loaded support on port[0] = 21 [ 69.147742] IPVS: ftp: loaded support on port[0] = 21 [ 70.844775] ip (4701) used greatest stack depth: 54520 bytes left [ 71.124991] ip (4723) used greatest stack depth: 54424 bytes left [ 71.628369] ip (4765) used greatest stack depth: 54040 bytes left [ 72.341874] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.348392] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.376571] device bridge_slave_0 entered promiscuous mode [ 72.421755] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.428318] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.464260] device bridge_slave_0 entered promiscuous mode [ 72.497745] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.504238] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.536898] device bridge_slave_0 entered promiscuous mode [ 72.558511] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.565023] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.591251] device bridge_slave_0 entered promiscuous mode [ 72.608433] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.614917] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.623147] device bridge_slave_1 entered promiscuous mode [ 72.639646] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.646159] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.654959] device bridge_slave_0 entered promiscuous mode [ 72.666525] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.673099] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.683711] device bridge_slave_0 entered promiscuous mode [ 72.697120] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.703680] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.731218] device bridge_slave_0 entered promiscuous mode [ 72.756471] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.762964] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.786276] device bridge_slave_1 entered promiscuous mode [ 72.798958] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.805446] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.815676] device bridge_slave_1 entered promiscuous mode [ 72.827871] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.834395] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.844191] device bridge_slave_1 entered promiscuous mode [ 72.850642] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.857148] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.872477] device bridge_slave_0 entered promiscuous mode [ 72.884792] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.891258] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.915442] device bridge_slave_1 entered promiscuous mode [ 72.929676] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.942951] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.949408] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.970460] device bridge_slave_1 entered promiscuous mode [ 72.993958] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 73.003982] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 73.014623] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 73.022024] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.028534] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.073929] device bridge_slave_1 entered promiscuous mode [ 73.100223] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 73.112461] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.118947] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.167505] device bridge_slave_1 entered promiscuous mode [ 73.190153] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.203074] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.211720] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.219338] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.228750] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.236370] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 73.269192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 73.426803] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 73.437621] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.453213] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.673556] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.787518] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.820195] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.830924] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.857628] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.886341] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.991547] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.016230] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.032254] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 74.066814] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.107965] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.143987] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.158817] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 74.254199] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.272221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.304669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.313179] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.321129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.347174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.354256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.368894] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 74.395863] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.416595] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.423663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.433626] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.440937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.496238] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.503325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.546898] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.553937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.578525] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.590682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.603373] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.610741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.653425] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.662748] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.670568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.684995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.698119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.813779] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.820795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.882198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.889208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.980884] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.987901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.112431] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 75.119505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.174407] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.192992] team0: Port device team_slave_0 added [ 75.245166] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.253922] team0: Port device team_slave_0 added [ 75.274290] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.291487] team0: Port device team_slave_0 added [ 75.308276] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.327295] team0: Port device team_slave_0 added [ 75.349145] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.365408] team0: Port device team_slave_0 added [ 75.397958] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.428979] team0: Port device team_slave_1 added [ 75.465193] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.482983] team0: Port device team_slave_1 added [ 75.502759] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.523596] team0: Port device team_slave_0 added [ 75.535765] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.546751] team0: Port device team_slave_1 added [ 75.553912] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.575405] team0: Port device team_slave_1 added [ 75.592861] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.603017] team0: Port device team_slave_1 added [ 75.614452] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.635020] team0: Port device team_slave_0 added [ 75.648846] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.655909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.670930] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.712484] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.721858] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.729351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.738431] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.776532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.797273] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.821937] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.833819] team0: Port device team_slave_1 added [ 75.857892] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.865323] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.872307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.885400] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.903243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.924915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.941345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.948923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.961378] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.981422] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.988487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.997376] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.009703] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 76.023842] team0: Port device team_slave_1 added [ 76.047151] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.055615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.067693] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.076842] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 76.087989] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.095647] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.105570] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.113316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.156563] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.182692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.212659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.232181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.241604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.249552] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.257814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.267905] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 76.275335] team0: Port device team_slave_0 added [ 76.289746] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.314478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.322924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.336122] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.345395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 76.354361] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.363357] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.370644] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.379835] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.386990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.422551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.458437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.497853] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.521513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.530659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.538603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.546690] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.554509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.562720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.570535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.578559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.606838] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.621332] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.628700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.643574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.652180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.660617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.673788] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 76.687218] team0: Port device team_slave_1 added [ 76.694291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.703958] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.713978] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.721678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.745350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.771746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.801105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.828935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.855139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.871488] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.889832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.906228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.921495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 76.928499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.946110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.978362] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.985855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.008156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.035863] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 77.043388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.056753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.147978] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 77.155148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.168731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.247849] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 77.255621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.275736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.422666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 77.430687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.448417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.652991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 77.660433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.677111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.805596] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.812124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.818912] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.825343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.858941] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.867796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.918609] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.925085] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.931883] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.938302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.993385] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.170819] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.177285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.184084] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.190508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.219368] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.234703] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.241131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.247902] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.254304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.263458] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.279825] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.286264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.293070] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.299503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.312000] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.542640] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.549117] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.555931] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.562369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.649796] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.694461] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.700961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.707756] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.714189] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.771991] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.903396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.922255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.954617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.975745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.990338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.997681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 80.057071] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.063549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.070386] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.076839] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.139909] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 80.927644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 87.439384] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.657812] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.693663] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.838525] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.907630] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.055562] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.140488] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.263475] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.377143] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.473146] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.492642] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.661374] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.681463] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.821744] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.939533] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 89.145861] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.152259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.162744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.229849] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.236389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.251536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.271797] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.283921] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 89.290318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.322995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.423248] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.429582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.440722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.545482] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.551832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.572522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.621991] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.628553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.645783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.868376] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.880210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.896401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.022264] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.041392] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.081993] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 90.089489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.101991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.142540] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.261702] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.379290] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.448302] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.790206] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.832598] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/24 09:41:22 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') pread64(r0, &(0x7f0000003c00)=""/4096, 0x1000, 0x400000000000000) 2018/05/24 09:41:22 executing program 7: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x20) epoll_wait(r0, &(0x7f00000002c0)=[{}], 0x1, 0x0) 2018/05/24 09:41:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/05/24 09:41:22 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000540)="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") pread64(r0, &(0x7f0000000440)=""/123, 0x7b, 0x0) 2018/05/24 09:41:22 executing program 7: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') pread64(r0, &(0x7f0000003c00)=""/4096, 0x1000, 0x0) 2018/05/24 09:41:22 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='keyring', 0xfffffffffffffffc) 2018/05/24 09:41:22 executing program 4: r0 = socket(0x2, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") semop(0x0, &(0x7f00000002c0), 0x129) 2018/05/24 09:41:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) readv(r0, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/101, 0x65}, {&(0x7f0000000540)=""/101, 0x65}], 0x3a) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='hybla\x00', 0x6) recvmsg(r0, &(0x7f0000001c00)={&(0x7f00000019c0)=@hci, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001a80)=""/80, 0x50}], 0x1, &(0x7f0000001b40)=""/150, 0x96}, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="17", 0x1}], 0x1) 2018/05/24 09:41:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) readv(r0, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/101, 0x65}, {&(0x7f0000000540)=""/101, 0x65}], 0x3a) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='hybla\x00', 0x6) recvmsg(r0, &(0x7f0000001c00)={&(0x7f00000019c0)=@hci, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001a80)=""/80, 0x50}], 0x1, &(0x7f0000001b40)=""/150, 0x96}, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="17", 0x1}], 0x1) 2018/05/24 09:41:23 executing program 7: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x40, 0x54300) capget(&(0x7f00000000c0)={0x20071026, 0xffffffffffffffff}, &(0x7f0000000000)) 2018/05/24 09:41:23 executing program 3: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}], 0x10) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0x1c, &(0x7f00000001c0)="12da018226cc003f9737d6b5957ba433f56229e26448f7ec0491cc67d5149c34d67c5dd5796d53ffcc91e98915ca5673fe74eabda7cd2900e136f4b2f22b2d990d760cb23e6312ad9919645333fd5559979e39679e83987e179785aab055a0511c4b4569910615add35f9e03b5567f8ae863e6ff4793852b4dd55669c03b9a2541e59306db14e9ff0b691fa4c87a74c7ca3595880705cfbcd5f8d5208b153fe0a199b51976c221462b6fa0c712c45653bb1f5310c4a0b9c3b9404a40f916dd695ec2", 0xc2) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000080)=0x2, 0x4) getpeername$inet(r2, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10) 2018/05/24 09:41:23 executing program 0: mmap(&(0x7f0000000000/0x59000)=nil, 0x59000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000018000)=ANY=[@ANYBLOB="00bdfdff200000000004000000000000"], 0x3dc5) fsetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_default\x00', &(0x7f0000000040)='{\x00', 0x2, 0x3) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x10100, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000000c0)={'veth0_to_bond\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) 2018/05/24 09:41:23 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0)="f8f550e6", 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x2}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) read(r0, &(0x7f0000000100)=""/254, 0xfe) 2018/05/24 09:41:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000002c0)=@accept={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x3, 0x2000) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000140)=0x6, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000400)=""/244) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 2018/05/24 09:41:23 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9882, 0x400) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ip6gretap0\x00'}) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) dup2(r1, r2) 2018/05/24 09:41:23 executing program 4: r0 = syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x0, 0x42800) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000400)=""/89) mprotect(&(0x7f000041a000/0x2000)=nil, 0x2000, 0x2000004) r1 = getpgrp(0x0) r2 = gettid() r3 = semget(0x0, 0x4, 0x28) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000280)=""/238) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x2000000001, 0x0) ioctl$VHOST_GET_VRING_BASE(r4, 0xc008af12, &(0x7f0000000200)) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000000380)=0x6) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x200000, 0x0) bind$inet(r5, &(0x7f0000000180)={0x2, 0x1, @loopback=0x7f000001}, 0x10) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x1f, &(0x7f0000000240)={0x0, 0x1000000000, 0x1, 0x1000000100000000}) rt_sigtimedwait(&(0x7f00009a4000)={0xffffffffffff0001}, &(0x7f00005d8000), &(0x7f0000645000), 0x8) socket$key(0xf, 0x3, 0x2) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7, 0x2) getsockopt$inet_sctp_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockname$inet6(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, @remote}, &(0x7f00000004c0)=0x1c) rt_sigtimedwait(&(0x7f0000000000)={0xffffffffffffffc0}, 0x0, &(0x7f0000000040), 0x8) [ 96.461802] capability: warning: `syz-executor7' uses deprecated v2 capabilities in a way that may be insecure 2018/05/24 09:41:23 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x32d) r1 = dup2(r0, r0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x1c) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f00000000c0)={0x3, r2}) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0xc3adffff00000000, 0x1}}, 0x1c) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000140)=""/211) 2018/05/24 09:41:23 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0xfffffffffffffff9, 0x200) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001640)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001680)={@ipv4={[], [0xff, 0xff], @rand_addr=0x7ff}, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, 0x7, 0xfff, 0x8, 0x400, 0x80, 0x400000, r1}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="730000000000000025e9ffc10099d1009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0xa0000, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000040)=""/171, &(0x7f0000000100)=0xab) 2018/05/24 09:41:23 executing program 3: socketpair$inet(0x2, 0x5, 0x8, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYRES32=0x0, @ANYBLOB="e00000008e854737b1c7d0ac53d7cfef928540fa34b97a8f01f647be8a78fa0da2a512b10b3531271683d07c60c51d73953463c9529e2287eba00195f0636474ca2dc0dd5b63d401b02de4a9a0d71954fb77ab07fa34b5954f765705dfda3555afbb22293ec68fb4a35ea168e3a42ebd2b98c3c9e1122ae0800b8a7a4289d95081b0ee52c03fc5ea9855db15b09632571478c76cb53af816d1d6f51c4d1809a0d508b13402052ad427a1e7bc844c6e4f87b45c48ba7f8f872cfdd88c2532e265ac6ab8e1e63339135ece6d056c0bf6000000000000000000000000000000000000000000000000"], &(0x7f0000000500)=0xe8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={r1, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}, 0x0, 0x6f6b992d, 0x0, 0x5, 0x20}, &(0x7f0000000600)=0x98) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r2, 0x0, 0x0, &(0x7f0000000180)=""/72, &(0x7f0000000200)=0x48) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x1, 0x4000) connect$unix(r3, &(0x7f0000000400)=@file={0x1, './file0\x00'}, 0x6e) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x2}, 0x1c) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000000)=0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000040)=r5) setsockopt(r4, 0x0, 0x4, &(0x7f0000000100)='\x00', 0x1) openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0x240000, 0x0) fchdir(r4) getsockopt$inet6_opts(r4, 0x29, 0x39, &(0x7f0000000240)=""/217, &(0x7f0000000340)=0xd9) r6 = syz_open_dev$sndpcmp(&(0x7f0000000740)='/dev/snd/pcmC#D#p\x00', 0x3, 0x200000) setsockopt$inet_sctp6_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000140)={0x4, 0x0, 0xeb, 0xfff}, 0x8) 2018/05/24 09:41:23 executing program 1: r0 = memfd_create(&(0x7f0000000000)="a200", 0x3) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) capget(&(0x7f0000000140)={0x20071026, r1}, &(0x7f0000000180)={0x200, 0xffffffffffffffff, 0x40, 0x8001, 0x9, 0x7}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe}, 0x2c) 2018/05/24 09:41:23 executing program 7: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x80200, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{}]}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0x40086610, &(0x7f00000000c0)={0x20000000000002f0, &(0x7f00000003c0)}) setsockopt$inet6_dccp_int(r2, 0x21, 0xf, &(0x7f00000001c0)=0x8, 0x4) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x2, 0x2, 0x7f, 0x0, 0x100000001, 0xfffffffffffffff8, 0x10001, {0x0, @in6={{0xa, 0x4e22, 0xffffffffffffffa9, @mcast2={0xff, 0x2, [], 0x1}, 0x3}}, 0x80d3, 0xfff, 0x7, 0x6, 0x80000001}}, &(0x7f00000002c0)=0xb0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000300)={r4, 0x91fc, 0x3, [0x9, 0x3d, 0x10000]}, &(0x7f0000000340)=0xe) 2018/05/24 09:41:23 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x400000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) 2018/05/24 09:41:23 executing program 5: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) shmat(r0, &(0x7f0000c66000/0x4000)=nil, 0x7000) mlock2(&(0x7f0000f7b000/0x1000)=nil, 0x1000, 0x0) 2018/05/24 09:41:23 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$int_out(r1, 0x2, &(0x7f0000000000)) fgetxattr(r1, &(0x7f0000000040)=@known='user.syz\x00', &(0x7f00000000c0)=""/223, 0xdf) socket$pppoe(0x18, 0x1, 0x0) 2018/05/24 09:41:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) readv(r0, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/101, 0x65}, {&(0x7f0000000540)=""/101, 0x65}], 0x3a) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='hybla\x00', 0x6) recvmsg(r0, &(0x7f0000001c00)={&(0x7f00000019c0)=@hci, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001a80)=""/80, 0x50}], 0x1, &(0x7f0000001b40)=""/150, 0x96}, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="17", 0x1}], 0x1) 2018/05/24 09:41:24 executing program 3: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x400000000008912, &(0x7f0000000040)="c6c88c262ebf2945") setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x84) 2018/05/24 09:41:24 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0xb239, 0x8000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x8, 0x70bd2b, 0x25dfdbfd, {0x6}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x40001) r2 = socket$inet(0x2, 0x80003, 0x2) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000469ffc)=0x130, 0x4) sendto$inet(r2, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) getpeername(r0, &(0x7f00000002c0)=@in6, &(0x7f0000000340)=0x80) recvfrom$inet(r2, &(0x7f0000000000)=""/248, 0x3, 0x2000000440012000, 0x0, 0x267) 2018/05/24 09:41:24 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8dad, 0x501000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x3, 0x4) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000e80)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, &(0x7f00000009c0)}, &(0x7f0000000e00)="a3abc578291d833d71db251afaa3105ac600f18ae8926778154900e2d8a7fa47b1", &(0x7f0000000140)=""/229, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 2018/05/24 09:41:24 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2800, 0x0) getsockname$unix(r1, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_gfeatures={0x3a}}) fadvise64(r0, 0x0, 0x100, 0x2) 2018/05/24 09:41:24 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x106d}, 0x2c) r1 = socket(0xa, 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') fcntl$setlease(r0, 0x400, 0x0) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1002000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x4, 0x70bd27, 0x25dfdbfc, {0x6}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000801) ioctl(r1, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000001f1100000000000000950000000000000000000000000000"], &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x34d, &(0x7f00001a7f05)=""/251}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.events\x00', 0x0, 0x0) ioctl$TIOCMSET(r3, 0x5418, &(0x7f00000001c0)=0x8) fchdir(r1) 2018/05/24 09:41:24 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x19, &(0x7f0000311ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000001040), 0x0, 0x0, &(0x7f0000000800)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f00000000c0)=0x7, 0x4) recvfrom$inet6(r1, &(0x7f0000000000)=""/110, 0x6e, 0x2004, &(0x7f0000000140)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x6f3000) 2018/05/24 09:41:24 executing program 6: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write$sndseq(r1, &(0x7f0000458000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote={{}, 0x0, &(0x7f0000def000)={0x0, 0x0, 0x0, 0x0, @time={0x77359400}}}}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @quote={{}, 0x0, &(0x7f00008e3000)={0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @quote}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time}, {0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @quote={{}, 0x0, &(0x7f00004f8000)={0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}}}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @queue}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}], 0xff9a) recvmmsg(r0, &(0x7f0000002a00)=[{{&(0x7f0000002640)=@vsock, 0x10, &(0x7f00000028c0)=[{&(0x7f00000027c0)=""/196, 0xc4}], 0x1, &(0x7f0000002940)=""/154, 0x9a}}], 0x1, 0x0, &(0x7f0000002ac0)) getsockname$llc(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000080)={{0x7e, @multicast2=0xe0000002, 0x4e24, 0x1, 'wlc\x00', 0x2, 0x0, 0x5}, {@dev={0xac, 0x14, 0x14, 0x12}, 0x4e23, 0x2003, 0x400, 0x8, 0x2000400}}, 0x44) [ 97.818396] sd 0:0:1:0: [sg0] tag#8044 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 97.827345] sd 0:0:1:0: [sg0] tag#8044 CDB: Report aliases [ 97.833211] sd 0:0:1:0: [sg0] tag#8044 CDB[00]: a3 ab c5 78 29 1d 83 3d 71 db 25 1a fa a3 10 5a [ 97.842198] sd 0:0:1:0: [sg0] tag#8044 CDB[10]: c6 00 f1 8a e8 92 67 78 15 49 00 e2 d8 a7 fa 47 [ 97.851257] sd 0:0:1:0: [sg0] tag#8044 CDB[20]: b1 2018/05/24 09:41:24 executing program 7: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f2, &(0x7f00000000c0)={'tunl0\x00', @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) 2018/05/24 09:41:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) poll(&(0x7f0000000000)=[{r1, 0x4}, {r1, 0x1084}, {r1, 0x8000}], 0x3, 0x1ff) accept4$alg(r0, 0x0, 0x0, 0x0) 2018/05/24 09:41:24 executing program 1: r0 = socket(0x266df1aac0b81598, 0x2, 0x5) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$kcm(0x2, 0x2, 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0xc0, &(0x7f0000000140)=""/200, &(0x7f0000000440)=0xc8) sendmsg(r1, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0xffffffffffffff47, &(0x7f0000000740), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0xce}, 0xffffffffffffffff) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0x101000) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000580)={'HL\x00'}, &(0x7f00000005c0)=0x1e) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000640)={0x1, &(0x7f0000000000)=[{0x0}]}) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000480)={r3, 0x1}) ioctl$TCSETS(r2, 0x5402, &(0x7f00000003c0)={0x100000001, 0x6, 0x5, 0x2, 0x4, 0x0, 0x7f, 0x40, 0x1, 0x5, 0xfffffffffffffffd, 0x81}) sendto$inet6(r2, &(0x7f0000000500)="a67425711160ac9f2f0d9f71", 0xc, 0x8015, &(0x7f0000000540)={0xa, 0x4e22, 0x2, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x15}}, 0x5}, 0x1c) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000280)=0x4, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={0x0, 0x3}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000880)={r6, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000400)=0x0) ptrace$setregset(0x4205, r7, 0x3, &(0x7f0000000700)={&(0x7f0000000680)="7e41938cb29747154d5dc8b1ba55bcb4f584c85b5ba20638a443388bb501382095494495240e1fbad8864fbfb56bb7f07d61df64c60de865da0c1b7f6d11d2753942173c57141f94fd54caea8d9816de4143b00d881975864ed9e145418f75c8df718f8b930638", 0x67}) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x2b, @loopback=0x7f000001, 0x4e22, 0x1, 'sh\x00', 0x2, 0x0, 0xb}, 0x2c) 2018/05/24 09:41:24 executing program 6: mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, &(0x7f00002dfff8), 0x1, 0x4) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 2018/05/24 09:41:24 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, &(0x7f00000000c0)=""/188, &(0x7f0000000180)=0xffffffffffffff55) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) [ 97.993000] capability: warning: `syz-executor7' uses 32-bit capabilities (legacy support in use) 2018/05/24 09:41:25 executing program 4: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mkdir(&(0x7f000082f000)='./control\x00', 0x0) open$dir(&(0x7f0000000000)='./control\x00', 0x498181, 0x0) r1 = open(&(0x7f00002e5000)='./control\x00', 0x0, 0x0) lseek(r1, 0x8000, 0x0) 2018/05/24 09:41:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8100, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)=r2) sendmsg$key(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000001ff0)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x20004895) 2018/05/24 09:41:25 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0xfffffde6) syz_emit_ethernet(0x2a, &(0x7f0000004fb1)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @broadcast=0xffffffff, @multicast1=0xe0000001}, @udp={0x4e20, 0x4e23, 0x8}}}}}, 0x0) 2018/05/24 09:41:25 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00') linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000004c0)='./file1\x00', 0x0) getdents(r0, &(0x7f0000000100)=""/93, 0x5d) getdents(r0, &(0x7f0000000000)=""/30, 0x1e) unlinkat(r0, &(0x7f0000000200)='./file1\x00', 0x0) 2018/05/24 09:41:25 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) rt_sigpending(&(0x7f0000000180), 0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000100)={@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x18, r4}) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) dup3(r2, r0, 0x0) syz_open_pts(r2, 0x400000) 2018/05/24 09:41:25 executing program 6: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff}) tee(r2, r1, 0x1, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 2018/05/24 09:41:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0xe2201) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000040)) dup2(r3, r0) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x800) 2018/05/24 09:41:25 executing program 0: r0 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x3ff, 0x2000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f0000000380)={{0x401, 0x10000}, 'port0\x00', 0x0, 0x20, 0x6, 0xf1c, 0xffffffffffffffe0, 0xfffffffffffffff9, 0x8000, 0x0, 0x6, 0x20}) r4 = getpgid(0x0) prlimit64(r4, 0x6, &(0x7f00000004c0)={0x8, 0x3}, &(0x7f0000000500)) r5 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r6 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f0000000680)="ff9565169a4920b48f1325ab59847a7043174652ae027506c81c78115bb8228e64c7c12bc738ac3b76d2c37641d5c08ca7477a655c295c102abc2e465594c686430eb19d7220bce15ae7971f2b12b69b85", 0x51, r5) add_key(&(0x7f0000000100)='.dead\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000340)='@', 0x1, 0x0) r7 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000700)="ec828285e769a3aaa29a66097bbf15baaca9d40e331b891835cb46191bc9ef9482e25bff8425aa9d6ae743a180ff988c413037156a9dcd5616476f56a2555d69cd48c37979b9b550784a20854f5ffec2cc4f66d4913dd7be02ec7bf4", 0x5c, r2) ioctl$SG_SET_KEEP_ORPHAN(r3, 0x2287, &(0x7f0000000540)=0x3) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r7, r7, r6}, &(0x7f0000000280)=""/132, 0x84, 0x0) 2018/05/24 09:41:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x200009}, 0x8) setsockopt$packet_int(r0, 0x107, 0x1, &(0x7f0000000000)=0x3, 0x327) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x80000) 2018/05/24 09:41:25 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0xe9, &(0x7f0000000080)=""/233}, &(0x7f0000000180), &(0x7f00000001c0)=""/126, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) readv(r0, &(0x7f0000000700), 0x0) 2018/05/24 09:41:25 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80000, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) getsockopt$inet_int(r0, 0x10d, 0xae, &(0x7f00000000c0), &(0x7f0000000040)=0x35d) 2018/05/24 09:41:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000ddfffc)=0x1, 0xfe8c) ftruncate(r0, 0x5) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) finit_module(r0, &(0x7f0000000000)='\x00', 0x1) connect$inet(r0, &(0x7f0000d9dff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000004c80)=[{{0x0, 0x0, &(0x7f0000004b40), 0x218, &(0x7f0000004bc0)}}], 0x400000000000284, 0x1000000000000040) r1 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)={0x4, [0x2, 0x81e4, 0xf4, 0xc86]}, 0xc) 2018/05/24 09:41:25 executing program 4: r0 = socket(0x8, 0xa, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003b00)=[{{&(0x7f0000000180)=@hci, 0x80, &(0x7f00000039c0)=[{&(0x7f00000014c0)=""/191, 0xbf}, {&(0x7f0000002680)=""/245, 0xf5}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000003800)=""/179, 0xb3}, {&(0x7f0000000200)=""/63, 0x3f}, {&(0x7f0000001300)=""/255, 0xff}], 0x6, &(0x7f0000003a40)=""/141, 0x8d}}], 0x170, 0x0, &(0x7f0000000240)={0x77359400}) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x3f, 0x3baa80c93e08912b, 0x101, 0x7}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000100)=r1, 0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x3, 0xffffffffffffffff, 0x8, 0x6, 0xc3b, 0x8, 0x59, 0x9, r1}, 0x20) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040)=0x6, 0x4) 2018/05/24 09:41:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x88}, 0x1}, 0x0) 2018/05/24 09:41:26 executing program 6: r0 = socket(0x2000000000000005, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x3, 0x478, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000100), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'dummy0\x00', 'bcsh0\x00', 'sit0\x00', 'bridge_slave_0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x70, 0xc0, 0x110}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x9, 'syz1\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x1ff, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0xf, 0x0, 0x0, 'eql\x00', 'team_slave_0\x00', 'syzkaller0\x00', 'teql0\x00', @random="d4be885e0ef2", [], @empty, [], 0xf8, 0x130, 0x160, [@nfacct={'nfacct\x00', 0x28, {{'syz0\x00'}}}, @cluster={'cluster\x00', 0x10}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}, {{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ifb0\x00', 'teql0\x00', 'bond_slave_0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0xe0, 0x130, 0x178, [@stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @random="e9e304a0a103", [], 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}}]}, [@common=@log={'log\x00', 0x28, {{0x0, "defd0dd255b28111afb24b9d92ff62cd4d55091f84f20d5502ae6724113c"}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}]}, 0x4f0) 2018/05/24 09:41:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x9, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) lseek(r0, 0x52, 0x0) semget$private(0x0, 0x2, 0x278) write$vnet(r0, &(0x7f0000000180)={0x1, {&(0x7f00000000c0)=""/104, 0x68, &(0x7f0000000140)=""/32, 0x3, 0x2}}, 0x68) 2018/05/24 09:41:26 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80810) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000013000)=0xfffffffffffffff2) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/05/24 09:41:26 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x5) r0 = socket(0xa, 0x1, 0x2000) sendmsg$nl_crypto(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@get={0xf8, 0x13, 0x500, 0x70bd2c, 0x25dfdbfb, {{'drbg_pr_sha256\x00'}, [], [], 0x2000}, [{0x8, 0x1, 0x63e5}, {0x8, 0x1, 0x4}, {0x8, 0x1, 0x8}]}, 0xf8}, 0x1, 0x0, 0x0, 0x1}, 0x20000091) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") 2018/05/24 09:41:26 executing program 0: r0 = socket(0x11, 0x6, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x2006) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000080)=0x83d, 0x4) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0x1, 0x4, [@random="38de6baee0a5", @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="3958eb6f7a79"]}) write$tun(r1, &(0x7f0000000480)={@void, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x211, 0x0, 0x0, 0x0, 0xffffff84, 0x0, @empty, @multicast1=0xe0000001}, @igmp={0x0, 0x0, 0x0, @multicast1=0xe0000001, "5c6a3ba2e98dc2ae91592abc452ec8ea496a02e87353d15c5bcdc42b094f63dd53a538b35b5a62d4b530f7c85baeacfb5a0f2926e32de3bf2809efa98c89e7b9ee61a210e6101a7a8f8636086ae0d17985a24e19a66e33a0218fe22bef1116750bfdb0e8b704f8bbb2124c000f50dc22a0abbd5193a39081decf7207d74982f9a970784630d805b64c7b0092215e8a2b0f57c5de52b3da8ad01980eb1932f64aa4c96537a0947ca79b312e6f019f283ef1763946bc4fda0201c76160f1037a7f4b68fabd6dab10357440a86c82b83e8a5e9b5e359e364e95dbfe9f5d92a64fe4ddb9b4f65290ebaa05666649a53d73a07684344930b91f31b5d2bca478a7d8965149d6bec2937be317bc5bd155ff4db5448d644aec0d37d4dc9ac2c5d2814601f6a3e3147b64d582ee0b4b6760f9f8eda38ff3ea5af8080f5f9533423cefa236b14b5cbae9a4f2e862b374bd4123ccc10088c233b5ef03148241a9d08dc31d9c81ee5eb2f837d9c9775ced22178328d2aa58478f50026a2dbf512c92df49c4816869828ed8afa1154bc39018243028b3a4b17c03c2bf34ab2fa68e9b09679a2eee7fcc562d8429cb5229a5f389d8def6cf613f950be6f3b90ec682ad3b2b904c4d90863aa6ab58b23ee88dcb8b3d6e04ea7109f38cc40914bf3e53d837f869b8200c9c793607d7a5ee4c55966334dbbf2f18495ad0"}}}, 0x21b) 2018/05/24 09:41:26 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) shutdown(r0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000080)={0x3f, 0x7, 0x4, 'queue0\x00', 0x1}) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x4, 0x4) 2018/05/24 09:41:26 executing program 7: r0 = syz_open_dev$sndpcmc(&(0x7f000000b000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40044145, &(0x7f0000001f64)) perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x70, 0x2, 0x400, 0xffffffffffffffff, 0x100000000, 0x0, 0x80000001, 0x40100, 0x0, 0x40, 0x2, 0x7, 0x20000000, 0x3, 0x6, 0x1, 0x3ff, 0x100000000, 0xfffffffffffffbff, 0xfffffffffffffe00, 0x2, 0x4, 0x1ff, 0x7fffffff, 0xf000000000000000, 0x8, 0x9, 0x6, 0x1, 0xfff, 0x4, 0x9, 0x8, 0x2, 0x3, 0x9, 0x1, 0x0, 0xfffffffeffffffff, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x10, 0x5, 0x1, 0x3, 0x2, 0x0, 0x2}, r0, 0xa, r0, 0x0) 2018/05/24 09:41:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0xa, 0x2, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$sock_buf(r2, 0x1, 0x13, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)) r3 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f0000db4ffc)=0x214, 0x0) shutdown(r0, 0x1) sendmsg$nl_crypto(r3, &(0x7f0000484fc8)={&(0x7f0000816000)={0x10}, 0xc, &(0x7f0000c37000)={&(0x7f0000fa3000)=@get={0xe0, 0x13, 0x0, 0x0, 0x0, {{'cbc-aes-aesni\x00'}}}, 0xe0}, 0x1}, 0x0) r4 = dup3(r3, r1, 0x80000) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000280)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000008004000018010000180100001801000098030000980300009803000004000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000005802000000000000e0000002ffffffffffffffffffffff00000000000000000000000000000000000000000000000000ff0000ffffff000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000001fff70269000200090000677265746170300000000000000000006270713000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c650000000000000000000000000000000000000000000000000180c20000030000000000000000000000000000000000000000000000000000ac1414aae00000010f00000000000000ac1414bbac1414bbcdb16e61ffffff0000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000020008000100040008000176657468305f746f5f626f6e640000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000020f49a56000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000ffffffffffff0000000000000000000000000000000000000000000000000000ac1414aae000000102000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x4d0) [ 99.836321] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/24 09:41:26 executing program 7: r0 = eventfd2(0x100, 0x80801) fchmod(r0, 0xc) r1 = socket$inet(0x2, 0x3fffffffffffffff, 0x5) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x2, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200009c0], 0x0, &(0x7f0000000040), &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]}, 0x298) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000000)=@get={0x1, &(0x7f0000000100)=""/177}) 2018/05/24 09:41:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x201, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x80800) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x29146a0d, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @addr}], 0x30) write$sndseq(r1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @result}], 0x30) 2018/05/24 09:41:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet(r0, &(0x7f00006fd000)="c340", 0x2, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000540)=""/101, 0x65}], 0x1) recvmsg(r0, &(0x7f0000001c00)={&(0x7f00000019c0)=@hci, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001a80)=""/80, 0x50}], 0x1, &(0x7f0000001b40)=""/150, 0x96}, 0x2) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="17", 0x1}], 0x1) 2018/05/24 09:41:26 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000340)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000469000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000390000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000343000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)=0x0) r1 = getpgid(r0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f00000003c0)={0x0, 0x8}, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x0, 0x0, 0x10001, 0x100000000}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f00000001c0)={0x3f53, r3, 0x10001, 0x1}) r4 = syz_open_procfs(r1, &(0x7f0000000080)="e56e7669616f6e00a996a5983077eb388781dd38a4e48c2a7fa4fa5f7c77776497918a8f4ef50bbeee0686bb169556ce362bdea23ef19022202d4209a0d39e3400254a20f854c76e3bebb600a5cc4d3c07f44cbe5f7e0ea41410dcaa146faec81c4eb9daf03d299fccaa09de2706000000babb11d37b820fbd89d9abb5857386f5cb4b700b2b0258f6fb8ad2e76fa400c0834e1967297eb48191848c4de3d410c93b4646744d0a55a2cdcc13913aae") r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10200, 0x0) ioctl(r5, 0x6, &(0x7f0000000240)="27235181a27e84ebaebc1a938c1e1b1853de9734bc275ebcb26e1a201b52adb5fcc98402ef789c0bd860798747908eab5060ed111efbf342e5b44e8b2f4b0d21f69e08264dc4d00dc1624d430915b4384e10bf2e2952771ea3f0497bd42f7a4d0498f50b5d8dae883f5f9f34cc81d6ad7c7f9909c510fe8ce89c1a9dc21829ee2c932bdbc857a80adac777697e787e4f9aad5433e46471f7d40b7aaaf38bc7eeaead97afe3435786f6089ffabb826b88a0a055e0576b4d2cdfa44d6f0d9ca6b1b6787855a1d078d27b0ce9ac1f12fc3119b19307d0c43469d409f8") pread64(r4, &(0x7f0000000040)=""/12, 0x39, 0x0) ioctl$EVIOCGRAB(r4, 0x40044590, &(0x7f0000000200)=0x8) 2018/05/24 09:41:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14}}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) r1 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000340)={r2, 0x800, 0x5, [0x175, 0x5, 0x3, 0x2, 0x1000000000003]}, 0x12) 2018/05/24 09:41:27 executing program 4: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x100d2) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x19) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x200) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000140)=0x100, 0x2) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000040)="acc604470ee72951ae133c720f1e43dbc760f45e88993d9c736a416e208754a5fabdadda14a75db1bf5ae87a9f51946166d95b63af0ed1dba86ab93afeab53cc98052b6c1239558028379abd7c68942fed0e01a01418a2221396f8896aa728a8e927502fd63b67979700e892d73b78a4ad3af464c271f1e55c967b3d1338d81d2c6775c3b1162636f5a948e1933bc8080ef5cf333995313cceea887ca815392f78", 0xa1) 2018/05/24 09:41:27 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') fstat(r0, &(0x7f0000000240)) pwritev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="0cc8a4534a1a858b6e9e8a3b9fa69d3c31874271ac0cb762a36e5ac23742e9439c7d89ea2531862783f185a27d5bd9d2670031802dded691aff8e9481f2d59c9596cca4dffb05188db83f776df1f37062bf5fdc324392949d227108b320f9e2f6325db3ac32bda7169f85dbb1062a71afa2597ed7cc1e72e9dcb4383cd06b94b5cfd951eea234a1c7f8487feac10136033b435930241f9b03be5c38178da1bb73b9f4a5c8f492a5b10a214f4d8bbc6562096512e66b97b260930403f53bd0e904d4c0eb499e50ea51294ba020eccbe4f774a41c3283bd31a86fc900cca7901", 0xdf}, {&(0x7f0000000140)="5dee181893f5bd710bb2b258dc9195c7d0d8596d5fefdeadd02a042eab9b665ad0f7997d37f097e615f7ca3202afa797e0c425038dd17ff3ffdb5a699779c27f62285111ed1679f1bbbd81a241be7e9a10b894f6170365d145d9bf7fda03dcea5f35f0254c4cfb5354bcf082cf411d7c6f55c0", 0x73}, {&(0x7f00000002c0)="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", 0xff}, {&(0x7f00000001c0)="19c5f2df440b20af4de520c29fdba98af68a72fbf65c", 0x16}, {&(0x7f00000003c0)="42e05734e1de5a4e27f778caa89de33d659e88076aadeeb49ea53374bdc7a432b3e0d71fabf6c1930c33bb36fd014d6a1ec644c3c0fc23e333dcf302b2d122c2e7103e1ca61e1947a752287e22eb1d34353589af7baa6855363bce948e4777dc3b103f85c6c488a794a2be7485cd7b59b7e98ce2399a955665bfbd95d3d6f4e6a724851f68a184f4b5e6803283591a6299f1489d45c5c79e0b0eb8998bd30b46a5c1c70fda0d39b3dc8665916ab0c36364", 0xb1}], 0x5, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) 2018/05/24 09:41:27 executing program 7: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x20000000000000, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) 2018/05/24 09:41:27 executing program 0: io_setup(0x4008000, &(0x7f0000000400)=0x0) io_cancel(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)}, &(0x7f0000000540)) 2018/05/24 09:41:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r0, &(0x7f00000000c0)=""/142, 0x8e) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x8, 0x2, [0x20, 0x42]}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r1, 0x3ff}, 0x8) 2018/05/24 09:41:27 executing program 5: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0f00000071000000000020fa00000000000100000000bc92000000020000000000000000000000509e35dfef156a2cfcef1c5f70dcff8b04665c0308ca437332a539adf90e838bb9e4d186c10e7f2dafa527b283c968b609920f7d43c23016bc5188160d51960e3a98d6fe3ac1becace4b774d18ec2cf8247a73121d6cfc4ec1efe89f77d4867e130861ad206ef197e56ccfcf5d5fcb0e26f983f0d6c98670b5b65e9e538a8fcb7da2aeb982f5f442bd5ab012d93752f34cadc133d987af7fe823f1cb61c8053a43566e1f32466732be5762992e745ae68bb32ce1c3fa87e93da02f0b4763b82d"]}) 2018/05/24 09:41:27 executing program 2: socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000040)) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x60, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c74658483000000000000000000000000000000000000000000000000000000000000000000"], 0x28) 2018/05/24 09:41:27 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') write$cgroup_int(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="d356c4dfc2a91dbac6fc3c41655742df37"], 0x1) fcntl$setsig(r0, 0xa, 0x39) 2018/05/24 09:41:27 executing program 6: r0 = add_key(&(0x7f0000000140)='id_resolver\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000002c0)="4ce5e3c3baa6a36e411ec86526c237d6ac38ebb37b87d071cb4a55398f", 0x1d, 0xfffffffffffffffa) keyctl$set_timeout(0xf, r0, 0x1) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f00008fa000)={0x73, 0x79, 0x7a}, &(0x7f0000537ffd)='\x00', 0x1, r2) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000240)="fa23b25ecd0a7933a6abe951c6d724905da40e305047b4be81196cfeb3eb596964e82cee45a3b0acec19907bb257c5eed67e85dfabff02ddceb539807baaa102055dce1f080971a3c4c5acae9df3b1a4154fd0b306c7bad536e83dfdf7b4401182afe0fae80c55fdea0dd9438976febf72eacaf4c27a88a5", 0x78, r1) r4 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f00008d9ffb)={0x73, 0x79, 0x7a}, &(0x7f0000f19edc)="b33ab76079ebe0d14f729cd653e520d29ad7ef0000000000000044c249b544230b9387fb8bd6ed266ccf59ef70995bf2e8e0ecd3fff32853747eda22d2818d08ca27e0ec821620e365a0e6b9485f2d925493f62113e33e5f8c7eba67fc19a9497f5b07e5849d2e875b066cd6401d36616fe0f3c3002801b4627ee7597689525e8e81f750a86eb580fb4690ea52246bd3d32b1a91f944edb74b1f50ae08c5387ed8fd0598b600579f3af3f864e1c324f6928f6672f98f7e149bd61bd78b506e8b", 0xc0, r2) r5 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000626000)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000dde000)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r4, r5}, &(0x7f00005cd000), 0x0, &(0x7f000010c000)={&(0x7f0000bf4ff3)={'ghash-generic\x00'}, &(0x7f0000000000)}) 2018/05/24 09:41:27 executing program 7: r0 = socket(0x2, 0x3, 0x40000000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0x26) sendto$inet(r0, &(0x7f00000002c0), 0x2e2, 0x0, &(0x7f0000000040)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x9, 0x4) accept$inet(r0, &(0x7f0000000080)={0x0, 0x0, @remote}, &(0x7f00000000c0)=0x10) 2018/05/24 09:41:27 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x236, &(0x7f0000000080)) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) clock_gettime(0x0, &(0x7f0000000580)) getsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000480), &(0x7f0000000640)=0x4) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340), 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000300), &(0x7f0000000440)=0x8) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) sync() 2018/05/24 09:41:27 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x71e, 0x4) fallocate(r0, 0x3, 0x0, 0x4) 2018/05/24 09:41:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x6, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e20, 0x58b, @empty, 0x200}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in6={0xa, 0x4e20, 0xb9, @mcast1={0xff, 0x1, [], 0x1}, 0x8000}, @in={0x2, 0x4e20, @multicast1=0xe0000001}, @in={0x2, 0x4e22, @multicast2=0xe0000002}], 0x88) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xd92, 0x90100) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000140)={0x100000001, 0xffffffffffffffff}) sendto$inet6(r1, &(0x7f0000000180)="3f010000f70800000a00a88894bc4a91985e7b8e8fbe0d8e", 0x18, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x4, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/05/24 09:41:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="e92be2df53cf16726c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x102}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000080)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) [ 101.054538] ================================================================== [ 101.061959] BUG: KMSAN: uninit-value in gre_rcv+0x1237/0x1970 [ 101.067862] CPU: 1 PID: 6916 Comm: syz-executor7 Not tainted 4.17.0-rc5+ #102 [ 101.075161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.084525] Call Trace: [ 101.087108] [ 101.089274] dump_stack+0x185/0x1d0 [ 101.092921] ? gre_rcv+0x1237/0x1970 [ 101.096656] kmsan_report+0x149/0x260 [ 101.100469] __msan_warning_32+0x6e/0xc0 [ 101.104551] gre_rcv+0x1237/0x1970 [ 101.108107] ? raw_local_deliver+0x63/0x1660 [ 101.112537] ? kmsan_set_origin_inline+0x6b/0x120 [ 101.117389] ? erspan_xmit+0x2d70/0x2d70 [ 101.121460] gre_rcv+0x2d6/0x3b0 [ 101.124858] ? gre_parse_header+0x14e0/0x14e0 [ 101.129368] ip_local_deliver_finish+0x881/0xed0 [ 101.134146] ip_local_deliver+0x43c/0x4e0 [ 101.138300] ? ip_local_deliver+0x4e0/0x4e0 [ 101.142626] ? ip_call_ra_chain+0x7c0/0x7c0 [ 101.146952] ip_rcv_finish+0xa36/0x1d00 2018/05/24 09:41:28 executing program 5: r0 = socket(0x11, 0x80002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='eql\x00', 0x10) futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f0000048000), 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="3300000001000080cd0d5eede8dcc83ac361a99ad5504dbe81b285ad7dc0c7e24a4169cf0d71051b7661772bd7375678c06cf6da9b87d0f2110fba83d52236e2d0c7b462adefea4f6ba1b0dcb12b952ef83b1e241d336c0afd470753f80e6bdbdbc3bd7ef39be3e683d3044cb09f04ed812545fcac170c68a8eaaed649fdb099a332f90e995554a81df6c277d1ee8767bfcd90949538f3ba3b192cc2c4e490beaa597d2c79770e0ee5510d786cc2107b65e1389e02a312364ca093f39ccb6bae5a785cf335bff7a7b200000000000000"]}) [ 101.150929] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 101.156302] ip_rcv+0x118a/0x16d0 [ 101.159753] ? ip_rcv+0x16d0/0x16d0 [ 101.163381] ? ip_local_deliver_finish+0xed0/0xed0 [ 101.168319] __netif_receive_skb_core+0x47ff/0x4ac0 [ 101.173338] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 101.179333] ? kmsan_set_origin_inline+0x20/0x120 [ 101.184200] process_backlog+0x62d/0xe20 [ 101.188280] ? rps_trigger_softirq+0x2f0/0x2f0 [ 101.192866] net_rx_action+0x7c1/0x1a70 [ 101.196851] ? net_tx_action+0xab0/0xab0 [ 101.200927] __do_softirq+0x56d/0x93d [ 101.204738] do_softirq_own_stack+0x2a/0x40 [ 101.209055] [ 101.211294] __local_bh_enable_ip+0x114/0x140 [ 101.215791] local_bh_enable+0x36/0x40 [ 101.219680] ip_finish_output2+0x1378/0x1490 [ 101.224105] ip_finish_output+0xcaf/0xff0 [ 101.228256] ip_output+0x505/0x5d0 [ 101.231798] ? ip_mc_finish_output+0x3b0/0x3b0 [ 101.236385] ? ip_finish_output+0xff0/0xff0 [ 101.240707] raw_sendmsg+0x3e77/0x41c0 [ 101.244603] ? raw_getfrag+0x630/0x630 [ 101.248502] ? compat_raw_ioctl+0x100/0x100 [ 101.252822] inet_sendmsg+0x3f7/0x750 [ 101.256619] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 101.261981] ? inet_getname+0x4a0/0x4a0 [ 101.265951] __sys_sendto+0x6c0/0x7e0 [ 101.269747] ? syscall_return_slowpath+0xe9/0x700 [ 101.274582] ? prepare_exit_to_usermode+0x4a/0x3a0 [ 101.279527] ? syscall_return_slowpath+0xe9/0x700 [ 101.284373] __x64_sys_sendto+0x1a1/0x210 [ 101.288522] do_syscall_64+0x152/0x230 [ 101.292415] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 101.297600] RIP: 0033:0x455a09 [ 101.300780] RSP: 002b:00007f67cd856c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 101.308480] RAX: ffffffffffffffda RBX: 00007f67cd8576d4 RCX: 0000000000455a09 [ 101.315760] RDX: 00000000000002e2 RSI: 00000000200002c0 RDI: 0000000000000013 [ 101.323025] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000010 [ 101.330292] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 101.337559] R13: 00000000000005ab R14: 00000000006fc8a8 R15: 0000000000000000 [ 101.344828] [ 101.346442] Uninit was stored to memory at: [ 101.350771] kmsan_internal_chain_origin+0x12b/0x210 [ 101.355871] kmsan_memcpy_origins+0x11d/0x170 [ 101.360360] __msan_memcpy+0x109/0x160 [ 101.364246] pskb_expand_head+0x3a6/0x1a70 [ 101.368475] ip_tunnel_xmit+0x2dd6/0x37b0 [ 101.372621] erspan_xmit+0x1c67/0x2d70 [ 101.376505] dev_hard_start_xmit+0x5f1/0xc70 [ 101.380912] sch_direct_xmit+0x578/0x8f0 [ 101.384965] __qdisc_run+0x1785/0x3730 [ 101.388851] __dev_queue_xmit+0x1d50/0x3510 [ 101.393168] dev_queue_xmit+0x4b/0x60 [ 101.396967] neigh_resolve_output+0xac6/0xb60 [ 101.401456] ip_finish_output2+0x1362/0x1490 [ 101.405864] ip_finish_output+0xcaf/0xff0 [ 101.410009] ip_output+0x505/0x5d0 [ 101.413545] raw_sendmsg+0x3e77/0x41c0 [ 101.417428] inet_sendmsg+0x3f7/0x750 [ 101.421228] __sys_sendto+0x6c0/0x7e0 [ 101.425028] __x64_sys_sendto+0x1a1/0x210 [ 101.429170] do_syscall_64+0x152/0x230 [ 101.433053] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 101.438226] Uninit was created at: [ 101.441786] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 101.446885] kmsan_kmalloc+0x94/0x100 [ 101.450680] kmsan_slab_alloc+0x10/0x20 [ 101.454650] __kmalloc_node_track_caller+0xb32/0x11b0 [ 101.459834] __alloc_skb+0x2cb/0x9e0 [ 101.463540] alloc_skb_with_frags+0x1e6/0xb80 [ 101.468032] sock_alloc_send_pskb+0xb56/0x1190 [ 101.472613] sock_alloc_send_skb+0xca/0xe0 [ 101.476846] raw_sendmsg+0x221c/0x41c0 [ 101.480732] inet_sendmsg+0x3f7/0x750 [ 101.484533] __sys_sendto+0x6c0/0x7e0 [ 101.488331] __x64_sys_sendto+0x1a1/0x210 [ 101.492474] do_syscall_64+0x152/0x230 [ 101.496357] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 101.501536] ================================================================== [ 101.508885] Disabling lock debugging due to kernel taint [ 101.514332] Kernel panic - not syncing: panic_on_warn set ... [ 101.514332] [ 101.521707] CPU: 1 PID: 6916 Comm: syz-executor7 Tainted: G B 4.17.0-rc5+ #102 [ 101.530371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.539723] Call Trace: [ 101.542295] [ 101.544434] dump_stack+0x185/0x1d0 [ 101.548052] panic+0x39d/0x940 [ 101.551259] ? gre_rcv+0x1237/0x1970 [ 101.554960] kmsan_report+0x260/0x260 [ 101.558746] __msan_warning_32+0x6e/0xc0 [ 101.562792] gre_rcv+0x1237/0x1970 [ 101.566317] ? raw_local_deliver+0x63/0x1660 [ 101.570719] ? kmsan_set_origin_inline+0x6b/0x120 [ 101.575555] ? erspan_xmit+0x2d70/0x2d70 [ 101.579603] gre_rcv+0x2d6/0x3b0 [ 101.582953] ? gre_parse_header+0x14e0/0x14e0 [ 101.587434] ip_local_deliver_finish+0x881/0xed0 [ 101.592178] ip_local_deliver+0x43c/0x4e0 [ 101.596311] ? ip_local_deliver+0x4e0/0x4e0 [ 101.600617] ? ip_call_ra_chain+0x7c0/0x7c0 [ 101.604930] ip_rcv_finish+0xa36/0x1d00 [ 101.608886] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 101.614239] ip_rcv+0x118a/0x16d0 [ 101.617675] ? ip_rcv+0x16d0/0x16d0 [ 101.621291] ? ip_local_deliver_finish+0xed0/0xed0 [ 101.626294] __netif_receive_skb_core+0x47ff/0x4ac0 [ 101.631294] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 101.636650] ? kmsan_set_origin_inline+0x20/0x120 [ 101.641480] process_backlog+0x62d/0xe20 [ 101.645529] ? rps_trigger_softirq+0x2f0/0x2f0 [ 101.650094] net_rx_action+0x7c1/0x1a70 [ 101.654057] ? net_tx_action+0xab0/0xab0 [ 101.658107] __do_softirq+0x56d/0x93d [ 101.661902] do_softirq_own_stack+0x2a/0x40 [ 101.666200] [ 101.668421] __local_bh_enable_ip+0x114/0x140 [ 101.672898] local_bh_enable+0x36/0x40 [ 101.676776] ip_finish_output2+0x1378/0x1490 [ 101.681178] ip_finish_output+0xcaf/0xff0 [ 101.685330] ip_output+0x505/0x5d0 [ 101.688861] ? ip_mc_finish_output+0x3b0/0x3b0 [ 101.693430] ? ip_finish_output+0xff0/0xff0 [ 101.697734] raw_sendmsg+0x3e77/0x41c0 [ 101.701609] ? raw_getfrag+0x630/0x630 [ 101.705488] ? compat_raw_ioctl+0x100/0x100 [ 101.709806] inet_sendmsg+0x3f7/0x750 [ 101.713590] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 101.718939] ? inet_getname+0x4a0/0x4a0 [ 101.722898] __sys_sendto+0x6c0/0x7e0 [ 101.726691] ? syscall_return_slowpath+0xe9/0x700 [ 101.731521] ? prepare_exit_to_usermode+0x4a/0x3a0 [ 101.736441] ? syscall_return_slowpath+0xe9/0x700 [ 101.741275] __x64_sys_sendto+0x1a1/0x210 [ 101.745408] do_syscall_64+0x152/0x230 [ 101.749280] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 101.754451] RIP: 0033:0x455a09 [ 101.757630] RSP: 002b:00007f67cd856c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 101.765322] RAX: ffffffffffffffda RBX: 00007f67cd8576d4 RCX: 0000000000455a09 [ 101.772576] RDX: 00000000000002e2 RSI: 00000000200002c0 RDI: 0000000000000013 [ 101.779829] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000010 [ 101.787082] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 101.794334] R13: 00000000000005ab R14: 00000000006fc8a8 R15: 0000000000000000 [ 101.802067] Dumping ftrace buffer: [ 101.805588] (ftrace buffer empty) [ 101.809272] Kernel Offset: disabled [ 101.812875] Rebooting in 86400 seconds..