INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.42' (ECDSA) to the list of known hosts. 2018/04/30 03:22:02 fuzzer started 2018/04/30 03:22:03 dialing manager at 10.128.0.26:34153 syzkaller login: [ 49.856708] can: request_module (can-proto-0) failed. [ 49.867752] can: request_module (can-proto-0) failed. 2018/04/30 03:22:10 kcov=true, comps=false 2018/04/30 03:22:14 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000040)=""/254) r1 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000140)={0x7, 0x8, 0x400, 0x81}, 0x10) pread64(r1, &(0x7f0000000180)=""/108, 0x6c, 0x4e) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000200)={@mcast1, 0x0}, &(0x7f0000000240)=0x14) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x1, 0x0) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r5 = request_key(&(0x7f0000000340)='asymmetric\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000003c0)='#posix_acl_access-.\x00', 0xfffffffffffffffa) keyctl$negate(0xd, r4, 0xe57, r5) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000400)={@empty, 0x71, r2}) mkdir(&(0x7f0000000440)='./file0\x00', 0x2) r6 = syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000880)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40004a4}, 0xc, &(0x7f0000000840)={&(0x7f0000000500)={0x324, r6, 0x100, 0x70bd2b, 0x25dfdbfb, {0x2}, [{{0x8, 0x1, r2}, {0x104, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x5}}, {0x8, 0x7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x2}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r2}, {0x1fc, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x9}}, {0x8, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r2}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r2}}, {0x8, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x324}, 0x1, 0x0, 0x0, 0x80}, 0x800) ioctl$EVIOCGSND(r3, 0x8040451a, &(0x7f00000008c0)=""/4096) sendmsg$can_raw(r0, &(0x7f00000019c0)={&(0x7f00000018c0)={0x1d}, 0x10, &(0x7f0000001980)={&(0x7f0000001900)=@canfd={{0x0, 0x0, 0x7, 0x1}, 0x1f, 0x1, 0x0, 0x0, "29e98afdafea1cd08d2263a33ab71636c0c55c4a66ee75683805010dbed16bbb316bd72b1e7d4ef4e9bf4377a5470ca55f9be32096155f24e584c1d04ff0c5d9"}, 0x48}, 0x1, 0x0, 0x0, 0x81}, 0x4000001) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000001a00)=0x3, &(0x7f0000001a40)=0x2) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001ac0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000001c00)={&(0x7f0000001a80)={0x10, 0x0, 0x0, 0x22000000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b00)={0x98, r7, 0x10, 0x70bd2b, 0x25dfdbff, {0x10}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x20}}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000010) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000001c40)={0x0, 0x3}, &(0x7f0000001c80)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000001cc0)={r8, 0x4}, 0x8) r9 = semget$private(0x0, 0x3, 0x180) semctl$SETALL(r9, 0x0, 0x11, &(0x7f0000001d00)=[0x0]) connect$netlink(r3, &(0x7f0000001d40)=@proc={0x10, 0x0, 0x25dfdbfb, 0x2}, 0xc) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000001d80)={r0, 0x4, 0xfffffffffffffffe, "170bf24f1a25ba7be86ee48fc9e654d4394d666614ec4ffe9aea261ceaafd6114dbf1f26d29c008f8e6be96d8e7749b9c3b9787cf0f697c1b15496dc35c4fe6d66bf1f23cf6b31546876ad63b7b31587fef6a5a50fe8b72e974d536301a865d91680d86ae76a54782c51a10c3bfd14e01ca8c5fa7007d27cb50d1fd3068f215530a37acd7b7e263ac8fd6bdb9756bf8050107181185893a2c7f7e851b1705ec41b1bbc267299960684efcebce1dc3e91c50a11677b1fdc1c5a62c92fd52088bc6c4982f4b31f2af4ca02e3899e"}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000001f80)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001fc0)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@loopback={0x0, 0x1}, 0x4e21, 0x3f, 0x4e21, 0xa2, 0xa, 0x80, 0x80, 0x33, r2, r10}, {0x2, 0x3, 0x6790, 0x1, 0x0, 0x7, 0xffffffff, 0x7f}, {0x9, 0x93, 0xffffffff80000000, 0x4}, 0x20, 0x6e6bb2, 0x1, 0x0, 0x3, 0x3}, {{@in, 0x4d6, 0xff}, 0xa, @in=@multicast1=0xe0000001, 0x34ff, 0x0, 0x3, 0x2, 0x200, 0x9, 0x5}}, 0xe8) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000020c0)) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000002100)={r8, 0x101}, 0x8) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f00000021c0)={0x48, &(0x7f0000002140)="d06cddb1f90304eabbae43f885a8975a3372f2eb52e76648582d758a91a7fcbe08517428765c59f18e03205d3e4d19e1488665e6e834a403ca52da77f9f8806c2d347b1cfc8089c4"}) 2018/04/30 03:22:14 executing program 3: mlock(&(0x7f0000fef000/0x11000)=nil, 0x11000) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000)=0x100000000, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000100)={@empty, @dev, 0x0}, &(0x7f0000000140)=0xc) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@ipmr_delroute={0x58, 0x19, 0x123, 0x70bd26, 0x25dfdbfc, {0x80, 0x14, 0x14, 0x1, 0xfe, 0x5, 0xfd, 0xa, 0x1900}, [@RTA_FLOW={0x8, 0xb, 0x1}, @RTA_UID={0x8, 0x19, r1}, @RTA_PREFSRC={0x8, 0x7, @local={0xac, 0x14, 0x14, 0xaa}}, @RTA_MARK={0x8, 0x10, 0x8}, @RTA_DST={0x8, 0x1, @multicast1=0xe0000001}, @RTA_MULTIPATH={0xc, 0x9, {0x3, 0x4, 0x1000, r2}}, @RTA_DST={0x8, 0x1, @multicast1=0xe0000001}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x5) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x24) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000300)={r3, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, [0x9, 0xffffffff80000000, 0x0, 0x7, 0x80, 0x6274c747, 0x9, 0x6, 0x42, 0x7fff, 0x5, 0x1c0200000000000, 0x2, 0x800, 0xf9]}, &(0x7f0000000400)=0x100) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=""/129, &(0x7f0000000500)=0x81) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000540)) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={'bridge_slave_0\x00', {0x2, 0x4e20}}) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r5, 0x84, 0x79, &(0x7f0000000600)=0x800, 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000640)={r4, 0x7916, 0x2, 0xffffffff}, &(0x7f0000000680)=0x10) sendto$inet6(r5, &(0x7f00000006c0)="07e6a77a5149b2786302a5cb8d7aeed4976e31b1205ecd44e3ac027a4528afa8741afb641e829f99b89521b0e272498f01c10d8d988a8e4c70b8e155ef1b6ab0290df4acafa24a63", 0x48, 0x40000, 0x0, 0x0) recvfrom$inet(r5, &(0x7f0000000740)=""/117, 0x75, 0x1, 0x0, 0x0) recvmsg(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000007c0)=""/46, 0x2e}], 0x1, &(0x7f0000000840)=""/103, 0x67, 0xa4}, 0x100) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000900), &(0x7f0000000940)=0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r5, 0x40405515, &(0x7f0000000980)={0x8000000000, 0x2, 0x0, 0x3, "2c0d585c4cda3e1059159c1bff92f10513f0d010a274f0faeced60589606b0ea8d0e81029e4c35c32945e16f", 0x2}) getsockopt$inet_tcp_int(r0, 0x6, 0x1f, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) setsockopt$inet6_opts(r5, 0x29, 0x3f, &(0x7f0000000a40)=@srh={0xff, 0x14, 0x4, 0xa, 0x100000000, 0x2, 0x4, [@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80, [], 0x19}, @remote={0xfe, 0x80, [], 0xbb}, @dev={0xfe, 0x80, [], 0xb}, @loopback={0x0, 0x1}, @ipv4={[], [0xff, 0xff], @rand_addr=0x8000}, @ipv4={[], [0xff, 0xff]}, @remote={0xfe, 0x80, [], 0xbb}, @mcast1={0xff, 0x1, [], 0x1}, @empty]}, 0xa8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000b00)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x15}}, @in6={0xa, 0x4e22, 0xfe92, @empty, 0x6}, @in={0x2, 0x4e22, @rand_addr=0x7}, @in={0x2, 0x4e24, @rand_addr=0x9}], 0x4c) ioctl$TTUNGETFILTER(r0, 0x801054db, &(0x7f0000000b80)=""/153) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000cc0)=0x20, 0x4) clock_gettime(0x0, &(0x7f0000000d00)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000d40)={{0x77359400}, {r6, r7/1000+30000}}, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000000dc0)={&(0x7f0000000d80)=[0x6, 0x2], 0x2, 0xffffffff, 0x3f, 0x4, 0xef7, 0x100000000, {0x200, 0x2, 0x40, 0x1ff, 0xffff, 0x5, 0x7, 0xfffffffffffffffd, 0x3e59, 0x8, 0x1, 0x7fffffff, 0x7fff, 0x10000, "af11d31fb66f646b7caa3a9d25880ecbc4067522a5c5379c1bd978aae79914c9"}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/cuse\x00', 0x80000, 0x0) accept4$inet6(r5, &(0x7f0000000e80)={0x0, 0x0, 0x0, @local}, &(0x7f0000000ec0)=0x1c, 0x0) 2018/04/30 03:22:14 executing program 7: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000080), 0x2) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000000c0)=0x1) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000100)={0x3, 0x7f}) write(r0, &(0x7f0000000140)="92b6627752318b36feb0f8b521150d861e4c2ef2ad1a546e4d6e05eafb149345330d3a7bbaeb95123df244f33545bc58aaae43f5d5bfa22caeed41c6edbc2e5bdd775d21cf112cb26ef6fe5f2c76608b312012b4cd6b3ed750613bf0f8a961e1e2a73c26be98da92cc0530ef0914ded6b72ff98b12d7b4c294a581aa5d9d61e7f53ce9180de3d00d10a01f5211a36452760fef173c92077b89a2fae2b2a873705fde91c100d21c69b8005a30315ff187d90fcebe035ca9f92a076c1e80fc85bf2a88d43926e48e276d8d157f37e3f5e8", 0xd0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fgetxattr(r0, &(0x7f0000000280)=@random={'user.', '\x00'}, &(0x7f00000002c0)=""/103, 0x67) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000340)=0xd4, &(0x7f0000000380)=0x2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000003c0)=0x8) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000400)) r3 = msgget$private(0x0, 0x4) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000440)=""/168) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000500)={{0x6, 0x1f, 0xffff, 0xea, 0x2, 0x8}, 0xfd42}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000540)=0x4, 0x4) sendmsg$alg(r0, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000580)="74049a6c27", 0x5}, {&(0x7f00000005c0)="a52c527f6600ff34776147127cb7b074e09c562fbac6c68c8a5aea9f80dc2af4fd7044f0e7db331cc328f6370cc2e245ed97b5c8e7f45d9c67c8abc4615e1e58390f239834345836f0fee7f5", 0x4c}, {&(0x7f0000000640)="9f69cf4fd6efc575844e8c50416f78314ee84d4b115ee60db33d23b53c2913e98b1e2a3b6fc21a9e5ef585d8ecc280c69f2c382aacbebab93c963b15ef689b14c4ed1bfbdd7b16968ad62e8335930ee16c", 0x51}, {&(0x7f00000006c0)="b5077288af34013a1ea21daf503e2c4853d9608cf82722e55e369f71b0ed954eff6c66f6178ecdfd5b5ef351bb698e9bcd57ce2a2d8fae5ec102d7e8bbaeef1b638d0c9e21986df1b1536f90fef47b5618085eefbc68002dd3a48553be1f368929330da77e3e9a25d625158d5cfc0ac0d6a85e50", 0x74}, {&(0x7f0000000740)="62abc993d2497a67a92a01b164b5d812f57f37753e0ece4a30def985d7351be86e977d148b4a4ab5263823dd722091a2a0923d884ef0104b5f1f27cb51f311abb558c00f14a709479ec9fcc6377bf696960259bb7f47c8928ad846f4733fc8b5ef63e24e17bbe0eebc0d33504e99d1cd578197afa185156c21d795c70ea6b0f526ae49f8c075acb5e3402c9e42cd8da579ee6b153d0f9883661a275d7be3e88dc5c23bf0bf866851985d7ab2cae86508f5e0e8bbe0999b", 0xb7}, {&(0x7f0000000800)="b3cefcf125209f63062340ec1abf497f0dd3b14cb72590074b6a61d43e836f064283314df2998750c129b1988ed95493bdc0d0170e1f34ec3e66c0de55af2911a450e9c6dae1b3e7c330ba8c1bcd2f3768c36f4d79647ac540de", 0x5a}, {&(0x7f0000000880)="58c34d618a9552fd4ed57a2e22a0185f6555d943ebfe659a0ece91d2fd39673d5fbb08e08cee110413e837a81496d8f575375df18c71a63251f34522179fd28ccb587d273a202b81fd428320f1edf93c5b71bc90fa1c37dc4e73e478175a1a5ada9d26dc53c3fc3742f66d35202c5b11ffa36da530fa2dfc42fee7e624963e941114168533171c64b752db32c930db8d6e5d80d1b12b8543899625b17aff6403a812867bd4cc3ccd69465b8dcdcdab3ba638c8f084608db7ab62b7db78f68cdc00dfad647aeb4ec7e241fbbe8a81fe70b5aabbe4bc4af5bafd279bc26e644661e9cc05", 0xe3}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000001980)="81bae33e60a0e3de4944123bca50066f96e6dafd779343745d026d4a46e4c9d230734860664ae5cb0f099184469922f182d8e4ce498c4f3167a4b48220f0466e48238308db17cde2dbe55e5670715c6f7985621a1b050764404858c8ac14a1ec97ddd391543e4da72691c3472d08a743fd4ffd0cbcf679d670f53aac1ae12457b08c74ba302e2ae663c6404635b6b54cbaba3c6c35992ea81181a4d68d40d65b3d9d46f2a8877731d13b70951a95", 0xae}], 0x9, &(0x7f0000001b00)=[@iv={0xb0, 0x117, 0x2, 0x9a, "bf9d0b21c734882da37f1a19d7fae5d7c7819584ac466bae24c0d6073e420ae05ac6d402d09660b69b78f5fa7e571804de2f0e595737a2966bfdd031c4cac2875aff8ab0acb118df03033b8a28b61e58601a3e52d149d819868b5f5c21e4782937ae4a24b4e852c8130c14c61bc2bf0f24e57e52773508154bc24a21fff0c7bdaf00d05e8cfe3b1f1e50a720fc8ab960a08e8e1306ddd34b9ab3"}], 0xb0, 0x800}, 0x0) ioctl$sock_ipx_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001c00)={'lo\x00', {0x4, 0x7f, 0xdd6a, "a101a9acc2b2", 0x3}}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x307) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000001c40)=r0) r4 = semget(0x0, 0x4, 0x8a) semctl$IPC_INFO(r4, 0x3, 0x3, &(0x7f0000001c80)=""/133) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000001d40)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000001e00)) bind$rds(r0, &(0x7f0000001e40)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000001e80)={0x3, 0x41, 0x400, 0x0, 0x8, 0x7940f441, 0x8}, 0xc) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001f00)={0x3, &(0x7f0000001ec0)=[{0x80000000, 0x5, 0x6, 0xeac}, {0x7, 0x1, 0x5, 0x8}, {0xe78, 0x4, 0x3}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000002000)={0x1, &(0x7f0000001f40)=[{}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000002080)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000002180)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000021c0)={'syzkaller1\x00', 0x0}) accept4$packet(r2, &(0x7f0000002200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002240)=0x14, 0x800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000022c0)={'bridge_slave_0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000002300)={{{@in=@dev, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000002400)=0xe8) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000002440)={@remote, 0x0}, &(0x7f0000002480)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002580)={{{@in6=@local, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) sendmsg$nl_route(r0, &(0x7f0000002780)={&(0x7f0000002040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000002740)={&(0x7f00000026c0)=@mpls_getnetconf={0x64, 0x52, 0x400, 0x70bd2c, 0x25dfdbfe, {0x1c}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x800}, @NETCONFA_IFINDEX={0x8, 0x1, r5}, @NETCONFA_IFINDEX={0x8, 0x1, r6}, @NETCONFA_IFINDEX={0x8, 0x1, r7}, @NETCONFA_IFINDEX={0x8, 0x1, r8}, @NETCONFA_IFINDEX={0x8, 0x1, r9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x8001}, @NETCONFA_IFINDEX={0x8, 0x1, r10}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x200}, @NETCONFA_IFINDEX={0x8, 0x1, r11}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) 2018/04/30 03:22:14 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001800)='/dev/sequencer\x00', 0x2000, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000001a00)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000019c0)={&(0x7f0000001880)=@upd={0x110, 0x12, 0x0, 0x70bd28, 0x25dfdbfc, {{'rfc4543(ccm_base(cryptd(chacha20-generic),sha512-avx))\x00'}, [], [], 0x2400, 0x400}, [{0x8, 0x1, 0x9}, {0x8, 0x1, 0x64f7d9a5}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x3f}, {0x8, 0x1, 0xff}, {0x8, 0x1, 0xffffffffffffff80}]}, 0x110}, 0x1, 0x0, 0x0, 0x80}, 0x10) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000001a40)={0x7, 0x37e, 0x4, 0x2, 0x813, 0x2aa, 0x5, 0x4, 0x905, 0x8, 0xff, 0x1}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001a80)=0x0) ioprio_get$pid(0x2, r1) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000001b80)={0xbe, &(0x7f0000001ac0)=""/190}) exit(0xffffffff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001c00)={r0, 0x2, 0x1, 0x0, &(0x7f0000001bc0)=[0x0], 0x1}, 0x20) r2 = getpgrp(r1) sched_rr_get_interval(r2, &(0x7f0000001c40)) rt_tgsigqueueinfo(r1, r2, 0x16, &(0x7f0000001c80)={0x28, 0x1f, 0x5, 0x100000001}) ioprio_get$pid(0x1, r1) fcntl$setownex(r0, 0xf, &(0x7f0000001cc0)={0x3, r2}) stat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r0, 0x400454cc, r3) getsockname(r0, &(0x7f0000001e00)=@can={0x0, 0x0}, &(0x7f0000001e80)=0x80) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001ec0)={r5, @loopback=0x7f000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) llistxattr(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)=""/62, 0x3e) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001f80)={0x0, 0x80, 0x1, 0x3, 0x3c3, 0xfffffffffffffffc, 0xffffffff7fffffff, 0x6, {0x0, @in={{0x2, 0x4e22, @broadcast=0xffffffff}}, 0x7fff, 0x3, 0x2, 0x5, 0xb34}}, &(0x7f0000002040)=0xb0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000002080)=@assoc_value={r7, 0x39800000}, 0x8) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000020c0)={0xffffffffffffffff, 0xffffffffffffffff}) getdents(r0, &(0x7f0000002100)=""/182, 0xb6) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000021c0)={r6, 0xfff}, &(0x7f0000002200)=0x8) getsockname(r8, &(0x7f0000002240)=@rc, &(0x7f00000022c0)=0x80) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000002300)={0x91fe, 0xffffffffffffffd0, 0xffffffffb75f0f24, 0x80000001, 0x100, 0x81}) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) r9 = semget(0x0, 0x0, 0x40) semop(r9, &(0x7f0000002340)=[{0x4, 0x3, 0x800}], 0x1) epoll_pwait(r0, &(0x7f0000002380)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x62, &(0x7f0000002400)={0x9}, 0x8) r10 = syz_open_dev$midi(&(0x7f0000002440)='/dev/midi#\x00', 0xfffffffffffffff7, 0x80) ioctl$TUNSETGROUP(r10, 0x400454ce, r4) 2018/04/30 03:22:14 executing program 4: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x20, 0x1) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x401}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0)=r1, 0x4) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000100)=0x1) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='yeah\x00', 0x5) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x80000, 0x0) pwritev(r0, &(0x7f0000000640)=[{&(0x7f00000001c0)="e8b0d3493a4d929956ffb8c58f36d6b3526ab5eda283c9abbe4bf3dac4130f09bcf6959c4c47dc114297c3dda59d5071c2a1965e245d269cbd50c4ce469d4f4f457838b0a458f9b64123383f37df5254301b878d5c3b6ca84576c444fba704b2a93b50c02911cb818ba319cd1d11e9efae758290e4c362d0fe1b710a8f84409319ef48848b7451dd65491047da4195c93b653d0f3d7aa5cf424d285b54fd7621e31ee11199a30e7257becfd8693b5cdab4aedb41c0b4fb755d9fa85b45c46b5ee2e91eee2821d9e56875977c6c29f31c7ba7bff7560e4da283b8cc4f4b19ca9d503b32770af09036", 0xe8}, {&(0x7f00000002c0)="041dca42779ce1d428b26c41409c8ccefc8093cf1dd7fdf201c330a13acbedd28b1c81e08856482ab6c01e841109ca4be7bcfa691f23baacca7e0953642a58a35f136764d1754da56972faeb393a055139ad1f0fab79631f6441a2472ea3ed962b39a4f3148e76bf0d918fb703d4d61781df6c29aca0e5d3c5aa6311060b5a425723ab6c2a40516ad6dc75baded9fe24a2d1799eacb845941fc33d00c3d3658832bca1b3c313b83d3b9c7ec763593b21e117b367d4ba296a7e044da14571611f26d4c72875384cb3990e2031f19293e102c99ada69c7f00702de69fb027312907fb2911d093206a5", 0xe8}, {&(0x7f00000003c0)="57db53661cef4458b5c22d3b3df8426ed5085ddf205e8640ba5aeeaf1edb322c9d2f1e565db692214856f502d80d533bc9005fbd9b13eb0da4daad1713a30ad342e90b8fce482af199d2b8035ae4c3d7af5b56cb35ecc711734b2da1f6c13bab579f99059d46e1f75b", 0x69}, {&(0x7f0000000440)}, {&(0x7f0000000480)="d3babb14cd0c739b3ed83b29af4a0e8a1ff0eabc27c53ebeedd0f5d527dbfc3e490947de21505ad48fdd111543ddff0a9bc1682d2cbcc5564d1c1b37bb75e636e706232452cc2071c202476ec9106f5adbf34420649d81242a57795af002088cf1eedff5777da47d736118f706bb05d6b0f8db3fb94a8ae72564217ccbdb1f739c73c220ecb37c35adaf20db84c9173c7298e6a1cbcb008f839a0f37d1b023214e2ab2dda9b8b9af2c361e9a4b8c", 0xae}, {&(0x7f0000000540)="7a0880e97bd7a02d49bada3d307bd2cd00edcbcfaba176142c8ffb5ca531a9b0b34f14efc475bc5d436e31d10f399000329132f41ccf740466c4961a8cef34ab1adb1ae6fcfed983023c132a3de87edd2939469ce8d58ceea263ab3ad22bec74d78527fd5569984298be6b0a468647018be2218bf7f2b310490951d65e7d2327f40a27ccef2a1aa5bc4bd77b356697abd51acabb91561469b66183800831c28ca0", 0xa1}, {&(0x7f0000000600)="0f", 0x1}], 0x7, 0x0) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f00000006c0)={0x1, 0x2}) alarm(0x8000) r3 = open(&(0x7f0000000700)='./file0\x00', 0x400080, 0x181) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000740), &(0x7f0000000780)=0xb) r4 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x95, 0x10000) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000900)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x34, r5, 0x0, 0x70bd28, 0x25dfdbfc, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8d5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100000000}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4000800) lseek(r2, 0x0, 0x1) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000940)={r1, 0xe260, 0x1, 0x9}, &(0x7f0000000980)=0x10) read(r4, &(0x7f00000009c0)=""/214, 0xd6) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) setsockopt(r0, 0x1, 0x9, &(0x7f0000000b40)="a56346b85d9aeb0b5f250a9786c1fb3a3ba2248e62d807ebccb98322bb60076dcdbe23a9d65d58e78171695497f4", 0x2e) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000b80)={r1, 0x1}, 0x8) bind$inet(r2, &(0x7f0000000bc0)={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000c00)) accept$alg(r3, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000c40)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000c80)={0x5b51c3da}, 0x4) openat$nullb(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/nullb0\x00', 0x100, 0x0) getsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f0000000d00)=0x8001, &(0x7f0000000d40)=0x4) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000d80), &(0x7f0000000dc0)=0x4) msgget(0x3, 0x3) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000e00)={r6, 0x6}, &(0x7f0000000e40)=0x8) 2018/04/30 03:22:14 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000500)={&(0x7f0000000240)=@hci={0x0, 0x0}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/240, 0xf0}], 0x1, &(0x7f0000000400)=""/232, 0xe8, 0x5}, 0x2100) bind$packet(r0, &(0x7f0000000540)={0x11, 0xf8, r1, 0x1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) bind$alg(r0, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) ioctl$sock_ipx_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000600)={'bridge_slave_0\x00', {0x4, 0xf76, 0x9e24, "de2819c2e262", 0x988}}) r2 = getuid() fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuseblk_mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', 0x4002, r2, r3, 0x6, 0x7fff, 0x60002) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000740)={0x0, 0x8d1e}, &(0x7f0000000780)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000007c0)={r4, 0x100}, &(0x7f0000000800)=0x8) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000840)=0x4, 0x4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000880)={0x2, 0x7, 0x6, 0x2, 0x1, 0x20}) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f00000008c0)={'ipvs\x00'}, &(0x7f0000000900)=0x1e) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) ioctl$sock_ipx_SIOCAIPXPRISLT(r0, 0x89e1, &(0x7f00000009c0)=0x3) msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2) bind$packet(r0, &(0x7f0000000a00)={0x11, 0x17, r1, 0x1, 0x3, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) getsockopt$IP_VS_SO_GET_DAEMON(r5, 0x0, 0x487, &(0x7f0000000a40), &(0x7f0000000a80)=0x30) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000ac0)=""/7, &(0x7f0000000b00)=0x7) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000b40)={r4, 0x80000000}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000bc0)={r0, 0x28, &(0x7f0000000b80)}, 0x10) r7 = add_key$keyring(&(0x7f0000000c00)='keyring\x00', &(0x7f0000000c40)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r8 = add_key(&(0x7f0000000d00)='pkcs7_test\x00', &(0x7f0000000d40)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000d80)="07e8fcfe1648928f4d3906f41f921149299b0c3f0119e229e2eb00bca0bd9e0c17935a9402f58864403d9b52142a8e91d239f2dd2e4b9fc62787cad2aab448997af5c8857f6584332137f49ea6c51d911673d779b74a97a6f6dbdccdd762ce8ef5ce28a51c06fbc0de34cc9f6716380519d61d1f304cdcf4497acca47a7d61708245fb703924128e524cb0fd3090ba49170a398aaf06b4bd00a69771b69a424339846183760ff33539", 0xa9, 0x0) keyctl$search(0xa, r7, &(0x7f0000000c80)='.dead\x00', &(0x7f0000000cc0)={0x73, 0x79, 0x7a, 0x3}, r8) setsockopt$ax25_buf(r0, 0x101, 0x0, &(0x7f0000000e40)="f3dd72170669518acc81d01b0694dc0b89a299a29290b72b283513b05cb2bcd84bdc1895acfcedf710f99235c4cc62111e7804f008509fa5daffe8eb99eb6d33b03f4e2c29fde9177690fc5f1a23f40a32277eecc20cb5de24f8465c0551c589936dff53990a74e2d570cbf8e73df2d62d2fade69f516fc9cb6d65912a0309e0d181f4c4306c69d99db39fbde689b7a68bad6d1cc3a9582044b6fd8ee09f93890c47e9ee12de55e49025ac3666de63a5221d3c14ba9af80db301c31defceed93ddd3a9e6d94e813698e2063612f399f2e82ead971b240d4bd101aea781ab1becd99e70f68a70bfea", 0xe8) r9 = syz_genetlink_get_family_id$fou(&(0x7f0000000f80)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000001080)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001040)={&(0x7f0000000fc0)={0x4c, r9, 0x38, 0x70bd2d, 0x25dfdbfc, {0x3}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x33}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2b}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00000010c0)) wait4(r6, &(0x7f0000001100), 0x4, &(0x7f0000001140)) 2018/04/30 03:22:14 executing program 6: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x80000000, 0x781000) r1 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) r4 = getegid() r5 = getegid() setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001440)=@broute={'broute\x00', 0x20, 0x6, 0x1268, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000040), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x0, 0x20, 0x9100, 'bond_slave_0\x00', 'syz_tun\x00', 'sit0\x00', 'bridge0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xa}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xa0, 0xa0, 0x118, [@connlabel={'connlabel\x00', 0x8, {{0xfffffffffffffffe}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x1, 0x2, 0xfffffffffffffffd, 0x0, 0x0, "8d506656f633abfe0eb3cb5e29133d6742ef32a9e5755d46e51ac6e943c846dd98e0b46006c3125b917171aeeacd144c32b66e8542fdf0cef1d8521fd1c79c8b"}}}}, {{{0x3, 0x2, 0x8914, 'syzkaller1\x00', 'vlan0\x00', 'team_slave_0\x00', 'team_slave_1\x00', @link_local={0x1, 0x80, 0xc2}, [0xff, 0x0, 0x0, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0x140, 0x140, 0x170, [@arp={'arp\x00', 0x38, {{0x30b, 0x8100, 0xb, @loopback=0x7f000001, 0xffffff00, @multicast2=0xe0000002, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0xff], 0x4c, 0x20}}}, @rateest={'rateest\x00', 0x48, {{'dummy0\x00', 'bpq0\x00', 0x20, 0x3, 0x1, 0xff, 0x3, 0x20, 0x1, 0x101}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x10, 0x4b05, 'bridge_slave_0\x00', 'syzkaller0\x00', 'ip6_vti0\x00', 'nr0\x00', @link_local={0x1, 0x80, 0xc2}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x108, 0x108, 0x238, [@mac={'mac\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}, @arp={'arp\x00', 0x38, {{0x306, 0x655d, 0xb, @rand_addr=0xa918, 0xffffffff, @local={0xac, 0x14, 0x14, 0xaa}, 0xff000000, @random="842e19235023", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0xff, 0xff], 0x0, 0x1}}}]}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x3, 'system_u:object_r:system_cron_spool_t:s0\x00'}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x14, 0x1a, 'veth0_to_team\x00', 'ip6gre0\x00', 'tunl0\x00', 'ip6gre0\x00', @empty, [0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x17}, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], 0x1e8, 0x1e8, 0x238, [@helper={'helper\x00', 0x28, {{0x1, 'sane-20000\x00'}}}, @comment={'comment\x00', 0x100}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x1ff, 'syz1\x00', 0x81}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x2, [{{{0x3, 0x6e, 0xe90d, 'ip6tnl0\x00', 'veth0_to_bridge\x00', 'yam0\x00', 'veth0_to_team\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff, 0x0, 0xff], 0xa0, 0xa0, 0xf0, [@state={'state\x00', 0x8, {{0xfff}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x9, 0x2}}}}, {{{0x11, 0x9, 0xf7, 'veth0_to_bond\x00', 'ip6_vti0\x00', 'syzkaller1\x00', 'veth0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], @random="150215bac800", [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0x940, 0x990, 0x9c0, [@among={'among\x00', 0x868, {{0x0, 0x232, 0x5, {[0x1000, 0x687, 0xace2, 0x401, 0x77, 0x2, 0x0, 0x30c, 0x2, 0xffff, 0x0, 0x3, 0x5ce2, 0x4, 0x1000, 0x9a81, 0x8, 0x2df, 0x473, 0x2, 0x1, 0x20, 0x3bae, 0x4, 0x76d, 0x7ff, 0x9, 0x6, 0x1, 0x9, 0xbb9d, 0x0, 0xc668, 0x5, 0x3f, 0xffffffffffffffc1, 0x100, 0xff, 0x1, 0x1000, 0x7fffffff, 0x9, 0x1, 0x4, 0x9, 0x8, 0xffffffff, 0x1, 0x6, 0x5b, 0x97e, 0x3, 0x0, 0x2, 0x200, 0x8, 0x400, 0x9, 0x0, 0xa578, 0x6, 0x53f59977, 0x9, 0x0, 0x7, 0x8, 0x100000000, 0x80000000, 0x4, 0xfffffffffffffff8, 0x2, 0x6, 0xfffffffffffffffc, 0x3, 0x5, 0xffff, 0x20, 0x2, 0x5, 0x7fff, 0x3, 0x0, 0x7, 0x8001, 0x4, 0x9, 0xfffffffffffffffa, 0x1000, 0x7, 0x4, 0x2400000, 0x101, 0x3, 0x2, 0x100, 0x8, 0x0, 0x4, 0x0, 0x3, 0x8, 0xfffffffffffffffc, 0x3, 0x1, 0x7b8, 0x10001, 0x7ff, 0x9, 0x6, 0x9, 0x6, 0x6, 0xbd91, 0x2e, 0x1, 0x800, 0xe6, 0x2, 0x0, 0x80, 0x6, 0x20, 0x9, 0xfffffffffffffffc, 0x6, 0x101, 0x8, 0x9, 0x2, 0xe1b8, 0x100000000, 0xff, 0x0, 0x7f, 0x1, 0x5, 0x9, 0x8, 0x5, 0x300000000000000, 0x8, 0x6, 0x23e, 0x9, 0x7fffffff, 0x7, 0xffff, 0x9b, 0x1, 0xd, 0x2, 0x1c7e4500, 0x5, 0x6, 0x8, 0x0, 0xc00, 0x268, 0x3, 0x5, 0x8000, 0x20, 0xfff, 0x7058, 0xffffffff, 0xffff, 0x6, 0x1, 0x7, 0x200, 0x81, 0x8000, 0x0, 0xba, 0x2, 0x9, 0x8, 0x4, 0x3, 0xfffffffffffffffc, 0x0, 0x7, 0x0, 0x81, 0x1, 0x7953, 0x4, 0x8, 0x7, 0xd4000000000, 0x1, 0x10000, 0x1, 0x8, 0x3ff, 0x81, 0xfff, 0x100, 0x100, 0x1, 0xe0d, 0x10000, 0x20, 0x3972, 0x3b9e, 0x5, 0x8000, 0x585, 0x6, 0x4, 0x3, 0x0, 0xffff, 0x80000000, 0x5, 0x7, 0x401, 0x8, 0x7ff, 0x401, 0x1, 0x6, 0x8, 0x20, 0x6, 0x400, 0xc7bd, 0x40, 0x9, 0x8, 0x17, 0x0, 0xa27b, 0x9, 0xa6, 0x0, 0x8, 0x9, 0x9, 0x20, 0x0, 0x81, 0x5, 0x1ff, 0x0, 0x6, 0xffffffff, 0xe6, 0x7, 0xfe, 0x80, 0x5, 0x4, 0x100000001, 0x8, 0x6, 0x7b], 0x1, [{[0x7075ee49, 0x7f]}]}, {[0xfb, 0xfffffffffffffff9, 0x46, 0x906, 0x400, 0x80, 0x0, 0xff, 0x2, 0x1, 0x7, 0x7e, 0x2, 0x2, 0xec4, 0x200, 0x8, 0xff, 0x198, 0x4000000000000, 0x7fff, 0x10000, 0x7, 0x818, 0x1, 0x6, 0x1, 0x80000001, 0xd91, 0x69, 0x40, 0x6, 0x100000001, 0x8, 0x1, 0x5, 0x0, 0x9, 0x0, 0x9, 0x1, 0x7f, 0xba, 0x2, 0x6, 0x3, 0xffffffffffff3868, 0x3ff, 0xfffffffffffffe01, 0xffffffffffff8001, 0x10001, 0x2, 0x9750, 0x9, 0x616, 0x3, 0x7, 0x6, 0x101, 0x6, 0x3, 0x800, 0x5, 0x0, 0x0, 0x2, 0x62, 0x1, 0x3, 0x7f, 0x5, 0x8, 0x401, 0x9, 0x400, 0x0, 0x8, 0x1, 0xfd1, 0x80000000, 0x100000000, 0xfffffffffffffeff, 0x8, 0xffffffffffffd2de, 0xa1, 0x0, 0x9, 0x0, 0x6, 0x7ff, 0x4, 0x1000, 0x81, 0x3f, 0x1, 0x18b2, 0xffffffff80000000, 0x7, 0x7f, 0x1000, 0x9, 0x81, 0x10001, 0xf329, 0x9, 0xfffffffffffffbe9, 0x20, 0xe4, 0x1, 0xfff, 0xffffffffffffffc1, 0xffffffff, 0x61e96825, 0xc4d, 0x6, 0xfffffffeffffffff, 0x7fff, 0x5, 0x8, 0xffff, 0xc2a, 0x1, 0x3ff, 0x8001, 0x2c0, 0x1, 0x100, 0x3ff, 0x9, 0x5f, 0xfffffffffffff6ba, 0x1000, 0x20, 0x1, 0x2, 0x1f, 0x7, 0x9, 0x2, 0x40, 0x0, 0x9, 0xff, 0x1, 0x4, 0x5, 0x0, 0x7, 0x1, 0x9, 0x8, 0x1ff, 0x100000001, 0x1000, 0x1, 0xff, 0xcfd1, 0x5db3, 0x6, 0x400, 0x5, 0x2, 0xffffffff, 0x4, 0x6a12, 0x5, 0x1, 0xbe, 0x6, 0x2, 0x9, 0x200, 0x20, 0xffff, 0xd45, 0x80000000, 0x3, 0x8, 0xa18, 0x7, 0x9, 0x0, 0x2, 0xdb2, 0xfffffffffffff095, 0x9, 0x0, 0x4, 0x5, 0x0, 0x2, 0xccdf, 0x7f, 0x6, 0x7ff, 0x0, 0x1, 0x1000, 0x400, 0x0, 0x1, 0x1000, 0x0, 0xfffffffffffff801, 0x2374, 0xc611, 0xff, 0x6a3ea5f5, 0x4, 0x1ff, 0x6, 0x4, 0x7, 0x6, 0x2, 0x6, 0x3ff, 0x3, 0x2, 0x4, 0xde14, 0x200, 0x4, 0x4, 0x0, 0x3, 0x1, 0x2, 0x101, 0x2, 0x5, 0xf18, 0x6d, 0x6, 0x0, 0x101, 0x8, 0x100, 0x7, 0x6, 0x1ff, 0x1, 0x9, 0x200, 0x100000001, 0x1, 0x2, 0x7, 0xfffffffffffff752, 0x100, 0x9, 0xffffffffffffffff, 0x4, 0x4, 0x1f, 0x2a, 0x7], 0x5, [{[0xac], @broadcast=0xffffffff}, {[0x8000, 0x4], @multicast1=0xe0000001}, {[0x80000001, 0x7fff]}, {[0xffff, 0x20], @remote={0xac, 0x14, 0x14, 0xbb}}, {[0x5, 0x2], @multicast1=0xe0000001}]}}}}, @owner={'owner\x00', 0x18, {{r1, r3, r4, r5, 0x2, 0x3}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0x8001, 0x7}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x2}}}}]}]}, 0x12e0) r6 = syz_open_dev$dmmidi(&(0x7f00000014c0)='/dev/dmmidi#\x00', 0x8, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000001500)=r2) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000001540)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000001640)=0xe8) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f00000016c0)={'filter\x00', 0x7, 0x4, 0x480, 0x280, 0x140, 0x140, 0x398, 0x398, 0x398, 0x4, &(0x7f0000001680), {[{{@arp={@broadcast=0xffffffff, @rand_addr=0x1, 0xff000000, 0x0, @empty, {[0xff, 0x2dbc8f85a93a18f3, 0x0, 0xff, 0xff]}, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {[0xff, 0xff, 0x0, 0x0, 0xff, 0xff]}, 0x1, 0x4, 0x0, 0x4, 0x3ff, 0xfffffffffffffff8, 'erspan0\x00', 'ifb0\x00', {0xff}, {0xff}, 0x0, 0x290}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="2d75d38f25f7", @empty, @empty, 0xf, 0x1}}}, {{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x15}, 0xffffffff, 0xffffff00, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {[0xff, 0xff, 0xff, 0x0, 0x0, 0xff]}, @mac=@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x40, 0x8, 0x7ff, 0x80, 0x6d6, 0x2, 'bond0\x00', 'ip6_vti0\x00', {0xff}, {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev={0xac, 0x14, 0x14, 0xf}, @remote={0xac, 0x14, 0x14, 0xbb}, 0x2, 0xffffffff}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14, 0x20}, 0xffffffff, 0xffffff00, @empty, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff]}, 0x100000001, 0x0, 0x100000000, 0x6, 0x3, 0x6, 'erspan0\x00', 'veth1_to_bond\x00', {0xff}, {0xff}, 0x0, 0x130}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x3f, 0x27648cb8}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000001bc0), &(0x7f0000001c00)=0x4) io_setup(0x0, &(0x7f0000001c40)) pwrite64(r0, &(0x7f0000001c80)="31c6a0367e81954f4145b03aa1ded46b9bc26db3b1ba369264e78a582fde7f6688fc9930bf5eae0ccaca248e5b5f343523ab6814fafe130347a8faa33638d73de13913b786336dc440ffd6b9d6def4ff", 0x50, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000001d00)={0x80000000, {{0xa, 0x4e23, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x7f}}}, 0x88) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000001dc0)={0x104, @tick=0x7, 0x8000, {0x3726, 0x2}, 0x1, 0x2, 0x8}) getsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000001e40)={0x0, 0x1, 0x300000, 0x1f}, &(0x7f0000001e80)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000001ec0)={r8, 0x3, 0x7fffffff, 0xf3, 0x5, 0x100000000}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000001f00)={r8, 0x9, 0x7, 0xa0000, 0x7fff, 0x7}, 0x14) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/autofs\x00', 0x4000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r6, 0x84, 0x19, &(0x7f0000001f80)={r8, 0x5}, 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r6, 0xc0405519, &(0x7f0000001fc0)={0x6, 0x2, 0x9, 0x10000, "f26b61cf2b41d2fb20abb7121ec3f600504118ec34188f5c3c3ffd02537c35848eecf9fb373781b2d460ef2e", 0xbc76}) ioctl$sock_SIOCGIFCONF(r6, 0x8910, &(0x7f0000002040)=@req={0x28, &(0x7f0000002000)={'nr0\x00', @ifru_hwaddr=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}) setns(r9, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000002080)={r8, 0x6}, 0x8) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000020c0), &(0x7f0000002100)=0x4) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000002140)=0x1, 0x4) sendto$packet(r9, &(0x7f0000002180)="bc1c078647e564391d4ef3514247012084edcd5392707936f239aa71a1", 0x1d, 0x40, &(0x7f00000021c0)={0x11, 0x1f, r7, 0x1, 0x193, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x11}}, 0x14) close(r6) setsockopt$bt_BT_RCVMTU(r9, 0x112, 0xd, &(0x7f0000002200)=0x6, 0x2) 2018/04/30 03:22:14 executing program 5: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0xfda, 0x4, [0x1, 0xfffffffffffffffa, 0x6, 0xff]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e24, @rand_addr=0x3ff}}, [0x80000001, 0x4, 0x10001, 0x6, 0x10001, 0xffffffffffffed71, 0x100, 0x200, 0x100000001, 0x80000000, 0x3, 0x9, 0x8, 0x401, 0x2]}, &(0x7f00000001c0)=0x100) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) fallocate(r0, 0x2, 0xffffffffffffffc1, 0x7fff) setsockopt$sock_int(r0, 0x1, 0x26, &(0x7f0000000200)=0x2, 0x4) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) sendmsg$rds(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/83, 0x53}, {&(0x7f00000002c0)=""/239, 0xef}], 0x2, &(0x7f0000000800)=[@fadd={0x58, 0x114, 0x6, {{0x5, 0x65b}, &(0x7f0000000400)=0x81, &(0x7f0000000440), 0x3f, 0x7f, 0x1, 0x7, 0x10, 0x84}}, @rdma_dest={0x18, 0x114, 0x2, {0xe7c, 0x80000000}}, @rdma_args={0x48, 0x114, 0x1, {{0x8, 0x9}, {&(0x7f0000000480)=""/233, 0xe9}, &(0x7f00000006c0)=[{&(0x7f0000000580)=""/77, 0x4d}, {&(0x7f0000000600)=""/113, 0x71}, {&(0x7f0000000680)=""/3, 0x3}], 0x3, 0x44, 0xa0}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000700)=""/167, 0xa7}, &(0x7f00000007c0), 0x57}}], 0xe8, 0x80}, 0x4010) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000980)={&(0x7f0000000940)=[0x0], 0x1}) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r3) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000a80)={'bpq0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000ac0)={0x10001}, 0x4) r5 = shmget$private(0x0, 0x1000, 0x220, &(0x7f0000ffc000/0x1000)=nil) r6 = fcntl$getown(r2, 0x9) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000b00)=0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000b40)={{0x80, r3, r4, r3, r4, 0x4, 0x6}, 0x49, 0x6, 0xf6, 0xa77, r6, r7, 0x4}) getsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000bc0), &(0x7f0000000c00)=0x4) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000c40)={0x1, 0x3, 0x8, 'queue0\x00', 0x80}) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000d40)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000d80)={@dev, @broadcast, 0x0}, &(0x7f0000000dc0)=0xc) accept4$packet(r0, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000e80)=0x14, 0x80800) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000ec0)={0x0, @local, @multicast1}, &(0x7f0000000f00)=0xc) getpeername$packet(r0, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000f80)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001640)={'bridge0\x00', 0x0}) accept$packet(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001780)=0x14) accept$packet(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000001800)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001840)={'veth1_to_bond\x00', 0x0}) getsockname$packet(r0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000018c0)=0x14) getsockname$packet(r0, &(0x7f00000019c0)={0x0, 0x0, 0x0}, &(0x7f0000001a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001dc0)={{{@in=@rand_addr, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000001ec0)=0xe8) getpeername$packet(r0, &(0x7f0000001fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000002000)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002040)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000002140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002180)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000002280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000022c0)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f00000023c0)=0xe8) accept4$packet(r0, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000002440)=0x14, 0x80800) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002480)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000002580)=0xe8) getsockname$packet(r0, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002600)=0x14) getpeername$packet(r0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002680)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000026c0)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000027c0)=0xe8) getpeername$packet(r0, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000028c0)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000002e80)={@multicast1, @multicast1, 0x0}, &(0x7f0000002ec0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002f40)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000003040)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000003880)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000003840)={&(0x7f0000003080)={0x79c, r8, 0x100, 0x70bd2a, 0x25dfdbfe, {0x2}, [{{0x8, 0x1, r9}, {0xb0, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r10}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xfffffffffffffffb}}}]}}, {{0x8, 0x1, r14}, {0xfc, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x124, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x80e3e9}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x14, 0x4, [{0x101, 0xc7, 0xfc4, 0x5}, {0xa8, 0x6f56, 0x100000000}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0xfffffffffffffffe}}, {0x8, 0x6, r19}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x34, 0x4, [{0x4, 0x1, 0x7fff, 0x3}, {0x47ed, 0x5, 0x5, 0x80000001}, {0xfd57, 0x40, 0x80000000, 0x6}, {0x8, 0x8, 0x8, 0xfffffffffffffffa}, {0x4, 0x8, 0x4, 0x1ff}, {0x8000, 0x6fe, 0x6}]}}}]}}, {{0x8, 0x1, r20}, {0xb8, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r21}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x1}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r22}, {0x1a4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r23}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r24}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r25}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r27}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r28}, {0x1ac, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r29}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r30}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x44, 0x4, [{0x617, 0x7, 0xd85, 0x2}, {0x7, 0x6, 0x8, 0x4}, {0x2, 0x0, 0x0, 0x80}, {0xffffffff, 0x1, 0x2bd, 0x5}, {0x6, 0xff, 0x1, 0xdb78}, {0x6, 0x5, 0xffff, 0x3ff}, {0x5, 0x0, 0x2, 0x7f}, {0x8f0, 0x7fffffff, 0x5, 0x2}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0xdb3}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}]}}]}, 0x79c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000851) [ 54.935407] IPVS: ftp: loaded support on port[0] = 21 [ 55.131768] IPVS: ftp: loaded support on port[0] = 21 [ 55.216895] IPVS: ftp: loaded support on port[0] = 21 [ 55.261748] IPVS: ftp: loaded support on port[0] = 21 [ 55.364608] IPVS: ftp: loaded support on port[0] = 21 [ 55.462439] IPVS: ftp: loaded support on port[0] = 21 [ 55.640362] IPVS: ftp: loaded support on port[0] = 21 [ 55.804321] IPVS: ftp: loaded support on port[0] = 21 [ 57.103393] ip (4714) used greatest stack depth: 54408 bytes left [ 57.430592] ip (4740) used greatest stack depth: 53944 bytes left [ 57.660978] ip (4760) used greatest stack depth: 53656 bytes left [ 58.119651] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.126127] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.146388] device bridge_slave_0 entered promiscuous mode [ 58.243547] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.250008] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.276016] device bridge_slave_0 entered promiscuous mode [ 58.373563] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.380104] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.414689] device bridge_slave_1 entered promiscuous mode [ 58.487778] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.494247] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.522174] device bridge_slave_1 entered promiscuous mode [ 58.529139] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.535561] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.566433] device bridge_slave_0 entered promiscuous mode [ 58.613281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.620682] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.627169] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.658381] device bridge_slave_0 entered promiscuous mode [ 58.704556] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.806803] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.813301] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.822938] device bridge_slave_1 entered promiscuous mode [ 58.838657] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.873804] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.880279] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.934255] device bridge_slave_1 entered promiscuous mode [ 58.968911] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.988187] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.994693] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.029492] device bridge_slave_0 entered promiscuous mode [ 59.076086] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.082525] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.100474] device bridge_slave_0 entered promiscuous mode [ 59.115430] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.157571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.227020] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.233567] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.277187] device bridge_slave_1 entered promiscuous mode [ 59.310011] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.316544] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.331376] device bridge_slave_0 entered promiscuous mode [ 59.357951] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.365945] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.372449] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.389875] device bridge_slave_0 entered promiscuous mode [ 59.428513] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.434977] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.461171] device bridge_slave_1 entered promiscuous mode [ 59.485586] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.500804] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.522137] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.534877] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.541309] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.569698] device bridge_slave_1 entered promiscuous mode [ 59.593251] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.599724] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.629194] device bridge_slave_1 entered promiscuous mode [ 59.657227] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.700823] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.712807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.721240] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.780135] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.884292] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.926431] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.972217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.983128] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.064606] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.091226] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.112217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.119188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.139661] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.204650] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.213381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.330927] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.355473] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.410459] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.457119] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.466511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.590844] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.602565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.630772] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.637752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.672510] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.698694] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.716894] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.743087] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.776230] team0: Port device team_slave_0 added [ 60.800339] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.857800] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.868379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.885773] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.895842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.923458] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.946694] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.954301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.017826] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.026464] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.041920] team0: Port device team_slave_1 added [ 61.065808] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.139433] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.157672] team0: Port device team_slave_0 added [ 61.173820] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.182991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.209531] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.217793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.267169] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.274567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.297819] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.333200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.349640] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.398688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.418026] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.460824] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.505394] team0: Port device team_slave_1 added [ 61.527354] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.535793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.547553] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.556451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.570463] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.577716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.602303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.620950] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.636697] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.664823] team0: Port device team_slave_0 added [ 61.676818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.714174] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.731678] team0: Port device team_slave_0 added [ 61.783393] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.791445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.810453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.836183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.846566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.855520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.910878] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.926163] team0: Port device team_slave_0 added [ 61.944128] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.960925] team0: Port device team_slave_1 added [ 61.978331] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.999284] team0: Port device team_slave_1 added [ 62.041652] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.058831] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.073762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.090945] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.112783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.133446] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.173961] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.181349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.197991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.234456] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.250585] team0: Port device team_slave_1 added [ 62.257827] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.268926] team0: Port device team_slave_0 added [ 62.289492] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.296435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.314689] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.334453] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.345433] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.366893] team0: Port device team_slave_0 added [ 62.388258] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.409910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.443528] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.453915] team0: Port device team_slave_0 added [ 62.476981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.513500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.530629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.557725] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.565393] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.573082] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.580290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.602686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.626710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.653638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.668496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.676761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.684984] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.692812] team0: Port device team_slave_1 added [ 62.727301] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.735775] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.743676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.756184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.788333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.804243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.824527] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.832012] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.843971] team0: Port device team_slave_1 added [ 62.865640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.894874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.910809] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.923648] team0: Port device team_slave_1 added [ 62.948959] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.959085] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.972951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.991534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.023718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.048105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.066434] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.085326] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.107499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.117770] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.134705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.159839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.197889] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.205740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.223965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.241417] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.248944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.258192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.285363] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.295809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.305922] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.350066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.365448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.383242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.414795] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.426970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.464355] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.525507] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.532479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.547930] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.596488] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.610868] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.649316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.697822] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.705836] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.720425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.791491] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.803517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.822292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.860690] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.868740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.902260] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.935673] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.950339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.967817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.066384] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.073809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.085229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.612233] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.618731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.625558] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.632016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.656008] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.248190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.298024] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.304542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.311376] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.317825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.335493] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.544734] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.551224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.558110] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.564569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.613312] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.724022] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.730527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.737386] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.743836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.788671] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.858023] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.864551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.871427] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.877883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.952470] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.248689] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.255167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.262000] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.268476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.335400] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.341940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.350232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.359271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.368185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.376933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.424252] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.430745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.437675] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.444143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.455253] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.469016] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.475513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.482370] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.488814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.570256] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.360638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.382251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.765515] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.085301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.564719] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.633434] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.776406] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.831713] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.929197] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.034749] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.277858] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.350183] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.439117] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.445384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.457283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.522143] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.587995] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.681824] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.732486] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.739835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.759389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.873796] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.093768] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.231914] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.238259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.248313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.358079] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.383067] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.411433] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.417715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.433924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.509240] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.515503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.531946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.575569] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.676399] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.682699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.698213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.999857] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.006188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.021097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.178888] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.207318] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.219380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.249224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.301172] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.342867] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.550606] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.982359] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.017302] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/30 03:22:42 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x7ff, 0x4) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000001c0)={'team0\x00', @random="4a31366a0e27"}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x20400, 0x0) ioctl$TTUNGETFILTER(r2, 0x801054db, &(0x7f00000000c0)=""/124) r3 = getuid() setfsuid(r3) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00004da000)={0x0, 0x6, 0xffffffffffbffffc}, 0x4) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2000, 0x0) 2018/04/30 03:22:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x2, 0xfffffffffffffdb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa00000400, 0xfffffffdffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000002c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000300)={r2, r3}) pwrite64(r0, &(0x7f00000001c0)="c0dfa96104cc14826c912c971f5f6c9e2f563e3be80e70c0690102456776e826cd1e4624a83019edb59ee840421cfc11831b981a0dcbc47722a8af02e03eabcc9e0c718d01bef9ccd9fa834b2b5e7f659965b3167b02adfb506d4c5ce374619d952094c0dd42e3a1ec1dc470d48fa40fa1ae11f637ac3708f6726e66960f6cd6c005fa85aecb1d4e0f523db26897f890fdb659fadabc375b0585a25d59b1a37e26ad3d8fda65643aa41b5c65d10d5df5be1bc634d8cb0fd633cb5bf91c235a7c5ae784adcff7febccfbd36f08656ec2108c15f3f", 0xd4, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000080)="3b7b52a1f07ea2a1225a1670c29ab1b605791804e092a28cafd5f282bc51f6ffa7c3c876740d038aabb1eb6d77ebbaaf2bee42a4e2bd6f733f482bca46a5def2698e94151aa8a6549b21e7fb2b6067869b9626ba2adccc545d38b523bea97b66f2195112c7b56b475858feb4b92ed4c6b7bc42b4d1483b2433b981d708f2e764ddc71b497a73a30c654d15edf1c7aadc24430857a85506e3b4146dd2ee791589f3d86c8d3539495900628aac73ed730c2b") 2018/04/30 03:22:42 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x4000, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000080)=r1) pipe(&(0x7f00000002c0)) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x0) syz_emit_ethernet(0x36, &(0x7f0000007000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000800450000280000000000069078ac14ffaae000000100004e20", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="504c440f4f780200"], 0x0) getsockname$inet6(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x1c) 2018/04/30 03:22:42 executing program 6: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400102, 0x0) mkdir(&(0x7f0000f73ff6)='./control\x00', 0x0) r0 = inotify_init() r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000340)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) bind$inet(r1, &(0x7f000021d000)={0x2, 0x4e21}, 0x3e) syz_emit_ethernet(0x234, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) inotify_add_watch(r0, &(0x7f0000fc4ff6)='./control\x00', 0x83000865) utimes(&(0x7f00000001c0)='./control\x00', &(0x7f0000000200)={{0x77359400}}) r2 = semget(0x3, 0x0, 0x100) semctl$IPC_RMID(r2, 0x0, 0x0) 2018/04/30 03:22:42 executing program 5: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) clone(0x8000, &(0x7f0000000680)="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", &(0x7f0000000080), &(0x7f00000001c0), &(0x7f00000000c0)) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xc, 0x1, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x4) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000636000)) clock_gettime(0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x989680}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r1, 0x100000000000000) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x111000, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000140)={{0x0, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e22, 0x1, 'none\x00', 0x0, 0xfffffffffffffe01, 0x55}, {@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e22, 0x0, 0x0, 0x0, 0x7}}, 0x44) write$selinux_create(r2, &(0x7f00000000c0)=@access={'system_u:object_r:tpm_device_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x0, 0x30}, 0x34) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/30 03:22:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00006ffff8)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000e0b000)=[{r1}], 0x1, 0xfffffffffffffffd) connect$unix(r1, &(0x7f0000000080)=@abs, 0x6e) socket$bt_rfcomm(0x1f, 0x3, 0x3) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x42001, 0x0) dup(r0) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 2018/04/30 03:22:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) signalfd(r0, &(0x7f0000000140)={0x2}, 0x8) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x20400) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000100)={0xffffffff, 0x1, 0x5, 0x2d, 0x7fff}, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000b04cf4)={0x14, 0x13, 0x100a, 0xfffffffffffffffd}, 0x14}, 0x1}, 0x0) 2018/04/30 03:22:42 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x2, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x3, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x88) fstat(r0, &(0x7f0000000080)) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="020000000000f80002000000e000000200000000000125000000000000000000000000000000f2ffffffffffff070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000"], 0x90) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$eventfd(r2, &(0x7f0000000040)=0x7, 0x8) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000100)={'ip_vti0\x00', {0x2, 0x4e22, @loopback=0x7f000001}}) [ 82.715277] Unknown ioctl -1073191926 [ 82.781685] Unknown ioctl -1073191926 2018/04/30 03:22:42 executing program 7: r0 = socket$inet(0x2, 0x6, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040)=0x6800000, &(0x7f0000000080)=0x4) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000880], 0x0, &(0x7f00000000c0), &(0x7f0000000880)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000090000000000000000006772657461703000000000000000000065716c000000000000000000000000006263736630000000000000000000000900000000000000000000000000000000aaaaaaaaaaaa000000000000000000000000000000000000000070000000f000000040010000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000004c45440000000000000000000000000000040000000000000000000000000000280000000000000073797a31000000000002000000000000000000000000000000000000000000000000000000000000"]}, 0x248) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000680], 0x0, &(0x7f0000000000), &(0x7f0000000680)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'irlan0\x00', "73797a80616c6cf58400", 'eql\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x108, 0x140}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x278) 2018/04/30 03:22:42 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), 0x4) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x2400, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)=0xbb26, 0x4) 2018/04/30 03:22:42 executing program 0: getgroups(0x2, &(0x7f0000000000)=[0x0, 0xffffffffffffffff]) setresgid(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x4000, 0x0) getgroups(0x1, &(0x7f0000000040)=[r0]) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) 2018/04/30 03:22:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x2, 0xfffffffffffffdb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa00000400, 0xfffffffdffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000002c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000300)={r2, r3}) pwrite64(r0, &(0x7f00000001c0)="c0dfa96104cc14826c912c971f5f6c9e2f563e3be80e70c0690102456776e826cd1e4624a83019edb59ee840421cfc11831b981a0dcbc47722a8af02e03eabcc9e0c718d01bef9ccd9fa834b2b5e7f659965b3167b02adfb506d4c5ce374619d952094c0dd42e3a1ec1dc470d48fa40fa1ae11f637ac3708f6726e66960f6cd6c005fa85aecb1d4e0f523db26897f890fdb659fadabc375b0585a25d59b1a37e26ad3d8fda65643aa41b5c65d10d5df5be1bc634d8cb0fd633cb5bf91c235a7c5ae784adcff7febccfbd36f08656ec2108c15f3f", 0xd4, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000080)="3b7b52a1f07ea2a1225a1670c29ab1b605791804e092a28cafd5f282bc51f6ffa7c3c876740d038aabb1eb6d77ebbaaf2bee42a4e2bd6f733f482bca46a5def2698e94151aa8a6549b21e7fb2b6067869b9626ba2adccc545d38b523bea97b66f2195112c7b56b475858feb4b92ed4c6b7bc42b4d1483b2433b981d708f2e764ddc71b497a73a30c654d15edf1c7aadc24430857a85506e3b4146dd2ee791589f3d86c8d3539495900628aac73ed730c2b") 2018/04/30 03:22:42 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace(0xffffffffffffffff, r1) r2 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mem_exclusive\x00', 0x2, 0x0) ftruncate(r2, 0x8) 2018/04/30 03:22:42 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000619ff3)='/dev/snd/seq\x00', 0x0, 0x80001) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00003bbff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000c3fff4)={0x40000006}) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) [ 83.041352] Unknown ioctl -1073191926 2018/04/30 03:22:43 executing program 3: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000240)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x5c) r0 = socket$rds(0x15, 0x5, 0x0) r1 = accept4(r0, &(0x7f0000000540)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, &(0x7f00000004c0)=0x80, 0x0) ioctl$sock_netrom_SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000500)) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x15, 0x5, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) sendmsg(r4, &(0x7f0000000200)={0x0, 0x214, &(0x7f0000000080)}, 0x0) accept4(r1, &(0x7f00000002c0)=@generic, &(0x7f0000000340)=0x80, 0x800) setsockopt$RDS_CANCEL_SENT_TO(r4, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x0, 0x0, 0x0, 0x10000}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='sit0\x00', 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) r7 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000740)="74cfd671c0a308e199d0c4bbbd98e7633f9c049e3cc45d861c4b98f95fc9314617887d5249d9022d586144da2d9fea1774426e6a8816d25544fe0b575629849ddb146e", 0x43, 0x0) r8 = request_key(&(0x7f0000000b40)="6369cd710ca797393fa700b5eda2b4a230c26ecd9a364f61bd5fde7f4e70d326dfee52be87420e3676d6aca985c12390f60eae12794fa58dce5ae3e5b0511bf9c3c1081df34cdfecaa180e43cb37b0dc82e453f1f48864e68c0edbef1f3a3adea8c0ccaae318909dd11258f9e12808c18526a804b296df75cc4f846a1dec7d75b89a557cb0c8de9e93ff99078183701a92e44f78f31d46ae5f213a26e2f07d7e61dc9944603c183d743c353bc7dd2bb8a2a3a97056413e5c295bb472629014c6a33c31b6f41dc5bf0bc6b8e4", &(0x7f00000007c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140)='posix_acl_accessprocnodevkloselfprocwlan1+^system\x00', 0xfffffffffffffff9) r9 = add_key(&(0x7f0000000840)='id_resolver\x00', &(0x7f0000000880)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000008c0)="02f473c97e3059928947b295b8eaef65ba4f66005c65b2aca9706d30fcfdf7841babe34bcbd57e5a5d467e81ee81e2cfa059dd0311154c923520eadf3e48f392407d3b2a2645cdd32b2f5f1dec9c339a239837ee97a07bd6b12ba2ad7a06e551b550e70943adbda0f32315f79dfff375f47480a059ff97b77bd60bddd8b93ed8d1eb6ba38ab902148aebfbfbafe2f17dc073fcd96ff5cc83fa5e617c3b80cd23cfb284f5a3bc4ea63e9c5e43f711c2882f18f758f7243655f2c7f706baf7fe9ac8d6857d829e91745133c58c7689dedfaa9aa985cb5f429471cd16", 0xdb, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f00000009c0)={r7, r8, r9}, &(0x7f0000000a00)=""/9, 0x9, 0x0) sendto$inet(r6, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff}, 0x14) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000480)={0x800, 0x0, 0x1, 0x2}) getsockname$inet(r5, &(0x7f0000000380)={0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10) r10 = socket(0xa, 0x8080e, 0x6) setsockopt$inet6_MCAST_JOIN_GROUP(r10, 0x29, 0x2a, &(0x7f0000000600)={0x6, {{0xa, 0x4e24, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x373}}}, 0x88) sendmsg$unix(r10, &(0x7f0000000200)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="64dac1c80cb4923a0ca68051d34c3ea8a36f671a75bfb3a7", 0x18}], 0x1}, 0x4814) bind$rds(r0, &(0x7f0000000700)={0x2, 0x0, @rand_addr=0x7fff}, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000180)=0xd881, 0x4) [ 84.028513] RDS: rds_bind could not find a transport for 0.0.127.255, load rds_tcp or rds_rdma? [ 84.195278] RDS: rds_bind could not find a transport for 0.0.127.255, load rds_tcp or rds_rdma? 2018/04/30 03:22:44 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0xc004, 0xffffffffffffffff) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 2018/04/30 03:22:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f00000002c0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/30 03:22:44 executing program 6: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000200025f0006b0004200bfc0002ed00080110b50010ff9e1f03ece4959b4af8", 0x23) 2018/04/30 03:22:44 executing program 0: r0 = inotify_init() mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x8802, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xffffffffab0feefb, 0x400000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@ipv4, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000004ec0)=0xe8) stat(&(0x7f00000003c0)='./control/file0\x00', &(0x7f0000000400)) inotify_add_watch(r0, &(0x7f000003a000)='./control\x00', 0x80000d50) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000b3a000)='./control\x00', 0x4000800) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000280)=0xfffffffffffffff8, &(0x7f00000002c0)=0x4) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffe000/0x2000)=nil, 0x1) r4 = creat(&(0x7f000001cff0)='./control/file0\x00', 0x0) bind(r4, &(0x7f0000000000)=@llc={0x1a, 0x337, 0x7fffffff, 0x100, 0x2, 0x65b, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xe}}, 0x80) 2018/04/30 03:22:44 executing program 1: r0 = socket$packet(0x11, 0x4, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x1ff, 0x0, 0x9000}, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000280)={0x2008}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r2, &(0x7f0000000040)='./file0\x00', r3, r4, 0xc00) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @rand_addr}, 0x10) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000004000), &(0x7f0000001ffc)=0xffffffffffffff84) 2018/04/30 03:22:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) sendmsg$key(r0, &(0x7f0000000040)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[], 0x141}, 0x1}, 0x40004) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0)={0x1000, 0x6c, 0x8, 0x6, 0x1}, 0x14) 2018/04/30 03:22:44 executing program 5: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) clone(0x8000, &(0x7f0000000680)="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", &(0x7f0000000080), &(0x7f00000001c0), &(0x7f00000000c0)) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xc, 0x1, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x4) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000636000)) clock_gettime(0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x989680}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r1, 0x100000000000000) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x111000, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000140)={{0x0, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e22, 0x1, 'none\x00', 0x0, 0xfffffffffffffe01, 0x55}, {@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e22, 0x0, 0x0, 0x0, 0x7}}, 0x44) write$selinux_create(r2, &(0x7f00000000c0)=@access={'system_u:object_r:tpm_device_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x0, 0x30}, 0x34) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/30 03:22:44 executing program 4: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) signalfd(r0, &(0x7f0000000000)={0x800}, 0x8) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x927, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r0}) getsockopt$bt_hci(r0, 0x107, 0x9, &(0x7f0000000200)=""/25, &(0x7f0000000240)=0x19) sysfs$1(0x1, &(0x7f0000000280)="2f6465762f72746330008f3e781eb61c6d58c337b413c0ceb6f0df58e92a5975a034d0b0049e0f81391a97a16c92b3cef9ad51c902f8dc2e718b9d04b64e875764be") getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r0}) 2018/04/30 03:22:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xef5000)=nil, 0xef5000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl(r0, 0x720, &(0x7f0000000080)) 2018/04/30 03:22:44 executing program 6: r0 = socket$inet6(0xa, 0x3, 0xff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13}]}, 0x28}, 0x1}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, 0x61) sendmsg$key(r0, &(0x7f0000000280)={0x20480, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@broadcast=0xffffffff, @in=@local={0xac, 0x14, 0x14, 0xaa}}]}, 0x28}, 0x1}, 0x0) 2018/04/30 03:22:44 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000000c0)={0x1000, 0xfffffffffffffffe, 0x0, {r1, r2+10000000}, 0x0, 0x10001}) r3 = epoll_create1(0x0) r4 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x7, 0x2}) r5 = mq_open(&(0x7f0000a04000)='-$\x00', 0x0, 0x0, &(0x7f0000513fc0)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000ae0000)) mq_timedsend(r4, &(0x7f000066c000), 0x0, 0x0, &(0x7f000066cff0)) 2018/04/30 03:22:44 executing program 7: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x8504000000000000) 2018/04/30 03:22:44 executing program 1: r0 = socket(0x1001000000010, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0xffffffffffffffff, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, [@IFLA_INFO_KIND={0x14, 0x1, "69703667726500000000000000060000"}]}]}, 0x38}, 0x1}, 0x0) 2018/04/30 03:22:44 executing program 4: r0 = socket$inet(0x2b, 0x80000000000001, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2}, 0x10) 2018/04/30 03:22:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000001e00030006000000000002003720e0ee0007000000000000002402000100e00000010000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/04/30 03:22:44 executing program 4: 2018/04/30 03:22:44 executing program 2: 2018/04/30 03:22:45 executing program 6: 2018/04/30 03:22:45 executing program 0: 2018/04/30 03:22:45 executing program 7: 2018/04/30 03:22:45 executing program 3: 2018/04/30 03:22:45 executing program 1: 2018/04/30 03:22:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x800000089f2, &(0x7f0000000100)={'sit0\x00', @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) 2018/04/30 03:22:45 executing program 5: 2018/04/30 03:22:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2018/04/30 03:22:45 executing program 6: 2018/04/30 03:22:45 executing program 1: 2018/04/30 03:22:45 executing program 7: 2018/04/30 03:22:45 executing program 0: 2018/04/30 03:22:45 executing program 3: 2018/04/30 03:22:45 executing program 2: 2018/04/30 03:22:45 executing program 4: 2018/04/30 03:22:45 executing program 5: 2018/04/30 03:22:45 executing program 6: perf_event_open(&(0x7f0000723f88)={0x2, 0x70, 0xc34, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x0, 0x0) 2018/04/30 03:22:45 executing program 7: 2018/04/30 03:22:45 executing program 3: 2018/04/30 03:22:45 executing program 1: r0 = socket(0x11, 0x100000803, 0x0) r1 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={"6966623000faffffffffffffff00", 0x5002}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) io_setup(0x469, &(0x7f0000000400)=0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000080)={0x10, 0xa}, 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=@delneigh={0x1c, 0x1d}, 0x1c}, 0x1}, 0x0) io_submit(r2, 0x1, &(0x7f00000016c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000100), 0xfffffc2e}]) 2018/04/30 03:22:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) write$binfmt_elf32(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0xfea8) shutdown(r0, 0x1) 2018/04/30 03:22:45 executing program 2: r0 = socket$inet(0x2b, 0x80000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) 2018/04/30 03:22:45 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:45 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000006ff6)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)) 2018/04/30 03:22:45 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:45 executing program 7: r0 = dup(0xffffffffffffffff) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000040)={r1, 0x3}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000931000)="440d05000000000302070200e9", 0xd) getsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f000065d000)=""/141, &(0x7f000015affc)=0x8d) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x2, 0x7, 0x4, 0x5, 0x39, 0x0, 0x70bd27, 0x25dfdbfd, [@sadb_lifetime={0x4, 0x3, 0x4, 0x800, 0x1000, 0x1}, @sadb_x_policy={0x8, 0x12, 0x4, 0x2, 0x0, 0x6e6bb7, 0x6, {0x6, 0x0, 0x0, 0xffff, 0x0, 0x5, 0x0, @in6, @in6=@dev={0xfe, 0x80, [], 0x17}}}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e23}, @sadb_lifetime={0x4, 0x4, 0x5, 0x9, 0x7, 0x10000}, @sadb_x_nat_t_port={0x1, 0x0, 0x4e20}, @sadb_sa={0x2, 0x1, 0x4d5, 0x9, 0x80000000, 0x18, 0x3, 0x1}, @sadb_x_sec_ctx={0x19, 0x18, 0x1, 0x0, 0xbd, "5d5812c77b932450f654818f255bcf3936fd20fa471433fcae589c46efc06146506155f6d96fc090d7f876a0f413b2e24441cb636ffb1699838eb39cc3c07fb57657c6bd182a32ea0373c087ea48ad482b662649cbf7a7270139edff610f7e0f54f67cb454f03ac7f89b7603147b828eea22fea8629d23fc2f6ababec511a2a043bd4c6a0c6243691b22b69b019a95788123b3a70a87ee6ab4c6fdc1ba824ec98a0464481701fea4c1ebd21204eef3d6875e9889a7b4556e5f4ffb4585"}, @sadb_x_sa2={0x2, 0x13, 0xfffffffffffffffb, 0x0, 0x0, 0x70bd2a, 0x3506}, @sadb_x_policy={0x8, 0x12, 0x4, 0x0, 0x0, 0x6e6bb6, 0x80000001, {0x6, 0x32, 0xfffffffffffffeff, 0x0, 0x0, 0x1000, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [], 0x1b}}}]}, 0x1c8}, 0x1}, 0x8000) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f00000003c0)={'filter\x00', 0x0, 0x4, 0x67, [], 0x2, &(0x7f0000000300)=[{}, {}], &(0x7f0000000340)=""/103}, &(0x7f0000000440)=0x78) 2018/04/30 03:22:45 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa, 0x4000000000000}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f00000c0ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) 2018/04/30 03:22:45 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000f87000)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xaf5, 0x8000040800001) write$evdev(r1, &(0x7f000004d000)=[{{}, 0x2, 0x0, 0x401}, {}], 0x30) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x9) 2018/04/30 03:22:45 executing program 6: perf_event_open(&(0x7f0000723f88)={0x2, 0x70, 0xc34, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x0, 0x0) 2018/04/30 03:22:45 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:46 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:46 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:46 executing program 7: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x7ff, 0x0) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 2018/04/30 03:22:46 executing program 2: r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x2, 0x0, 0x29, 0x8}, 0x10) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'os2.', '{\x00'}) 2018/04/30 03:22:46 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:46 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x600800, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x10001, 0x6, 0x6, 0x7a, 0x80000001}, &(0x7f0000000300)=0x14) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000340)={r2, 0x8ab7}, 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000009c0)={{0x4, 0x0, 0x0, 0x0, "4c46419988b55aa9dccfb1f42cb34fdd48f5e04cf8443f2aa58fa95d683d8dbf1326c9aa89b1c16b08f4657c"}, 0x0, [], {0x77359400}}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/netfilter\x00') connect$ax25(r3, &(0x7f0000000240)={0x3, {"4da41f65621b1e"}, 0x7f}, 0x10) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x20, 0x10000) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x22000) r5 = msgget(0x1, 0x80) msgsnd(r5, &(0x7f00000001c0)={0x1, "1b52362ce49a7df68ad8876706648cfad4ea"}, 0x1a, 0x800) getsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) ioctl$DRM_IOCTL_RM_CTX(r4, 0xc0086421, &(0x7f0000000140)={r6}) 2018/04/30 03:22:46 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x10100) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x80000000006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/30 03:22:46 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:46 executing program 6: ioprio_set$pid(0x0, 0x0, 0xfffffffffffeffff) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 2018/04/30 03:22:46 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:46 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:46 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x10000, 0x80002) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x1c, [], 0xbb}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)="b8", 0x1}], 0x1, &(0x7f00000003c0)}, 0x40) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000240)=""/220) 2018/04/30 03:22:46 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:46 executing program 2: r0 = semget$private(0x0, 0x5, 0x0) semctl$GETPID(r0, 0x0, 0xb, &(0x7f0000000140)=""/98) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=0x10, 0x80000) getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000380), &(0x7f00000003c0)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r2, &(0x7f000026cfff)="b9", 0x1, 0x4008000, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) dup(r2) shutdown(r2, 0x1) write$binfmt_misc(r2, &(0x7f00000000c0)={'syz1', "7c45316599ff319cfea57bf95985e7ceecb1aa420834179709cfa1f05898e921ed4848a6a2c2cc664eb163016939f2776bb0a97f4fa011744c97a001cbe52c644b90f3944f6d49de1cc31efcf204ccd2c8730800b05fb878b57e40a94655b22a5fe110a8835718949593399bff0240187f"}, 0x75) memfd_create(&(0x7f00000002c0)='@$,\x00', 0x1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x0, 0x20}, 0xc) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.ima\x00', &(0x7f0000000080)='@$\x00', 0x3, 0x0) readv(r2, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/35, 0x23}, {&(0x7f0000000240)=""/40, 0x28}], 0x2) 2018/04/30 03:22:46 executing program 4: timer_create(0x5, &(0x7f0000000040)={0x0, 0x9, 0x1}, &(0x7f0000000080)=0x0) timer_settime(r0, 0x1, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000100)) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r2, r1, &(0x7f0000f28ff8), 0x100000002) 2018/04/30 03:22:46 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback={0x0, 0x1}, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}, {}, {}, 0x0, 0x6e6bb8}, {{@in, 0x1000, 0xff}, 0x0, @in=@multicast1=0xe0000001}}, 0xe8) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x60000, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000040)={0x8, 0x5ee9}) 2018/04/30 03:22:46 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x1, 0x200000) r1 = accept$netrom(r0, &(0x7f0000000000), &(0x7f0000000040)=0xfffffd8a) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000080)=0x7fffffff, &(0x7f00000000c0)=0x4) mkdir(&(0x7f0000029ff6)='./control\x00', 0x0) r2 = inotify_init1(0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) inotify_add_watch(r2, &(0x7f0000ad4000)='./control\x00', 0xa4000960) readv(r2, &(0x7f00009a4000)=[{&(0x7f000022c000)=""/32, 0x20}], 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000e21ff6)='./control\x00', 0x0, 0x0) 2018/04/30 03:22:47 executing program 5: socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/md0\x00', 0x40, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/rfkill\x00', 0x321001, 0x0) poll(&(0x7f0000001ac0)=[{r0, 0x100}, {r1, 0x540}, {r2, 0x4}, {r3, 0x20}], 0x4, 0x37ce) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) r4 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000340), &(0x7f0000000480)=0x4) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast2=0xe0000002, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@loopback=0x7f000001, 0x0, 0xff}, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}, 0x161) mkdir(&(0x7f0000d81ff8)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) r5 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x101200) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r5, 0x40405515, &(0x7f00000005c0)={0xb838, 0x5, 0x2, 0x4, "928a706cf6056b3d31c7f1eca7a71b74d55ad5c3cf28328b70c13313f7812e909b976ef3731eefedaa5bd6f1", 0x1}) sendmsg(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)="14e029aef3ab339566ca2a6cb0858f45d61f598e7d83c551142a9649fa27081a274ae2195fa3e43a75068a8f9a08ec27d339cbf24554460cadd1384772e294a01898f157220730d99f5e58963b2aca8fa9fdffe88eec1d881ef97c91696ae29a15fb7b9f04707afa70c1d59fed89149a35190180fb72f0f3b91d45cfcde04c07fcffeac9501a8c47abacba8630938ac057cf3b5bca69dbd93def6a79c993bdb900459e56b623e9bb58812f098027eff4d448be87ed6c56e5a08bddf95fbbef50747ba6f9b01a58644c01f3738428dbd86b223b5afe1e834829", 0xd9}, {&(0x7f00000001c0)="1676d210129e3fa8c4ec59e494e675455d3c3043f36c19252550b3c868eb0a0d7f158063b4446f299b51138d3e4f8141be7dd4ce14da4a39cde030e1efc6a5890926b71e9dff15c650fbade29c0229cdafb87ace76c0d1af9b56d9090e76b2b95132fa56cda4c4fb66dce5d551c2153df79f520c223a38cd5f844b0f20a1c76c1ea3e346a5c73607ad952df0985596f9fdf443f5f32cea9d439bb57044decebe18d31d0f6681698b9a1c115d73d717a15b567d8eede8eb1e91db4f6cd0ad122f840462c93761fe3b50d148059c78fb51719610b6d2aedd32", 0xd8}, {&(0x7f00000002c0)="a0b4e07cb1ece18984", 0x9}, {&(0x7f0000000300)="e447a12695295c79d3bf460ca00c4d5822caff659a9c8ce022d9653f81c2d3b08275d497d08eadfed7d4f6f209f6784dc4801a8b79d390ee24291f8583f94567fbc80b8e129985de624ab65b6e089191c6a2e11630c143a0c9d3ac73836a0ef50e54cef7d886e6d1ce2120bf651eb6e77249b0025868dea6967432f355", 0x7d}], 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="c0000000000000000c010000144e0000bb8f052823a0b12ff6d8e67f49d30d9b9de22b200363e6c00bb8e076eacb341da432291dc520c585305b7e05c2ecdff324fc5e1d3e0e04fce780efe54a685e5920c044e39f4d5cd1ee621d0a45105e143deb1ea785da4240980c290b2e06a96baecef2733561e7ca3ceed02395f48c26badc79aacbce2a7c374d839b24a15150da6a9e1f7796e6c79d98851d1597198e14ecec134a580d94508026e4388ddc6095d20b822a80bed09f00ab67ebee0000009fad72ed19b0ba4ff8fa697e2669404316175d59060d6c9c913188258fa2bc46319c5f437a1749afcd155bcf10cea637"], 0xc0, 0xc080}, 0xc71e11d13763de8d) 2018/04/30 03:22:47 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) 2018/04/30 03:22:47 executing program 7: r0 = socket$unix(0x1, 0x5, 0x0) r1 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00001e9000)) epoll_wait(r1, &(0x7f0000000100)=[{}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) 2018/04/30 03:22:47 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:47 executing program 4: r0 = memfd_create(&(0x7f0000000180)='em1selinux(vmnet0security:\x00', 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000072000000ffd94b245da9f979747d80877dcf0c290966a9ed953474d50e3608c9cd13b2d317c029a5217f11816632da5d5f3edc6099cbf02adcc87d97183103d606fee1f37e320789e657f7ffef746a029dee3f6cba2c8c2e3b8f221b0a834821e77b49af8f12ee02716d29fd06ce9a1fed967c1ef04e"], &(0x7f0000000280)=0x96) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000d79000)=0x4, 0x4) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={r2, 0x48, &(0x7f0000000080)=[@in={0x2, 0x4e23, @loopback=0x7f000001}, @in6={0xa, 0x4e24, 0x50000000000, @loopback={0x0, 0x1}}, @in6={0xa, 0x4e23, 0x7}]}, &(0x7f0000000140)=0x10) 2018/04/30 03:22:47 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f00000000c0)) getsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000100)={@local, @local}, &(0x7f0000000140)=0x8) bind$can_raw(r0, &(0x7f0000000040)={0x1d}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x800) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) dup3(r2, r0, 0x0) 2018/04/30 03:22:47 executing program 2: mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000091c000)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40045109, &(0x7f0000000000)) 2018/04/30 03:22:47 executing program 6: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x20000000010000, 0x2000) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x5}]}, &(0x7f0000f91ffc)=0xfffffffffffffd67) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x2a}], {0x95}}, &(0x7f0000c43000)='GPL\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) socket$pptp(0x18, 0x1, 0x2) 2018/04/30 03:22:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x9, 0x0, "82aa2474c918f81ab460cb8e34042491d086c2226e7267e0f337db4ac54fd3b2c616d6a46f3ab22c4c9ade49e6fe815e6b0fd817e176ff8c84c0814c531570d36ba3d37a1d5bcec31b537f2fed6299d2"}, 0xd8) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="9feff1e21fb7a4eabcad1fc1b2631885ef42ecd2a126070304f0cc7116f17c8d795e038d6aaf4d9eccfb404fd598a699ab03d784862ab4b596e8ded43b388c889db085bc14fea119287ff581aee87bafd86f1722f1a6500c95a9fc8c8ea7e4734a", 0x61, 0x10, &(0x7f0000000080)={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x7ff}, 0x1c) [ 87.686976] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) 2018/04/30 03:22:47 executing program 1: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:47 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) 2018/04/30 03:22:47 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) 2018/04/30 03:22:47 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f00000000c0)) getsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000100)={@local, @local}, &(0x7f0000000140)=0x8) bind$can_raw(r0, &(0x7f0000000040)={0x1d}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x800) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) dup3(r2, r0, 0x0) 2018/04/30 03:22:47 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:47 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:48 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:48 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:48 executing program 6: perf_event_open(&(0x7f0000740000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b86fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) pipe(&(0x7f0000000000)) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x0, &(0x7f0000001ff8), 0x1, 0x2) 2018/04/30 03:22:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f0000000080)=0x1000, 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xbb, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) close(r0) getpeername$packet(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000001c0)=0x14) 2018/04/30 03:22:48 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:48 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x62, 0x10000000002, &(0x7f00000001c0)="51b000afff664fc1f1f17549fd8c98c467ca65df5305dd5fb6594a2a513e3c452f26accdef985a5d09d8103ed2b9aa0c3f6a7c5dc87f8a3cfca35002a8b2dc28df53e17d71125526127d4ca5e40709bd3722ff2ab7c278c110f7b266abe44ea20dde1ed4dcc4f2508f6f632616a161c7531cb085fe169c8b2c6b453c0e4b092697423a4c2661a3356a72fffe7b88081ee83b13217dfbfcb8f842ece747b956003fe5db14f597552ebf04701001b3022c5694d7c368e6c4f3d40cde62d7e1f81a339cf981eb073d", 0xc7) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x208000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x80000001, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={r2, 0x20, &(0x7f0000000100)=[@in={0x2, 0x4e21, @multicast2=0xe0000002}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}]}, &(0x7f0000000180)=0x10) 2018/04/30 03:22:48 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) 2018/04/30 03:22:48 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x9, 0x0, "82aa2474c918f81ab460cb8e34042491d086c2226e7267e0f337db4ac54fd3b2c616d6a46f3ab22c4c9ade49e6fe815e6b0fd817e176ff8c84c0814c531570d36ba3d37a1d5bcec31b537f2fed6299d2"}, 0xd8) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="9feff1e21fb7a4eabcad1fc1b2631885ef42ecd2a126070304f0cc7116f17c8d795e038d6aaf4d9eccfb404fd598a699ab03d784862ab4b596e8ded43b388c889db085bc14fea119287ff581aee87bafd86f1722f1a6500c95a9fc8c8ea7e4734a", 0x61, 0x10, &(0x7f0000000080)={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x7ff}, 0x1c) 2018/04/30 03:22:48 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:48 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f000087bff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)={0xfffffffffffff801, 0x800000003, 0x0, 0x0, 0x84, 0x20000}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000080)) 2018/04/30 03:22:48 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:48 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:48 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x0, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:48 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) [ 88.577223] IPVS: set_ctl: invalid protocol: 0 255.255.255.255:21 rr 2018/04/30 03:22:48 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:48 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:48 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x30000, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000100)=0x2, &(0x7f00000000c0)=0x164) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, "ea33ad7aea7d7a24a5f4b92aa7d65b5940dd3bf40b4e33de3e89a4aa90d11c1d"}) [ 89.108413] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/30 03:22:49 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) 2018/04/30 03:22:49 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) 2018/04/30 03:22:49 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:49 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x0, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:49 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:49 executing program 6: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000000)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40640, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r2, 0x7f}, 0x8) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000180)={'eql\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}}) timer_create(0x7, &(0x7f0000000340)={0x0, 0x21, 0x4, @thr={&(0x7f00000001c0)="b9e98f5fd386e860fee92a0147e9f06e16cd9a33f4a7507886ca6bdbadac90ed4ea8164efd2fd8f3a2fdfda5791c95caa2ce0ce799b84193e35ef4a2944970d62d221023d0f1a324885c9acbbf8e60bb308707bb33bbd9a9caad7dea2593f13c2ab87171e27687c2c9c78acd51c29bbb6602670d8a85593fa3d40fb388b2add909c5bae446fa3c7fa6e73e48e258a2c6730143d78740fc0a8b3d7611cc38ebbf976e7a8db470c597700bae6d5d7853766a079596d5e636158b8f0b964166db", &(0x7f0000000280)="4bc3ac45804540c0195253fa81af962cdff7e6ccb6f07285fa8954211747f315f8830760fba716e17b787e208be81a7963500713b75bf615ae157ef64c64d74fd78f56aa1cfb30ec596cb52abe298698006f119bc17615648d8a539a63f137425bf021c77c3afa94f9da3405cd153043cdb3c35489e4ad586234a37a43a147265f543d0f5d879cc72d07b0334b396b7ec1286080407108c73b4c2cca5fbd3814e4f9287b85e2b6d89b4182b7e956d1ac1f1e"}}, &(0x7f0000000380)=0x0) timer_getoverrun(r5) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000003c0)={r4, @in6={{0xa, 0x4e23, 0x3da6, @local={0xfe, 0x80, [], 0xaa}, 0x80000000}}}, &(0x7f0000000480)=0x84) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz0\x00', 0x1ff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000500)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in6={0xa, 0x4e23, 0x73fb, @dev={0xfe, 0x80, [], 0x19}, 0xfffffffffffffff7}, @in={0x2, 0x4e24, @multicast1=0xe0000001}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e20, @loopback=0x7f000001}, @in6={0xa, 0x4e23, 0x6, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x1}, @in6={0xa, 0x4e21, 0xce, @local={0xfe, 0x80, [], 0xaa}, 0x4}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e22, @rand_addr=0x400}], 0xb4) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f00000005c0)=0xffffffffffffffff) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000600), 0x2) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000640)={r2, 0x9c4, 0x520, 0xd8}, 0x10) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000680)='tls\x00', 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000006c0)=0x3, 0x4) readahead(r1, 0x1, 0x2) r6 = accept$alg(r1, 0x0, 0x0) r7 = accept4(r6, &(0x7f0000000700)=@in={0x0, 0x0, @remote}, &(0x7f0000000780)=0x80, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000000)=0xe8) sendto$packet(r1, &(0x7f00000007c0)="0cc3657db89a621ae08a16015deda41dd9d3a528d70a2b4af03088badf7f62dc21d35045b477b66a271e99f4228d58a58d14dc7844831223b821cdbcfb685ea06d1ce180b8226deed8b9663762ba521b76a77db09dfc", 0x56, 0x800, &(0x7f0000000980)={0x11, 0x13, r8, 0x1, 0x10001, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000009c0)={0x4, 0x8005, 0x101, 0x20, r3}, &(0x7f0000000a00)=0x10) io_setup(0x5, &(0x7f0000000a40)=0x0) io_cancel(r9, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0xf, 0x401, r6, &(0x7f0000000a80)="781a722c86c2a5c00b0a75ed82b99f3cff6d279926723fa415c6bef36c32c5faa8a4d880cebedbf303f97fa4633fe0839d6af0bd8df83d7d18f37ccc99b8464375caf9f252", 0x45, 0x4, 0x0, 0x0, r7}, &(0x7f0000000b40)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000b80)={0x1ff, 0x10000, 0x7fffffff, 0x8, 0xfffffffffffffffd, 0x9bd9, 0x9, 0x8, 0x5, 0x0, 0x81, 0x1ff}) r10 = accept4$unix(r7, &(0x7f0000000bc0)=@abs, &(0x7f0000000c40)=0x6e, 0x800) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000c80), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r10, 0x50, &(0x7f0000000cc0)}, 0x10) ioctl$TIOCLINUX7(r10, 0x541c, &(0x7f0000000d80)={0x7, 0x4}) 2018/04/30 03:22:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x100000001, 0x4, r0}, 0x2c) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], 0x16) 2018/04/30 03:22:49 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 89.222576] IPVS: set_ctl: invalid protocol: 0 255.255.255.255:21 rr 2018/04/30 03:22:49 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:49 executing program 5: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) 2018/04/30 03:22:49 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:49 executing program 3: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000619ffc)=0x3, 0x4) r1 = semget(0x2, 0x0, 0x400) semop(r1, &(0x7f0000000080), 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00004aaffc)=0x6, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x2b, &(0x7f0000000200), &(0x7f00000001c0)=0xfffffffffffffef9) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') 2018/04/30 03:22:49 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) 2018/04/30 03:22:49 executing program 6: mkdir(&(0x7f0000000000)='./file0/bus/file0\x00', 0x7) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x3}) 2018/04/30 03:22:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000900)={0x400, {{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1, 0x9, [{{0x2, 0x4e21, @multicast1=0xe0000001}}, {{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}}, {{0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e20}}, {{0x2, 0x4e28, @rand_addr=0x7}}, {{0x2, 0x4e20, @loopback=0x7f000001}}, {{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x8000000004e21, @local={0xac, 0x14, 0x14, 0xaa}}}]}, 0x510) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000380)={0x35, &(0x7f0000000340)}, 0x10) 2018/04/30 03:22:49 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:49 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x0, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:49 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:49 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) 2018/04/30 03:22:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000900)={0x400, {{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1, 0x9, [{{0x2, 0x4e21, @multicast1=0xe0000001}}, {{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}}, {{0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e20}}, {{0x2, 0x4e28, @rand_addr=0x7}}, {{0x2, 0x4e20, @loopback=0x7f000001}}, {{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x8000000004e21, @local={0xac, 0x14, 0x14, 0xaa}}}]}, 0x510) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000380)={0x35, &(0x7f0000000340)}, 0x10) 2018/04/30 03:22:49 executing program 6: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:49 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) 2018/04/30 03:22:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000619ffc)=0x3, 0x4) r1 = semget(0x2, 0x0, 0x400) semop(r1, &(0x7f0000000080), 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00004aaffc)=0x6, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x2b, &(0x7f0000000200), &(0x7f00000001c0)=0xfffffffffffffef9) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') 2018/04/30 03:22:49 executing program 3: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) [ 89.838324] IPVS: set_ctl: invalid protocol: 0 0.0.0.5:20003 ovf 2018/04/30 03:22:49 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:49 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) 2018/04/30 03:22:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000900)={0x400, {{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1, 0x9, [{{0x2, 0x4e21, @multicast1=0xe0000001}}, {{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}}, {{0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e20}}, {{0x2, 0x4e28, @rand_addr=0x7}}, {{0x2, 0x4e20, @loopback=0x7f000001}}, {{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x8000000004e21, @local={0xac, 0x14, 0x14, 0xaa}}}]}, 0x510) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000380)={0x35, &(0x7f0000000340)}, 0x10) 2018/04/30 03:22:49 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x0, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) 2018/04/30 03:22:49 executing program 3: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:49 executing program 6: r0 = signalfd(0xffffffffffffff9c, &(0x7f0000000200), 0x8) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x100) r2 = dup2(r0, r1) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x4000000000000019, &(0x7f0000000000)=0xb6c, 0x3e0) sendto$inet6(r3, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000f5afe4)={0xa, 0x4e23}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x31, &(0x7f0000000040)=0x3f, 0x4) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000180)={0x53, 0xffffffffffffffff, 0x8, 0x1, @buffer={0x0, 0x11, &(0x7f0000000080)=""/17}, &(0x7f00000000c0)="7367d8fc60c10691", &(0x7f0000000100)=""/56, 0x7, 0x21, 0x2, &(0x7f0000000140)}) recvfrom$inet6(r3, &(0x7f0000219000)=""/246, 0xf6, 0x23fffa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000280)=0xcc5a, 0x4) 2018/04/30 03:22:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@local={0xfe, 0x80, [], 0xaa}, 0x57, r2}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in=@rand_addr, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x32}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) shutdown(r1, 0x2) fcntl$notify(r0, 0x402, 0x4) 2018/04/30 03:22:50 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) [ 90.024234] IPVS: set_ctl: invalid protocol: 0 255.255.255.255:21 rr 2018/04/30 03:22:50 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000900)={0x400, {{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1, 0x9, [{{0x2, 0x4e21, @multicast1=0xe0000001}}, {{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}}, {{0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e20}}, {{0x2, 0x4e28, @rand_addr=0x7}}, {{0x2, 0x4e20, @loopback=0x7f000001}}, {{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x8000000004e21, @local={0xac, 0x14, 0x14, 0xaa}}}]}, 0x510) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000380)={0x35, &(0x7f0000000340)}, 0x10) [ 90.139530] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/30 03:22:50 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) 2018/04/30 03:22:50 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) 2018/04/30 03:22:50 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:50 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) 2018/04/30 03:22:50 executing program 6: r0 = socket$inet6(0xa, 0x806, 0x0) listen(r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x10d, 0x10, &(0x7f0000019b50)=@raw={"0f00", 0x9, 0x3, 0x288, 0x0, 0xffffffff, 0xffffffff, 0x380, 0xffffffff, 0x380, 0xffffffff, 0xffffffff, 0x380, 0xffffffff, 0x3, &(0x7f0000024000), {[{{@ipv6={@local={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ipv6={@mcast2={0xff, 0x2, [], 0x1}, @local={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x0, 0xa8, 0xfffffffffffffe2e}, @unspec=@CT0={0x876a31fef6a79ceb, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00'}}}], {{[], 0x0, 0xa8, 0x2e9}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0xfda0) r1 = socket(0x2, 0x5, 0x7) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) 2018/04/30 03:22:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@local={0xfe, 0x80, [], 0xaa}, 0x57, r2}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in=@rand_addr, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x32}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) shutdown(r1, 0x2) fcntl$notify(r0, 0x402, 0x4) 2018/04/30 03:22:50 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000080)=0x66, 0x4) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@ax25, 0x385, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/157, 0x9d}, 0x0) shutdown(r0, 0x0) shutdown(r0, 0x0) 2018/04/30 03:22:50 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x0, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:50 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 90.432495] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/30 03:22:50 executing program 0: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:50 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) 2018/04/30 03:22:50 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) 2018/04/30 03:22:51 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x0, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:51 executing program 6: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@local={0xfe, 0x80, [], 0xaa}, 0x57, r2}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in=@rand_addr, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x32}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) shutdown(r1, 0x2) fcntl$notify(r0, 0x402, 0x4) 2018/04/30 03:22:51 executing program 5 (fault-call:1 fault-nth:0): r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) 2018/04/30 03:22:51 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:51 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) mmap(&(0x7f0000431000/0x400000)=nil, 0x400000, 0x7ffffffff, 0x4010, r0, 0x200010000000) unshare(0x40600) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000499000)=""/35, &(0x7f000020a000)=0x23) 2018/04/30 03:22:51 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) [ 91.222152] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/30 03:22:51 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) futex(&(0x7f0000000000)=0x2, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x2, 0x2) 2018/04/30 03:22:51 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x0, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:51 executing program 6: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:51 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x0, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:51 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) 2018/04/30 03:22:51 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0x0, 0x3d}, 0x2c) 2018/04/30 03:22:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@local={0xfe, 0x80, [], 0xaa}, 0x57, r2}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in=@rand_addr, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x32}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) shutdown(r1, 0x2) fcntl$notify(r0, 0x402, 0x4) 2018/04/30 03:22:51 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f00000000c0)=@ethtool_drvinfo={0x3, "96a7e69aa3cc6e0536509b235576812efcc15ab62fac9779df674761a33373fb", "f1a8b3a3bffe912f32d4dbc9bc92f98814da0c929079eb5a9ebe1397b648a764", "c2975dd7ace88e8e5d1923ba06cc90f83ad2213ed96fdf7b0123576abf22615c", "bcb1adc390cba0f5a3a7924e3a6f7eb87e9b588288281c7bad3e474ed105b76e", "7d32b287111ee2403471443f403884443e3f7fb90eb6b8e6f080836708538577", "f4fb493d7d16c09ca549a8bf"}}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x105000) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f00000001c0)) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) [ 91.419551] IPVS: set_ctl: invalid protocol: 0 255.255.255.255:21 rr [ 91.454508] IPVS: set_ctl: invalid protocol: 0 255.255.255.255:0 rr 2018/04/30 03:22:51 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x2f, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00', 0x0, 0x8, 0xffffffffffffffff}, 0x2c) 2018/04/30 03:22:51 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff}, 0x2c) 2018/04/30 03:22:51 executing program 6: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) 2018/04/30 03:22:51 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x0, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:51 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) [ 91.571502] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 91.689462] IPVS: set_ctl: invalid protocol: 47 255.255.255.255:21 rr [ 91.708685] IPVS: set_ctl: invalid protocol: 0 255.255.255.255:21 rr 2018/04/30 03:22:51 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:51 executing program 4: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='nBt/dev_snmp6\x00') readv(r1, &(0x7f000005a000)=[{&(0x7f0000d1d000)=""/203, 0x52e}], 0x1) write$binfmt_script(r1, &(0x7f00000001c0)={'#! ', './file0', [{0x20, "6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a8c8bc05a6220da4b1476e30a86bc0d37a6438"}, {0x20, "6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a8c8bc05a6220da4b1476e30a86bc0d37a6438"}, {0x20, 'ramfs\x00'}], 0xa, "f9d8550a039cce6474ea77e9e78b0b5cc112c918fa1193c89518ba5832dec422d642bf3bd9fbcaecd1f1612f954b55e5c4a7ecdd0a9b7388b7c6b9aeeac59bfedcc0f379a1c564785f7728e2d7d3a1eb00ece277789b9156b390a9813894191d86f5ddda2a58d65c9d088166f36512be30"}, 0x16f) mount(&(0x7f000000a000)='.', &(0x7f0000000040)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000680)=""/37, 0x25}, {&(0x7f0000000440)=""/184, 0xb8}], 0x1153) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x9) 2018/04/30 03:22:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@local={0xfe, 0x80, [], 0xaa}, 0x57, r2}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in=@rand_addr, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x32}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) shutdown(r1, 0x2) 2018/04/30 03:22:51 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:51 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000707ff0)={0x0, 0x10, &(0x7f0000f3eff0)=[@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}, &(0x7f0000000100)=0x10) shutdown(r0, 0x2000000000000002) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080), 0x14) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x1000}], 0x1) 2018/04/30 03:22:51 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x0, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:51 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) 2018/04/30 03:22:51 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) [ 91.936478] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 91.956795] IPVS: set_ctl: invalid protocol: 0 255.255.255.255:21 rr 2018/04/30 03:22:52 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xfffffffffffffff7, 0x20001) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) seccomp(0x1, 0x1, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x8001, 0x100, 0x3, 0x1}, {0x2, 0x7fffffff, 0x6, 0x2b6}]}) r2 = msgget(0x3, 0x4) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000180)=""/176) r3 = inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x20000102) inotify_rm_watch(r0, r3) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) socket$inet6(0xa, 0x8000a, 0x7fff) 2018/04/30 03:22:52 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x0, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:52 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000012000)={0x0, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) 2018/04/30 03:22:52 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d13f6637, 0x10800a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) capset(&(0x7f0000000040)={0x39980732, r1}, &(0x7f0000000080)={0x1, 0x4, 0x571, 0x0, 0x7, 0x7}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000efb000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/30 03:22:52 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x106) signalfd4(r0, &(0x7f0000000080)={0x6}, 0x8, 0x80800) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x84, @broadcast=0xffffffff, 0x4e21, 0x0, 'rr\x00', 0x0, 0x0, 0x4d}, 0x2c) [ 92.146375] IPVS: set_ctl: invalid protocol: 0 0.0.0.5:20003 ovf 2018/04/30 03:22:52 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:52 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000707ff0)={0x0, 0x10, &(0x7f0000f3eff0)=[@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}, &(0x7f0000000100)=0x10) shutdown(r0, 0x2000000000000002) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080), 0x14) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x1000}], 0x1) 2018/04/30 03:22:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@local={0xfe, 0x80, [], 0xaa}, 0x57, r2}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in=@rand_addr, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x32}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) 2018/04/30 03:22:52 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:52 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001080)='/dev/vga_arbiter\x00', 0x301001, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000010c0)={0x0, @loopback, @multicast1}, &(0x7f0000001100)=0xc) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) getcwd(&(0x7f0000000080)=""/4096, 0x1000) 2018/04/30 03:22:52 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000012000)={0x0, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) 2018/04/30 03:22:52 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x3, 'lc\x00'}, 0x2c) 2018/04/30 03:22:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000232ff6)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) getsockopt$inet_tcp_buf(r1, 0x6, 0x7d66d493dadb3b89, &(0x7f0000000100)=""/54, &(0x7f0000000140)=0x36) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000080)={r2, 0x2}) r3 = syz_open_pts(r0, 0x0) write(r0, &(0x7f00000003c0)="a2f5d65772deea303e0200001100002d89360ac2017c926d5ec1a2420de2395f6427e3efbb00000f041075fd", 0x2c) ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f00000000c0)) [ 92.804576] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/30 03:22:52 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x0, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:52 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:52 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000012000)={0x0, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) 2018/04/30 03:22:52 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000100)={0x8, 0x8, 0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:52 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) r1 = semget$private(0x0, 0x1, 0x40) semctl$SETVAL(r1, 0x5, 0x10, &(0x7f0000000080)=0x6) r2 = semget$private(0x0, 0x3, 0x0) semop(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) 2018/04/30 03:22:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@local={0xfe, 0x80, [], 0xaa}, 0x57, r2}) 2018/04/30 03:22:53 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001080)='/dev/vga_arbiter\x00', 0x301001, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000010c0)={0x0, @loopback, @multicast1}, &(0x7f0000001100)=0xc) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) getcwd(&(0x7f0000000080)=""/4096, 0x1000) 2018/04/30 03:22:53 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x0, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:53 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) [ 93.078211] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/30 03:22:53 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:53 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0xfffffffffffffffb) 2018/04/30 03:22:53 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="0800000001000800ff7f0100950f180c07002100"], 0x14) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000180)={"726f736530000500000000023f00", @ifru_names='rose0\x00'}) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = memfd_create(&(0x7f0000000000)='rr\x00', 0x1) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000200)=0xc8, 0x4) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="81a17f8dbf1bf9b120c7dd34cf14c5bc", 0x10) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = accept4$inet6(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x1c, 0x800) setsockopt$inet_tcp_int(r2, 0x6, 0x15, &(0x7f00000001c0)=0x62, 0x4) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r4, &(0x7f0000000240)={0x40000000}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x8000000005c, @broadcast=0xffffffff, 0x15, 0xfffffffffffffffc, 'rr\x00', 0x4}, 0x2c) 2018/04/30 03:22:53 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000040)=0x14) 2018/04/30 03:22:53 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0x0, 0x3d}, 0x2c) 2018/04/30 03:22:53 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@local={0xfe, 0x80, [], 0xaa}, 0x57, r2}) 2018/04/30 03:22:53 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) [ 93.705516] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 93.718268] IPVS: set_ctl: invalid protocol: 92 255.255.255.255:21 rr 2018/04/30 03:22:53 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) [ 93.762753] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/30 03:22:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000100)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) getpeername$packet(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000340)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) accept4$packet(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000400)=0x14, 0x80000) recvmsg(r1, &(0x7f0000000680)={&(0x7f0000000440)=@can={0x0, 0x0}, 0x80, &(0x7f0000000640)=[{&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/6, 0x6}, {&(0x7f0000000580)=""/152, 0x98}], 0x3, 0x0, 0x0, 0x20}, 0x40012003) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000700)={@local, 0x0}, &(0x7f0000000740)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000780)={0x0, @empty, @multicast2}, &(0x7f00000007c0)=0xc) getsockname$packet(r1, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000840)=0x14) accept4$packet(r1, &(0x7f0000000980)={0x0, 0x0, 0x0}, &(0x7f00000009c0)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000a00)={'vcan0\x00', 0x0}) getpeername$packet(r1, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000001300)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001340)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4}}, &(0x7f0000001440)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000001940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001900)={&(0x7f0000001480)={0x47c, r2, 0x400, 0x70bd26, 0x25dfdbff, {0x3}, [{{0x8, 0x1, r3}, {0x104, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r4}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0xec}}, {0x8, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x130, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r9}, {0x21c, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r10}}, {0x8, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x186}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r11}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r12}}, {0x8, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x652a}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r14}}}]}}]}, 0x47c}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 2018/04/30 03:22:53 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x4000, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000000c0)=""/240) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:53 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) 2018/04/30 03:22:53 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff}, 0x2c) 2018/04/30 03:22:53 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) r1 = dup3(r0, r0, 0x80000) getsockopt$ax25_int(r1, 0x101, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) 2018/04/30 03:22:54 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='syz_\x00\x00n\x00', 0xfffffffffffffd33) r1 = dup2(r0, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x12000) sendmmsg$unix(r1, &(0x7f0000000e00)=[{&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000940), 0x0, &(0x7f0000000d80)}], 0x1, 0x40) [ 93.978690] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/30 03:22:54 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/30 03:22:54 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) 2018/04/30 03:22:54 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:54 executing program 4: r0 = socket$inet6(0xa, 0x2100000000000002, 0xfffffffffffffffd) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}}}, 0x7b) r1 = getpgid(0x0) ptrace$cont(0x7, r1, 0x250, 0x8) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000040)={'bond_slave_0\x00', @ifru_settings={0xffffffffffffff9f, 0x2, @fr_pvc_info=&(0x7f0000000000)={0x64f4, 'veth0_to_bridge\x00'}}}) 2018/04/30 03:22:54 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x10280, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000000c0)=0x6) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e23, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) 2018/04/30 03:22:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) 2018/04/30 03:22:54 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) 2018/04/30 03:22:54 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x7, 0x2000) pipe(&(0x7f0000000140)={0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={r1, r2, 0x4, 0x2}, 0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-256,ctr(camellia))\x00'}, 0xb) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x1) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f00000000c0)=""/44) [ 94.288463] ================================================================== [ 94.295880] BUG: KMSAN: uninit-value in alg_bind+0xe3/0xd90 [ 94.301588] CPU: 1 PID: 7414 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 94.308420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.317770] Call Trace: [ 94.320356] dump_stack+0x185/0x1d0 [ 94.323977] ? alg_bind+0xe3/0xd90 [ 94.327516] kmsan_report+0x142/0x240 [ 94.331315] __msan_warning_32+0x6c/0xb0 [ 94.335370] alg_bind+0xe3/0xd90 [ 94.338739] ? alg_sock_destruct+0x160/0x160 [ 94.343148] SYSC_bind+0x3f2/0x4b0 [ 94.346694] ? syscall_return_slowpath+0xe9/0x700 [ 94.351547] SyS_bind+0x54/0x80 [ 94.354827] do_syscall_64+0x309/0x430 [ 94.358723] ? SYSC_socketpair+0x14a0/0x14a0 [ 94.363137] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 94.368322] RIP: 0033:0x455979 [ 94.371510] RSP: 002b:00007fb6134b8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 94.379218] RAX: ffffffffffffffda RBX: 00007fb6134b96d4 RCX: 0000000000455979 2018/04/30 03:22:54 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0', "08dcfeebdf1bc2ed04f9991ff9af604eec27659b0103ddd7072fb09752acc7b3a5cfaa2227"}, 0x29) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x16943e, 0x0) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRES64], 0xfffffe80) 2018/04/30 03:22:54 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast=0xffffffff, 0x15, 0x0, 'rr\x00'}, 0x2c) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000100)=0x85d) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @rand_addr=0x5, 0x4e24, 0x0, 'ovf\x00', 0x10, 0xffffffff, 0x3d}, 0x2c) [ 94.386488] RDX: 000000000000000b RSI: 0000000020000000 RDI: 0000000000000013 [ 94.393763] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 94.401029] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 94.408298] R13: 000000000000001e R14: 00000000006f4370 R15: 0000000000000000 [ 94.415563] [ 94.417183] Local variable description: ----address@SYSC_bind [ 94.423056] Variable was created at: [ 94.426770] SYSC_bind+0x6f/0x4b0 [ 94.430220] SyS_bind+0x54/0x80 2018/04/30 03:22:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) [ 94.433487] ================================================================== [ 94.440836] Disabling lock debugging due to kernel taint [ 94.446278] Kernel panic - not syncing: panic_on_warn set ... [ 94.446278] [ 94.453647] CPU: 1 PID: 7414 Comm: syz-executor6 Tainted: G B 4.16.0+ #87 [ 94.461777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.471122] Call Trace: [ 94.473713] dump_stack+0x185/0x1d0 [ 94.477346] panic+0x39d/0x940 [ 94.480561] ? alg_bind+0xe3/0xd90 [ 94.484102] kmsan_report+0x238/0x240 2018/04/30 03:22:54 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, 0xfffffffffffffffc, 0x2, [@loopback=0x7f000001, @rand_addr]}, 0x18) [ 94.487907] __msan_warning_32+0x6c/0xb0 [ 94.491966] alg_bind+0xe3/0xd90 [ 94.495336] ? alg_sock_destruct+0x160/0x160 [ 94.499749] SYSC_bind+0x3f2/0x4b0 [ 94.503292] ? syscall_return_slowpath+0xe9/0x700 [ 94.508143] SyS_bind+0x54/0x80 [ 94.511424] do_syscall_64+0x309/0x430 [ 94.515318] ? SYSC_socketpair+0x14a0/0x14a0 [ 94.519733] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 94.524919] RIP: 0033:0x455979 [ 94.528110] RSP: 002b:00007fb6134b8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 94.535820] RAX: ffffffffffffffda RBX: 00007fb6134b96d4 RCX: 0000000000455979 [ 94.543086] RDX: 000000000000000b RSI: 0000000020000000 RDI: 0000000000000013 [ 94.550352] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 94.557618] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 94.564890] R13: 000000000000001e R14: 00000000006f4370 R15: 0000000000000000 [ 94.572574] Dumping ftrace buffer: [ 94.576096] (ftrace buffer empty) [ 94.579780] Kernel Offset: disabled [ 94.583380] Rebooting in 86400 seconds..