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", @generic="b40df202037398c9dcbe8f2f380e66e8c6defdb380e6b3cca1f0a25379b10a21242d3b9cad82780b97b535c523ffbdb19350ad031721858cd4d3fe4ec5e109c6f5296d1dfd5d5b28c4c116632f6decb93ecc1e4b917ef320318370f3605c891420cc484bd279c5c265fce96126d4135ad7d489928a70c10a98977cbb05046e1a6a40214c3561e464b583c7859c52585c8e0b1aea16234015b31d1aaf744a6b347214c77f7c8c62d875ee78960cfa67775280624ac5f4c144f491ae491680b0707f4f7a110b548da42e8b3eab254b"]}]}, 0x1614}, {&(0x7f0000004140)={0x27c, 0x2b, 0x801, 0x70bd2a, 0x25dfdbff, "", [@typed={0x4, 0x38}, @nested={0x268, 0x3e, [@generic="547cee4570cd2f6a8551c45a9086a38d10f9fd15dbf0757ff5a7a5dd2eac294856bd52212c6dfb437e1991eecd737a2a7b802a48f0ebceef23d575c661cc7b44c2fff5d82a17ec1a15070941f2b22eab41c3f60c976a018b247a731d390314d320dd122372c5ab854193faf7895651b78e52760d6c4448891cbe14baa9195f3819a8a26cdb213cfb97149d66ee4ee99bea197fdf2afadf5bbf6dfe6bd450a1ef480da6257a6b7425f620fe6df5d388f2ea6a9e1bb0d9bc7fabe5147bd50febeae9efca6007f48668e16f0049fd62ba261147d57497803f18826b6ba0a13fa1569d89fe928d7a347e45ec2df6900b13c06f", @generic="0948b36573599f280bfc61e2c4f883f0dbcf153051e60e907f1e3bef79fea1c544b2971cd68663e9b7239042a040", @generic="9e9d2da0564026dc33a0d24e0ec1bf3ba4c5d532157c1ab982ea51b2c51072b34d240cbef9c1139006aaddae3774a0dcf9ccfa0d180b7dd9bc8fed3a70fb05727f30e088d7fb5ad005a405767457c32d93ead9c1de407d", @generic="06ed547676cb1dd799371fd6363f36ee3236686d8376a2166668b511fac21613abb14e49edcbe439ac7a0bff7c5ef48225603c6e03ae8f8b416d41f37832b83884dc4b91722e0ab191093d70853de0a88266a4f5cecf225fc78a2da4612d61183eee96e428cdf30e4b326d828ee1b6f3be714cfe49fdc1ed4846c568b95869810239057dd095809b34c7be1f93ea4ff1f3900d0e04a14b4e64aa62f2631e244cc62e2524ec09116ef4d9f42e633468208aaa463df381d733cfc586da05c59c4547fad99182052eba338b1356132546f5b43539383d1caf0cdcb10174eec680f8fe599d7de46e0c63524cd1729b03"]}]}, 0x27c}, {&(0x7f0000004500)={0x1c0, 0x17, 0x200, 0x70bd25, 0x25dfdbff, "", [@nested={0xd0, 0x22, [@typed={0x8, 0x69, @uid=r12}, @generic="cd6f5d26ee28387f73c8a302725fe0c95a15cdd468397cce8370c7d75259feb67794cd4f1ef7199f9c18c12a0810d1f00c1ef7db279492b017fc03586e750f22ad4fcdb931d856df82a63bcc187179b472e6e36945325d", @generic="6b6dd7212daa5200471adc39f4a2d539dae35b6e15f828b430d4aaabf0c6d94a5e0d0399bc6c492af0604494cfa3d5bfbd13a8d8cb6db65678bbf27d6a11d95db4b8d0089bcbb8932e8d2a3c620f8728b9acb92a130d31df5dc3c092", @typed={0x10, 0x3a, @str='wlan0GPL\x00'}]}, @generic, @generic="2881de759215a07cc854925ca7cc9c098588d229f6fe097f6e6d8690da3c722f978a50b385a5ccf430c0763eac9829e8a6cc1d91675dca4479efcfc13cddfcc469accd6188adf7352148f93e24793f175a358c74b433d6ac15e5aa12bd8a5d1c4dc8241b8e11cbed2654374f8dce4e29988b8773067286aced2256a9c3c2ae51a15b41f35b59c9d8b8ae374b61a707783a1b200840b354255cbd6516c56538b7fe4950385be30a858a6177d44b58a07ed9293d3858ef3f5d780cd951df1739f4f22b67af7b945d5de2d375869694300a11f2d68c5bfe9d3d23abd6d392dc96ba"]}, 0x1c0}], 0x9, 0x0, 0x0, 0x10}, 0x840) ioctl$TIOCSTI(r3, 0x5412, 0x3) mmap(&(0x7f0000000000/0xf9a000)=nil, 0xf9a000, 0x2, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x80000) getpeername$inet(r3, &(0x7f0000000a00)={0x0, 0x0, @multicast1}, &(0x7f0000000a40)=0x10) accept4$nfc_llcp(r4, 0x0, &(0x7f00000009c0), 0x800) getsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000a80), &(0x7f00000049c0)=0x4) close(r1) 2018/04/30 15:51:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f00000003c0)='M', 0x1, 0x20000001, &(0x7f0000000540)={0xa, 0x4e22}, 0x1c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000000)=""/66, 0x42) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = getpgrp(0x0) r4 = fcntl$getown(r1, 0x9) r5 = getuid() sendmsg$nl_netfilter(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000080}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)={0x344, 0x10, 0x0, 0x2, 0x70bd25, 0x25dfdbfb, {0xd, 0x0, 0x5}, [@typed={0x8, 0x94, @pid=r3}, @typed={0x8, 0x4c, @pid=r4}, @nested={0x190, 0x62, [@generic="1e86c8b4a35c49c9f43ae9ab6b700385686925c42c2d5977116f7f327e9cd12f78fbfa6bb483c39f19b3a60c826119e9379259b61480c1dd9e8ad3d1825368e355c860f6e045916c16a0f2cdc67c11234d5eef313473a19ba041fdb2f51fee6dd309af390867947a5d2bfba1073c8f07abd3bf76", @generic, @typed={0xc, 0x5, @u64=0xffff0}, @generic="f3874a3c380c5d449dfcc927", @typed={0x8, 0x8c, @uid=r5}, @typed={0x8, 0x5a, @str='\x00'}, @typed={0x8, 0x58, @ipv4=@loopback=0x7f000001}, @generic="67423a6ab3d7aca08a5fd059b1a5e64196f2580031c83dda92fa4a2ee9d6e5100b79392493d485b04ecbdfec2d2a2f793a69400bc2877d93dd4d7e6cc73edc7f0ddbec9410ba7fda445d5e853454bc2bdce8f67451f2397887da7655b2b4a1a4167b560978993f", @generic="47dc7da90c54c2283d99d20cd877d87873bdfb2755c58547305eb2fd6f4c9e1db9a5f5ebbc6baaac35a2a7408d36c8b9a60c07ad35249014dea07ae43201e9b7d5fcdd880d9a78e68d9b2ba426447685881d4a80b713c0fe94c0f6580e0bfb3831734e77d21555af168f67b4d1d6532c18e91e142527d1b6e8337921874326"]}, @generic="0026aaeea453781d73b6de05466cc549d3c604ffd619bc749eb3bfabf5edfe5c7684cbcc26952160b1740c986a9707d630367f1ca8aecd2384fcccdf36e82b3bc7e59f239afd246fcb46d02c48812d44df85f7e3186e0fbb0d8b1eded77d7673b722552dbd3d5a871e49af0a2c2ad3cee6ec67a96a42780d35d08139d653559d4abff788d86e209cf866385f86acc62cb716f6796fcf55912debe6a7", @generic="1da95cd43c4a2c5e790adc3e843fdb55af80257a31893075ea460489562a02a2527777b0bb8cf93aa3cca83daa125937087a79593c1373e1f94faf68c65d2a2c959fac9aa04a52574ad4771aeca9860b03f5a1dfb66a1d0f0d6fad453decf41ee6b09a2548752fa61967ecc322e468595691201418c1ae02b125da4a5863716867510f560baaa9d833e345b301f70d7a8f40245d2909f972a1a5cd8b27e4768b8f206c6f8c7aec4bc9edabf2da6851920c0453af9f873a48c53bf87601e136b66067a897bee53cbcfec503fb3ec5104485bb688abc70f7a70e5fcae9396afc848574cd", @typed={0x10, 0x76, @str='/dev/ptmx\x00'}]}, 0x344}, 0x1, 0x0, 0x0, 0x2004c814}, 0x4) sendto$inet6(r0, &(0x7f0000ad6fad)="ca", 0x1, 0x3fffffd, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/30 15:51:29 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') prctl$intptr(0x200000002f, 0x3) setns(r0, 0x5a000000) r1 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000040)='/dev/pktcdvd/control\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0xb1, @local={0xfe, 0x80, [], 0xaa}, 0x4}}, 0x2, 0x218}, &(0x7f0000000140)=0xfe86) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r2, 0x52d}, &(0x7f00000001c0)=0x8) 2018/04/30 15:51:29 executing program 7: r0 = creat(&(0x7f00000008c0)='./file0/file0\x00', 0x82) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000a80)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="88000000", @ANYRES16=r1, @ANYBLOB="00042abd7000ffdbdf250a00000008000600ffff00005000020008000900080000000800090001800000080008000004000008000b000000000014000100e000000200000000000000000000000008000500ff0f000008000400070000000800050000800000080004008000000014000200080003000700000008000700020000005825dbad77baafb0af18a8804289ebb7ee259b3fb019269aa1dd83f28b3d718cb4fa2092"], 0x88}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x101, 0x4) recvfrom(r2, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x0, 0x7a3, 0x8}, 0x1, 0x7ff}, 0x80) r3 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x20000, 0x0) fchmodat(r4, &(0x7f00000002c0)='./file0\x00', 0x40) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000280)={0x1, [0x1ff]}, &(0x7f00000004c0)=0x6) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000500)={0x7, 0x8}) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r6) getsockopt$IPT_SO_GET_REVISION_TARGET(r6, 0x0, 0x43, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) ioctl$LOOP_CLR_FD(r3, 0x4c01) statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/72) connect$ax25(r6, &(0x7f0000000340)={0x3, {"0bca1e298e9c44"}, 0x5}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000480)=0x0) execveat(r2, &(0x7f0000000540)='./file0\x00', &(0x7f0000000700)=[&(0x7f0000000580)="2d2873797374656d656d30766d6e65743076626f786e657431656d3023176c6f6264657600", &(0x7f00000005c0)='#:bem1&\x00', &(0x7f0000000600)='/dev/binder#\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='/dev/sg#\x00', &(0x7f00000006c0)='IDLETIMER\x00'], &(0x7f00000007c0)=[&(0x7f0000000740)='mime_typetrustedmd5sum\x00', &(0x7f0000000780)='IDLETIMER\x00'], 0x1000) ptrace(0x4207, r7) sync() ioctl$sock_inet_SIOCSIFNETMASK(r6, 0x891c, &(0x7f0000000980)={'vlan0\x00', {0x2, 0x4e23}}) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000800)) socket(0x0, 0x0, 0x4) 2018/04/30 15:51:29 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)=0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(r2, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000240)) getpriority(0x0, r1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0xff, @local={0xfe, 0x80, [], 0xaa}, 0x10001}}, 0x6, 0x41, 0x6, 0xdfa, 0x7}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000200)={r4, 0x3, 0x10}, 0xc) tkill(r1, 0x1000000000015) 2018/04/30 15:51:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:29 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000200)) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="97a787b51cc77d67b090055dcef52e9cb5dd2aec", @ANYRES16=r3, @ANYBLOB="11042cbd7000fddbdf25090000001c00020008000600d4ffffff08000300050000000800060009000000"], 0x30}, 0x1, 0x0, 0x0, 0x8c0}, 0x1) setns(r1, 0x5a000000) 2018/04/30 15:51:29 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x101100) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/109, 0x6d}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_mr_cache\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x1, 0x0) ioctl$TCFLSH(r1, 0x540b, 0xbdc0) 2018/04/30 15:51:29 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) syncfs(r0) 2018/04/30 15:51:29 executing program 0: getpgrp(0x0) r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/uts\x00') setns(r1, 0x5a000000) [ 278.963504] device lo entered promiscuous mode 2018/04/30 15:51:29 executing program 0: r0 = gettid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/uts\x00') get_robust_list(r0, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000240)}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000200)=0x18) setns(r1, 0x5a000000) setns(r1, 0x50000000) r2 = dup2(r1, r1) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000040)) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) 2018/04/30 15:51:29 executing program 7: r0 = creat(&(0x7f00000008c0)='./file0/file0\x00', 0x82) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000a80)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="88000000", @ANYRES16=r1, @ANYBLOB="00042abd7000ffdbdf250a00000008000600ffff00005000020008000900080000000800090001800000080008000004000008000b000000000014000100e000000200000000000000000000000008000500ff0f000008000400070000000800050000800000080004008000000014000200080003000700000008000700020000005825dbad77baafb0af18a8804289ebb7ee259b3fb019269aa1dd83f28b3d718cb4fa2092"], 0x88}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x101, 0x4) recvfrom(r2, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x0, 0x7a3, 0x8}, 0x1, 0x7ff}, 0x80) r3 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x20000, 0x0) fchmodat(r4, &(0x7f00000002c0)='./file0\x00', 0x40) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000280)={0x1, [0x1ff]}, &(0x7f00000004c0)=0x6) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000500)={0x7, 0x8}) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r6) getsockopt$IPT_SO_GET_REVISION_TARGET(r6, 0x0, 0x43, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) ioctl$LOOP_CLR_FD(r3, 0x4c01) statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/72) connect$ax25(r6, &(0x7f0000000340)={0x3, {"0bca1e298e9c44"}, 0x5}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000480)=0x0) execveat(r2, &(0x7f0000000540)='./file0\x00', &(0x7f0000000700)=[&(0x7f0000000580)="2d2873797374656d656d30766d6e65743076626f786e657431656d3023176c6f6264657600", &(0x7f00000005c0)='#:bem1&\x00', &(0x7f0000000600)='/dev/binder#\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='/dev/sg#\x00', &(0x7f00000006c0)='IDLETIMER\x00'], &(0x7f00000007c0)=[&(0x7f0000000740)='mime_typetrustedmd5sum\x00', &(0x7f0000000780)='IDLETIMER\x00'], 0x1000) ptrace(0x4207, r7) sync() ioctl$sock_inet_SIOCSIFNETMASK(r6, 0x891c, &(0x7f0000000980)={'vlan0\x00', {0x2, 0x4e23}}) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000800)) socket(0x0, 0x0, 0x4) 2018/04/30 15:51:29 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x28020000) 2018/04/30 15:51:29 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a004000) clone(0x80020400, &(0x7f0000000040)="67688c9724c6555d42e88e8f352c7c8d4122f31068fa58a19d2a7fe2a17dfb29cc9cdc7504479bee4437ce56b6c5c408c486b7c8648cda8175d69b493a27042c6a65e6298a92e86b18dda2a5e705140892cb12e3dc2872fbf9834cb2b2c2f0d25a49c415b07aa82a1b6ff6524c47759f1a2312aafea757f4d346367e197c1a4cecac7004ce88f22472ab02a4c6c74b402ef9fd5820785d21f99e4b4e4cf7f838edd7ba3a093117ea570d03befaaefd1fb5309e41bd942f6537ef68c54017a3ee4085f16f13b570b6273f8346f3dd4cebd443", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="f42e5b6ccaaa7f8ae7bf3ee586f56695c6296f77b9c78c44959a2f3186703a93393ed9289214cd12d665050b7096c784d46b077a824c47b35fd625277240715cda04edadbb460cd4ea37cfc6eced0c63a7f23e05248a9a") [ 279.077137] device lo left promiscuous mode 2018/04/30 15:51:30 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f0000000040)=ANY=[@ANYBLOB="02140000a20200000000000000e0ffffffffffffff000000ff7f00000000000002001000000004d6000004d30000000005001a00fe8000000000000000000000000000aaac1414bb00000000faff00000000000000001010070019000000000002004e230000000200000000000000000a004e24ed00000000000000001000000000000000000000030000000000000004000200ff000000040000000000000008000000000000000100010000000000050005006ca000000a004e21e0fffffffe8000000000000000000000000000bb8500000000000000"], 0xfffffffffffffeb9}, 0x1}, 0x0) 2018/04/30 15:51:30 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000200)) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="97a787b51cc77d67b090055dcef52e9cb5dd2aec", @ANYRES16=r3, @ANYBLOB="11042cbd7000fddbdf25090000001c00020008000600d4ffffff08000300050000000800060009000000"], 0x30}, 0x1, 0x0, 0x0, 0x8c0}, 0x1) setns(r1, 0x5a000000) 2018/04/30 15:51:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@codepage={'codepage', 0x3d, '857'}, 0x2c}]}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="dbe11836c16e338ab683e19d608a033c50561a80a4c6dc7f7d1130a1585506181cc736e303b23c0ca295295936b4b186cd1c65510db3052826403fd1e728bcf4721fe87ab10a4743c4b909622b00eeb20d8a639fc0b74dfde30df693002693e6bfb65d54cf20fd99eeaddaba6436de9fba8cfe4f492d564c1fc1deec8eb3e70822160a3e69", 0x85}], 0x2004, &(0x7f0000000340)={[{@nodatacow='nodatacow', 0x2c}, {@discard='discard', 0x2c}, {@nodiscard='nodiscard', 0x2c}, {@rescan_uuid_tree='rescan_uuid_tree', 0x2c}, {@nodiscard='nodiscard', 0x2c}, {@datasum='datasum', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) mkdir(&(0x7f0000000180)="2e2f66696c65302f2f692e6530f0", 0x0) open(&(0x7f00000000c0)='./file0//ile0\x00', 0x23ffd, 0x4) 2018/04/30 15:51:30 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_mr_cache\x00') openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) memfd_create(&(0x7f00000000c0)='Unodevwlan0md5sumlo\x00', 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/30 15:51:30 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x101, @mcast1={0xff, 0x1, [], 0x1}, 0x2}}, [0x80000001, 0xd35, 0x1, 0x7, 0xfffffffffffffff9, 0xfffffffffffffffa, 0xffffffff, 0x2, 0xd6ac, 0x3, 0x8, 0x5, 0x1ff, 0x9, 0x3]}, &(0x7f00000000c0)=0x100) gettid() getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000240)={r3, 0x7, 0xfffffffffffffffa}, &(0x7f0000000280)=0x8) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) 2018/04/30 15:51:30 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x8, &(0x7f0000003340)=[{&(0x7f00000000c0)="40559e862127ae3bbd8e62198a834d76e5694bc6c2050c0ed818ecd690f9dc607f8006", 0x23, 0x10a}, {&(0x7f0000000100)="447351f5fd9b6b5bd5052d375d143fc0671ba5396a4fb144ea3d8ace5f578c7acdec9ae0fa82fd7db2cdd2c4b78eda4fd5ef1454dc207bb27e8a58170ee86b3f74c41f6f7af23c602441aadf595c01211700553a6dcc546abc8ff29f0398c260658c72393b947c332efe74f996823a7515f34cd38e09e9", 0x77, 0x1}, {&(0x7f0000000180)="3268ce41ab9cabf7e8b62817154e09a2ad3a1bbc1cb8dc9c41b14efd139da955f360eaaae38dba5a01dfb35d7c23e5562b09b7338c8b12ccaedf0a460a05707390bd7bfd5b8c9507bde93299b56e2335afdd62310d7cd2235b30a522df137e8663a891aa6f15b5372461e181b1a8b25bef7e69a37a484cd2d75ee7cc616c1a017b66c62558edc1a3f9df0b939fce1e643c5ae6f04d1ec93748d0d94cc826a24c0e171ee06a422fd6690c4ec96450d42d28c308139f0d64e7e3a63c60bb30d06b7cf5bdf4295c6eeb8d955bb2cb12076bb7f227861041d53b0175d5bb520974ccf8736348cbda88ef6714ba364993d6dff9de7e098d852740ec37fc87661e092e3d19dbbb9814bc02e693563050038f52d280b5c539e48a83b222c05a2f00a616a66c34caba3c6d0c3a826fe22c78d498bdb9a0024dd1ce404b71f269cd334b24d972fc9580785f56e305d438a177d01af31aa43b3c41138a6e53b05b082d27ebc1f473fd603e03425eef69e4fb07a59254767ff7b07b854cffa8354c882b2affa3a2dd3fc9a1ba8c433439ebba0f28610d5050fdf51ed9afaf5d86fdd1a4f2a9fedb12f5c333f80787d5e7d3dc9936b19e95384221bfe0b5f790ba8a87f3b2edb8ab117ef809582baae9b34b38d41ca6fc75d11d74a9633c8e26dc883305cf7fb02b431c84abac301106a30c196748353414189db21a8cccdaa49e8995a11f51ade5785f041083a5f2ba0ac13ef5f858032c2e3097b88f6e8070ec6d3f386fcec796a024402c21eaa7f4cca0b48b02c72da6c16f378691d7c8ca750fe6c53b34fe4a2bda3de14e016e4ae5ec004f6ec03acdbed02489619a8c9bf8b6cd56fe0283c15c50d8e838fb41976ac6a912d0d525ddb090b53ddb45f4acec7d81a45d99f33e2062856ad5872cb205b2706e8155085bd66acadc6e696c4d7a44f12a83b81e894dac8a8a269798e1f63c6cf5d9a186610d2072955754382df7c6e75b1f9a5a3040a757d7f70417d9126b323a4fa26c214e8bc645db308a92b514b853d5970cc29b2a0a354c5d1c99ba7b5651690bda961b913b4de3f501ea536b32bcb4574c52f483dfe2f0f5d8286e03d96ace4815b5f8176d69f8664b2f1bc5f10e61744ec021578d06a41c04db23b87f47a427c0ee1db165156822607daf1fa92857fb3a91ee8c4ac076f8ec8300bea3bca534137c54b96065223b396bd24c0b097dabda168857e4e08c482ee2cb49ba5ca9d08338869635626beb1e02f299c64f2976425aa76acc224916c7648f19f6563d1a5293416d3453ab21f81f1cd3e5bb935bc704f057e22a32516e40861cbcc14576d3c3c58aed9d1595ea493dff6994e19b95fa5e6e5f75d8b543a211f2ce8cee7310da27f023dd24f6ad4c269b975d39f2454a60182d81d11e65c37d6f24e0b4e3e75dc09048e4e4fcbba2978c2048fa68e7ed8bdfc533556bcbe9be3004696d52ec84951642c097e88593b3f5f78c5886f32634f120c594a24ffe7a539a0eb55dea1fde9501f0433243e06356be4ec65453040ba15d124679290389c986f25d8b0f532ea1a7d68c509d8b0d9660c30e52198bdc58c9e30a14f6442c1141036281d809462010744f0cb91b4f0b822a2b7066235cc7c2564d13dfeaa2a625c817561c03cadff05dfa11e03d7475df318a3c657e6e7f4f8354196cdd0b1c23537ccd2886d514e144c4beed67f75373bac4c9372f149d722699562d550fe7113a690679468a13ab3abbcd61301f93972b26e1b2313dac5af86450a9b3fe960919b3414d1cb42bf49bea3e6ce0086f9aa798d36c350a4a1b6f7c7ddeb1df0382faea81c9f40dfe751c878e98c2b0a58b2404c7822c2ceced39c4aec198ffe52f462fc4a741b2fa36fcf61f34041332a76fa5c220864ae8cb4e4d5fccfd5cbaa7285aa1eb6e9646ef400848647c6fbc853b49aade04d60e8398cb64790b8fe7002e0b230812a349c1c149564411091e20a278b042fa61d326b49054e8dcd3cf522652eb5f84d4c2dc2a79ae908f0a4bcf7cc351e80b90149f6756e695e1fc173284659db8b937cee471bf8e843e291625a1ff56e3b0deb9f56d8cf2a1b8b0b1b01c8a4701bec549ffde12b7591fefd5373ab0ac6120b05736f4518332f04916e9d5467875f39e7100051a5d6fc586e4529c747b463e73975527ed597ef2fdc430df1d6b9731c0f8e8300567c61bb149976395807b27626c734dd1ca30aab57f32799715a1aa1c4fc9123072fbe73396436938740f085ae07b081b5ce2b27437135c528d20e01793cdb04b0902638a7c03a290418e774d5b7945acd33122ac7325f28d362e731a18ce1b8151f82c01867359b4fe4a3c03c40f56649955bf65a42cd50063d0209062c369e7d4344c33911e197ba5f06a2531d523a3a2b11a58913e2d08d3a417ad38ea2cb7f372a2775cda40d77e29951101b1ef86b5d2b14f6b1a8722d85f29d0ee2e457a450df1c432dcdb8cf16a5e8587a04cf1f1a2fbc6149e4e91ccb02b00a1b5310532c0a66628477411acf6e373edf5551f863b7be1a937cf699c011c5354db1ae6dac07546707ef4a8549babce331f818732bcd602c383016a0ec6053b0da72f1b33fa503d4daa585b4a46de5677482e62d925fa7e3caff6aa8590c3344f7c6646873cea210edfab2fbfc32a2a32024a2e29bbe1670c76ed2359359b75c27700d34595e2c737982aba0f625a60085293ca42e9f71231cca31e5c40fd363ac00575999e68f20c13d29820e91a095cb111c8b4d29106dbba78ba661486b01572dd6b071e21d6decc87d7e7d77a2530d1b59131ff0189788ae563df91cddfd3c2fb46cac7dccf6f0e933765d3c0fdf7a3be996221e1c016592ec7ec753f2162b219fa8281ac479591629f7ad8403fa0080b189b13bcbd98adad12ca652eb1575fb5e3a4c46591064a37254d4de0d648c2670c87937027f78c083caa1361f4ce113139e052abab39fe33aecb2f775d7201f9b24d2444662622f1d0d03ee450577d628cd19facded1d92471f1c3045b8a7669bfc57a3aaf52eefc17c6f18423136307b1f5446c2aff6f0c6e9f819708e91049cb03ef4b61f9b12f3f5cb97faa2a1a8205c52a1c8e569a04172d659addb243db61574c12a005696660b80001add70cfc1aca175c0e0a7d4ab948dd61e12a5a1fb09d2acb95fcd159bd055bf293f34c5206895e0087fdd13fe4ae1c9591ee2927949b892c80fb450ef607866323c0608b93ceae5573df2fd4d3b8569b71f68555bbac9cda3d85c39a354391857929ccc0fe8a3e8b1898d8842c3b5f772f6347e56bb55514d0ac8e6d0f85761ecf048e3cac1a7857a303d319faa60998e9941b0323dbdc18c04a8790005ef6301912a4072b72f48b6dae9a339dc7b3b1d246ac9ce8c74d805515a043c0730d175936a45c447f3bc1aa2d479751b371bfb74295eb3a6ecb472fad01d91b34a4bda5b0182c7dc5532d980c510c7a853a10f7f2597d5c2bc0a9593d4c458aa8f199e959198a639e426d2180b1982624e32b34b0213b25d5ac7f6884f7a1a3efe45224592b2e644680f1032d268b692060bbfae5861694f080713154a0ef9c24ab53cf52f49ec033047b3994cede2ee0228fbfd4d22940665fb5302d57e93be73e07b0e4d3f15ddacd73b8090d9a810dbeb6b64adf5df2fe8cc803a27d3c64bd093e4af25e8daf32922584de3fc6d2e345731573c3279ecefb396dfc329b056fe62afa9bae1685a48824ae51ad270ad89f36d0211dbca23f2eb1231a5bacfe03f6650931fb8f41ad2dde87a04dc6900d53e35f1b9eb0e3d8f063b9373683416414668ec973cecc8c1a77812ee1afa54aab0130a6a9ca7aa109ba54bbfe22dcb86a8b677454e54ffbd79e7b3361be364eac4c2460c3d850ded8f1c00f7cc95f17a8073e98b7d3306a42d77ed89166402587ec3c35a2f6315492e2ebb45d66e722a00ae515688cdcbf0d0ec7cc58b81d02bf8906132e56f60c45a480a2fb2e972fe2cf67ccd1edf358c26dbfae771131184920310b04848f87a662708963cba0dcff51aa029ce6e650ff14c6d5e261ea80529b2d7419f328395f1221c9ed36cd5846693475fe56f64d236e189dd106535c0b582180f06ac2227fc6a972ebe36a9b5e18609de21c47e1ca464afc9f87e85d7a26c85016664596c2fe8b150d5d4b062b23e7ed584acb5c2f94678c50302a4bfdfdfba9cc97aaa9a5dac208bee10d9b7bc414d4aed53c6e2c7668efef9bea90693cd114113dad9c7c2cb41c76223244650583c8bc08588b9f831f07a7ce7cd1d76049d483f241fcb172847fb2ac9ae5e22c9c54621fbb85822bee3dc1d7eb223397fc3e93c5b79c69664c1411e3600e9ba9e21f9d91f4397a6725313b21527a5a167f8807f7c3a0d72bf2b74f1b00156b6e795d3969ca0f79a9909715cceb0098fa37311831d667c1316867c57e8696d322ed2112da262cb499a7efa81b16f0e8063e079f3ebc5502549c6f860ced9264bb3df5724e44909637cfb60c6df0295214623ffbd51ad3a9cee9c7390345f19cc51827dec699d8bb46dccadbe040917a4196aa15f619c6959d919927569f1175f898a9bf523c33cd542c6f30c8baacd24ce6319051146b205091c39ced9ee1f5726ecda452ebda7b03cd01e206308628c5212179a0e049ef58ba558be83391386529bda2507e5b7332a0662f57f746e712d3461fdcc1c53fd6e6ed609d8f55ad9b0c5124e2c18f3ae499aed248310d5bbf09a6f7ed6fcd2b3b77a2fa9b38fa8199ae375b386105775603841d90408702a7a41c536bbe5cf1645dedfdfcef8b0b7e109fbef5f1e37688fdc11fe280451fd9351b7808e76cd1353ba21d3f4af8bf4fd20ff492977fc3c2031381b82437b396c6417901d5eaf306c13381ac4af07afd16ff25e22519e86fa3cb292484978dca39321a07fff8eadc10ca01a93987fbafb795010b443d35ad3a629f7bb3aa69967889138275bbf976c618539b6418c532e9c94ed832dfb16a4c304b844b1907bec38533e9e9add80619db5e2d0d5ba910b3796c44fc10de56e50b85b634308e330ff5544df92436363b5e473cf2720bfbe7811b5b4aee3ca7c5d6884a2ef9927faf1d8ed17f3dbcee000fd0058c9612de88c6af50790f504a431e70776d0f5acb6d32299d341378fcd6b630b87523b49ffc063b0ff04087e0a11ec4e91e222308bda46576915a4ac29d0ea480f11cee02f9d3ad6d4262d3f76777c36fb9a50f3fd8da07b8336eaab679532f82ce90a52cf300aa44104e93839ed6ff6dade2ebb12f2f30fc49e74a50d66949b0ba58ba7aec4c0d4134b39192cbb8e51899228d39b656d4be614792d21dc16e8d0e1766a78bead758130bf2c92dd28543c4b72d2771e49e69abdbad9a3286349076e8df1fe5a24bcdc2a5f4b5d1f4bb9fbf879d3fbac870850b91ae6ff00d6225c7a92827dcce489080c67862a56c2702e9c5bef22d78d330c66b3ecd6b61c3272c246c004c53707aacfa4089f0e316008bb45b33ff0166909a68680b9fce07a408a57583881082a8f8a7461862050d27fe5d3687e61be2fdd430176ecd01bc543eccbe2f59e1862605cc3fe4717056d68d4cdcf7a9f0c11c3a6d9d4a996212fc6a3b3ebd77341268beaac4ae3a97e36f0ad0384948466b68a002b2f1719bd2eef9b960fb51ed2421dfbf704812f54bcaf5d932f0966455f5ad06e9cd34e9f7301159726049abe96b3d250995e59e7993c4c1ad2de805ecad420712b3fcaf7fcf343eb5432697c6c483934b51665caab82803", 0x1000, 0x100000001}, {&(0x7f0000001180)="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", 0x1000, 0x9}, {&(0x7f0000002180)="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", 0x1000, 0xfff}, {&(0x7f0000003180)="45c948a8abf4bc3dacfd8528ed231d233a8a1402e4c61e3a73ec8a09e6eae947ed09b6fc18a634882b59928796b3e97f0dd49b3b2531b35af219ef0b76b2d765bd6081fff7a5d55593c95d9a05f207994406cc8cc9b21123cc7d5903a38de0eeef77761134e934438a6822b1da", 0x6d, 0x100}, {&(0x7f0000003200)="5bb0c5912262a7ad65e1835ac7cd110478cd7c5de338b4eab6a83851f23caeaf2ada63f9eccc622633ab477b2c2227a338fec77b15603faeb24815300b85e865928bb9fd78635bf42b8f23ebfd2070ac20403231a0905664462e0135a52b999cdc2a435baf59b9878ea6b25a9988779c0b62842d93fad8ad41f4e8cbf996faec817702677a8debee127ee34fc15e1147c939e42838ce81e5fe558d4e2964fa53e9f70a020948e6e2bf87202a6498fde31f", 0xb1, 0x1f}, {&(0x7f00000032c0)="d16c038bc8fbc0a2a9827f9ed634105cfb3da148a1a6648f88fb5cb1b1bc6b8c2e4411dc81f0c8f84103771dcfe17412ecf658865e2b104cca6aa4dfb8b03bfa905d9d458882787675e2d86b46fe7df4a25c260f792603e42f0698d2458c7cce1941a94608a0b30755ee9083", 0x6c, 0x1}], 0x80, &(0x7f0000003400)={[{@quota_on='quota=on', 0x2c}, {@quota_on='quota=on', 0x2c}, {@noacl='noacl', 0x2c}, {@quota_quantum={'quota_quantum', 0x3d, [0x3f, 0x3f, 0x2d, 0x36, 0x31, 0x7f, 0x0, 0x39, 0x38]}, 0x2c}, {@rgrplvb='rgrplvb', 0x2c}, {@loccookie='loccookie', 0x2c}, {@nosuiddir='nosuiddir', 0x2c}]}) 2018/04/30 15:51:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00"]) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:30 executing program 2: prctl$intptr(0x1f, 0x6) seccomp(0x1, 0x1, &(0x7f0000000580)={0x1, &(0x7f0000000000)=[{0x6}]}) 2018/04/30 15:51:30 executing program 3: r0 = syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0xe002, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x5, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x8) r2 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="0000809b0080290e060043010d05ffff009d0005ffffffff0000000000000000ffffffffffffffffffff000418b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538d47f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa6a1d3d505fa1be1995c8e715f889de71854ed249bad4475f7621de1ca471d1c95f0f4701c838fd2b2a9667520fbe7c08bdef6e81d19a3b15c4252faa18e10cb36dc4884088fa8c7722c22a2ac4fe97ce42252b99a8971ac759e99ff2d34ba74774e5083c00f81691c86b93a84a8496341b3f4d58db9646bb12d877e24ede8b73de92197f38382d995dbdba075bc8f7fc9b86ddc6d229714356fc7ce178d4b905dbbcba40cac81a1b9e8c604c6e5898acc01894d44a5d1bb7dee17cd11a96ce3ecfa038264b2d44bb99553897cc2e65e71b07d30e310cdba079f44ded8949535eec26a507cb7428c9aec18a"], 0x1) ftruncate(r2, 0x80000) getsockopt$inet_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000300)=""/18, &(0x7f0000000340)=0x12) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff854eebc1) sendfile(r2, r2, &(0x7f0000000380), 0xffffffff) mmap(&(0x7f0000470000/0x2000)=nil, 0x2000, 0x5, 0x32, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x400000, 0x1) mq_getsetattr(r3, &(0x7f0000000180)={0x5391, 0x7, 0xfffffffffffffff9, 0x6, 0xff, 0x7, 0xff, 0x4}, &(0x7f00000001c0)) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast2, @local}, &(0x7f00000000c0)=0x2c0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000200)={0x8, 0x1, 0x0, 'queue0\x00', 0x2}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="f4000000d43e74d3c9cec02aca45319ed8031cecff0d9035de1bc6b6872c84ca89c3aa570f465291e05957e76dbf19f96ab5f89f76a8fec40eda342725678360f9f4c99e29c31b17f1af129b8afb95a0609747ce1e67668bcea1a94edf794359b0be50a9a1e5db8a6ebe3171cfb62ef12a94aec76972fb7ed9a3a3b46f0400d450f7a84916041940615d65dfaa382aac708d5f9429a2c56c7ac2098cade16ad865f98aecd6083975ff777a4996c9e24cc721b03682e245e2aa1ca781461844a212aee396a111121d46bc4fa730382b27a17e584e0048bea1ae12f03977f76d734e54df7605fc6ebe147bce6bf628ac06edbc27ec63e95cd4"], &(0x7f0000000100)=0x2) sendmsg$inet_sctp(r1, &(0x7f0000000c80)={&(0x7f00000003c0)=@in6={0xa, 0x4e24, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x5}, 0x1c, &(0x7f0000000bc0)=[{&(0x7f0000000400)="87c28e47fb775ae872b30b2467dd9b017ae43bbc5aefa2fffa2e5224531c04af638f99aef5b99da208eb4973e3a98b5334198fd99817597db3f38ee23b371b34161e20bcddfb", 0x46}, {&(0x7f0000000800)="47b581b3fc341102abf4a96ec821063c6d85149f344a9a649c94e6fdc864c4a0d597fe1e68b448b72c9ba6d3273391999d75ac548c59373e73090fe352e9e34245f7caa29bacc7cd988ecf4a5b543d1a395d4d5882a74305e076e4b7aa6040797c9571d02211dc371d533a33eefe627280e99294af06f6e8a1d93e6f6adeda3c11748550063fcbd494", 0x89}, {&(0x7f0000000480)="3a555d996c4573b3a57726da08b8df6096a72882cb94ac4ae5879fc3ca1d80eb863e72721728cd39", 0x28}, {&(0x7f00000008c0)="f1bd7ea70a2712bbc3e7d1be42d4af7cb98c3181b0b848f1972e6fdbbfbee7e89b28dca33044e9f180daed4feebb70615bcae31619dab6d41e33c0789ebd708459633e7d", 0x44}, {&(0x7f0000000940)="185a0feab7d4a6becbe2b5a14c5b004f539dd69eab588e2099e452e094b5ba5763ee7f23f66a179a1949ae22b64916b2f48685c39d2dbe1d8b5bf3c445b8f468cf07", 0x42}, {&(0x7f00000009c0)="3599b161b9d734e8e257bd605eaeb9dbefff3646ad124216c91bad8d1998e98a77cd318a1fb9cc23ceac2aea241f8cd0c1b234c56e198fed3f820d70e93a262403d37dd56ef2c33cc79f95eccbd99f4a80279cd63d25a770a92949fa1f959c21702309c551d68a2fc49271ec82b275cd43a98838a18d1f1efa9e6413fd3cf3ccaaaa42c3797b6fc7386180ea4537d42344fd46a97d5869e2b453c103e7da4aee0f4363cdb4a4d5505293d7fd4515effa", 0xb0}, {&(0x7f0000000a80)="46afe49924ec4aeb72cd2f536ab43474287002c62e596da62d5638960c473555d830b1f288fc280fe9474bcaf8bf105e64b388767f535b78f176b252917f1e25bc3ced354e5d8545e2c4a7ae2328cc8876310135e646f95e47ce00e660cd642827939cf0f369fe0178793d5a674223a480e943e12345c2bdc51c553a9e26f7fce1d0bf6a5430bf639327b388e32da658b0522d2361", 0x95}, {&(0x7f00000004c0)="db28e1981ccbbfc1787fd161c72a01afd0ae783fb5bde19077f2", 0x1a}, {&(0x7f0000000b40)="e9ed750937f9935574d2b65ace706248f91a90103a772996e2f3ee49d81a585ab369573c4dd89802fc9e664d943dd7727f71586912a0ef5424121135b98296afbc243e76b07cfc584574b73482f70844da7ede0932f36da46d98ba8f04df2c37845cee0acad7f80ca1c682dd02ae68b4f384", 0x72}], 0x9, 0x0, 0x0, 0x80}, 0x4040800) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000d40)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000d00)={r5, 0x1}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000d80)={0x0, 0x1}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000e00)={r6, 0x3ff, 0x200}, &(0x7f0000000e40)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000600)=r4, 0x4) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r8, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00002ceff0)={&(0x7f0000000cc0)=@delrng={0x10, 0x14, 0x200, 0x1, 0x3}, 0x10}, 0x1, 0x0, 0x0, 0x8820}, 0x84) 2018/04/30 15:51:30 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_mr_cache\x00') r1 = add_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000100)="3f1b870501cb13357ec798e58a66c37b8e809fab988f7e6793174f5c4f5987bc258940eb0049995c2ce9a2fa34f01c4b900607f2f9147c39a112aff57ee4f78d9443", 0x42, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r1) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x1, 0x0) 2018/04/30 15:51:30 executing program 6: fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getpgid(0x0) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/dev_mcast\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x1, 0x0) 2018/04/30 15:51:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_mr_cache\x00') r1 = add_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000100)="3f1b870501cb13357ec798e58a66c37b8e809fab988f7e6793174f5c4f5987bc258940eb0049995c2ce9a2fa34f01c4b900607f2f9147c39a112aff57ee4f78d9443", 0x42, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r1) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x1, 0x0) 2018/04/30 15:51:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x80, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r3, 0x80000) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x4}) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) 2018/04/30 15:51:30 executing program 6: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)="6e65742f730000746e65745f73746125d4") ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000080)={0x1, 0x3f8}) preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x1, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000000)={0x1, 0x3}) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) fcntl$getflags(r1, 0x40a) 2018/04/30 15:51:30 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'bridge_slave_0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x3b, 0x7, [{0x80, 0x5}, {0x2, 0x9}, {0xfff, 0x9}, {0xffffffff7fffffff}, {0x7fffffff, 0x80}, {0x5, 0x2}, {0xfff, 0x7ff}]}}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000140)=@ethtool_gstrings={0x1b, 0x6}}) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) 2018/04/30 15:51:30 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='comm\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x1, 0x0) 2018/04/30 15:51:30 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_mr_cache\x00') setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000180)={@broadcast=0xffffffff, @loopback=0x7f000001}, 0x8) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x101000, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/242, 0x1}], 0x10000000000000de, 0x0) [ 280.361408] device lo entered promiscuous mode 2018/04/30 15:51:31 executing program 1: r0 = syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0xe002, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x5, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x8) r2 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1) ftruncate(r2, 0x80000) getsockopt$inet_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000300)=""/18, &(0x7f0000000340)=0x12) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff854eebc1) sendfile(r2, r2, &(0x7f0000000380), 0xffffffff) mmap(&(0x7f0000470000/0x2000)=nil, 0x2000, 0x5, 0x32, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x400000, 0x1) mq_getsetattr(r3, &(0x7f0000000180)={0x5391, 0x7, 0xfffffffffffffff9, 0x6, 0xff, 0x7, 0xff, 0x4}, &(0x7f00000001c0)) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast2, @local}, &(0x7f00000000c0)=0x2c0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000200)={0x8, 0x1, 0x0, 'queue0\x00', 0x2}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="f4000000d43e74d3c9cec02aca45319ed8031cecff0d9035de1bc6b6872c84ca89c3aa570f465291e05957e76dbf19f96ab5f89f76a8fec40eda342725678360f9f4c99e29c31b17f1af129b8afb95a0609747ce1e67668bcea1a94edf794359b0be50a9a1e5db8a6ebe3171cfb62ef12a94aec76972fb7ed9a3a3b46f0400d450f7a84916041940615d65dfaa382aac708d5f9429a2c56c7ac2098cade16ad865f98aecd6083975ff777a4996c9e24cc721b03682e245e2aa1ca781461844a212aee396a111121d46bc4fa730382b27a17e584e0048bea1ae12f03977f76d734e54df7605fc6ebe147bce6bf628ac06edbc27ec63e95cd4"], &(0x7f0000000100)=0x2) sendmsg$inet_sctp(r1, &(0x7f0000000c80)={&(0x7f00000003c0)=@in6={0xa, 0x4e24, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x5}, 0x1c, &(0x7f0000000bc0)=[{&(0x7f0000000400)="87c28e47fb775ae872b30b2467dd9b017ae43bbc5aefa2fffa2e5224531c04af638f99aef5b99da208eb4973e3a98b5334198fd99817597db3f38ee23b371b34161e20bcddfb", 0x46}, {&(0x7f0000000800)="47b581b3fc341102abf4a96ec821063c6d85149f344a9a649c94e6fdc864c4a0d597fe1e68b448b72c9ba6d3273391999d75ac548c59373e73090fe352e9e34245f7caa29bacc7cd988ecf4a5b543d1a395d4d5882a74305e076e4b7aa6040797c9571d02211dc371d533a33eefe627280e99294af06f6e8a1d93e6f6adeda3c11748550063fcbd494", 0x89}, {&(0x7f0000000480)="3a555d996c4573b3a57726da08b8df6096a72882cb94ac4ae5879fc3ca1d80eb863e72721728cd39", 0x28}, {&(0x7f00000008c0)="f1bd7ea70a2712bbc3e7d1be42d4af7cb98c3181b0b848f1972e6fdbbfbee7e89b28dca33044e9f180daed4feebb70615bcae31619dab6d41e33c0789ebd708459633e7d", 0x44}, {&(0x7f0000000940)="185a0feab7d4a6becbe2b5a14c5b004f539dd69eab588e2099e452e094b5ba5763ee7f23f66a179a1949ae22b64916b2f48685c39d2dbe1d8b5bf3c445b8f468cf07", 0x42}, {&(0x7f00000009c0)="3599b161b9d734e8e257bd605eaeb9dbefff3646ad124216c91bad8d1998e98a77cd318a1fb9cc23ceac2aea241f8cd0c1b234c56e198fed3f820d70e93a262403d37dd56ef2c33cc79f95eccbd99f4a80279cd63d25a770a92949fa1f959c21702309c551d68a2fc49271ec82b275cd43a98838a18d1f1efa9e6413fd3cf3ccaaaa42c3797b6fc7386180ea4537d42344fd46a97d5869e2b453c103e7da4aee0f4363cdb4a4d5505293d7fd4515effa", 0xb0}, {&(0x7f0000000a80)="46afe49924ec4aeb72cd2f536ab43474287002c62e596da62d5638960c473555d830b1f288fc280fe9474bcaf8bf105e64b388767f535b78f176b252917f1e25bc3ced354e5d8545e2c4a7ae2328cc8876310135e646f95e47ce00e660cd642827939cf0f369fe0178793d5a674223a480e943e12345c2bdc51c553a9e26f7fce1d0bf6a5430bf639327b388e32da658b0522d2361", 0x95}, {&(0x7f00000004c0)="db28e1981ccbbfc1787fd161c72a01afd0ae783fb5bde19077f2", 0x1a}, {&(0x7f0000000b40)="e9ed750937f9935574d2b65ace706248f91a90103a772996e2f3ee49d81a585ab369573c4dd89802fc9e664d943dd7727f71586912a0ef5424121135b98296afbc243e76b07cfc584574b73482f70844da7ede0932f36da46d98ba8f04df2c37845cee0acad7f80ca1c682dd02ae68b4f384", 0x72}], 0x9, 0x0, 0x0, 0x80}, 0x4040800) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000d40)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000d00)={r5, 0x1}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000d80)={0x0, 0x1}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000e00)={r6, 0x3ff, 0x200}, &(0x7f0000000e40)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000600)=r4, 0x4) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r8, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00002ceff0)={&(0x7f0000000cc0)=@delrng={0x10, 0x14, 0x200, 0x1, 0x3}, 0x10}, 0x1, 0x0, 0x0, 0x8820}, 0x84) 2018/04/30 15:51:31 executing program 7: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x4, 0x0, &(0x7f0000000100)={r0, r1+10000000}, &(0x7f0000000140)) timer_create(0xfffffffffffffffc, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 2018/04/30 15:51:31 executing program 6: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000000c0)=""/148, 0x94}], 0x10000000000004ab, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000900)='/proc/self/net/pfkey\x00', 0x200, 0x0) getpeername$packet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000340)=0xe3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000500)=0x6000000000000) inotify_init1(0x800) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000ed793afe00000000020082012600010000006400000000012700", 0x32, 0x1a0}]) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000800)={0x0, 0x0}) connect$vsock_stream(r2, &(0x7f00000008c0)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000840)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000880)={r4, r5}) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000007c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400002}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24, r6, 0x10, 0x70bd2c, 0x25dfdbff, {0x2}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008005}, 0x400c081) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) syz_open_procfs(r7, &(0x7f0000000580)='net/sockstat\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x2, 0x0) arch_prctl(0x1003, &(0x7f00000006c0)="df69b837705453d78906b7101c27e6d5c64130f39f6ec28bf3df36cf9012e590b19da23a4edfe26cd8affbc1ee22910e2c80b5726e8086cd6f99e67d778f6c97df0acb4c30d7c771cb83c735598673e62c1be7459f17f41162f80bea1f33685f4ec537ffc1c4a15a0b14065de6342f38369307ed9b61b0883883ce8e30fa57250eb69b791c6196cf83d3a63810523afae3227aed5342c97a6131506f35685a2bee3d9774d98bc12ea64be9605102c5ca44424eacad81feb00e780f265fff4fd98faa3888e67cd6ff4630bc95f14131663d37a21884c7a5da94ddb7ef082677df0a65c6c20e26713786df0a41b68bbb3c153fdb7710902bb2a1d293de98") ioctl$TIOCEXCL(r3, 0x540c) preadv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f00000005c0)=""/209, 0xd1}, {&(0x7f0000000380)=""/242, 0xf2}], 0x2, 0x10400003) [ 280.488966] device lo entered promiscuous mode [ 280.497735] device lo left promiscuous mode [ 280.555227] device lo left promiscuous mode 2018/04/30 15:51:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x80, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r3, 0x80000) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x4}) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) 2018/04/30 15:51:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:31 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/uts\x00') setns(r0, 0x5a000000) 2018/04/30 15:51:31 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f00000000c0)={0x81, 0xc4, 0xfffffffffffffff9, 0x7}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) 2018/04/30 15:51:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00"]) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:31 executing program 6: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000000c0)=""/148, 0x94}], 0x10000000000004ab, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000900)='/proc/self/net/pfkey\x00', 0x200, 0x0) getpeername$packet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000340)=0xe3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000500)=0x6000000000000) inotify_init1(0x800) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000ed793afe00000000020082012600010000006400000000012700", 0x32, 0x1a0}]) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000800)={0x0, 0x0}) connect$vsock_stream(r2, &(0x7f00000008c0)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000840)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000880)={r4, r5}) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000007c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400002}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24, r6, 0x10, 0x70bd2c, 0x25dfdbff, {0x2}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008005}, 0x400c081) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) syz_open_procfs(r7, &(0x7f0000000580)='net/sockstat\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x2, 0x0) arch_prctl(0x1003, &(0x7f00000006c0)="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") ioctl$TIOCEXCL(r3, 0x540c) preadv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f00000005c0)=""/209, 0xd1}, {&(0x7f0000000380)=""/242, 0xf2}], 0x2, 0x10400003) 2018/04/30 15:51:31 executing program 3: r0 = syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0xe002, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x5, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x8) r2 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1) ftruncate(r2, 0x80000) getsockopt$inet_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000300)=""/18, &(0x7f0000000340)=0x12) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff854eebc1) sendfile(r2, r2, &(0x7f0000000380), 0xffffffff) mmap(&(0x7f0000470000/0x2000)=nil, 0x2000, 0x5, 0x32, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x400000, 0x1) mq_getsetattr(r3, &(0x7f0000000180)={0x5391, 0x7, 0xfffffffffffffff9, 0x6, 0xff, 0x7, 0xff, 0x4}, &(0x7f00000001c0)) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast2, @local}, &(0x7f00000000c0)=0x2c0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000200)={0x8, 0x1, 0x0, 'queue0\x00', 0x2}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="f4000000d43e74d3c9cec02aca45319ed8031cecff0d9035de1bc6b6872c84ca89c3aa570f465291e05957e76dbf19f96ab5f89f76a8fec40eda342725678360f9f4c99e29c31b17f1af129b8afb95a0609747ce1e67668bcea1a94edf794359b0be50a9a1e5db8a6ebe3171cfb62ef12a94aec76972fb7ed9a3a3b46f0400d450f7a84916041940615d65dfaa382aac708d5f9429a2c56c7ac2098cade16ad865f98aecd6083975ff777a4996c9e24cc721b03682e245e2aa1ca781461844a212aee396a111121d46bc4fa730382b27a17e584e0048bea1ae12f03977f76d734e54df7605fc6ebe147bce6bf628ac06edbc27ec63e95cd4"], &(0x7f0000000100)=0x2) sendmsg$inet_sctp(r1, &(0x7f0000000c80)={&(0x7f00000003c0)=@in6={0xa, 0x4e24, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x5}, 0x1c, &(0x7f0000000bc0)=[{&(0x7f0000000400)="87c28e47fb775ae872b30b2467dd9b017ae43bbc5aefa2fffa2e5224531c04af638f99aef5b99da208eb4973e3a98b5334198fd99817597db3f38ee23b371b34161e20bcddfb", 0x46}, {&(0x7f0000000800)="47b581b3fc341102abf4a96ec821063c6d85149f344a9a649c94e6fdc864c4a0d597fe1e68b448b72c9ba6d3273391999d75ac548c59373e73090fe352e9e34245f7caa29bacc7cd988ecf4a5b543d1a395d4d5882a74305e076e4b7aa6040797c9571d02211dc371d533a33eefe627280e99294af06f6e8a1d93e6f6adeda3c11748550063fcbd494", 0x89}, {&(0x7f0000000480)="3a555d996c4573b3a57726da08b8df6096a72882cb94ac4ae5879fc3ca1d80eb863e72721728cd39", 0x28}, {&(0x7f00000008c0)="f1bd7ea70a2712bbc3e7d1be42d4af7cb98c3181b0b848f1972e6fdbbfbee7e89b28dca33044e9f180daed4feebb70615bcae31619dab6d41e33c0789ebd708459633e7d", 0x44}, {&(0x7f0000000940)="185a0feab7d4a6becbe2b5a14c5b004f539dd69eab588e2099e452e094b5ba5763ee7f23f66a179a1949ae22b64916b2f48685c39d2dbe1d8b5bf3c445b8f468cf07", 0x42}, {&(0x7f00000009c0)="3599b161b9d734e8e257bd605eaeb9dbefff3646ad124216c91bad8d1998e98a77cd318a1fb9cc23ceac2aea241f8cd0c1b234c56e198fed3f820d70e93a262403d37dd56ef2c33cc79f95eccbd99f4a80279cd63d25a770a92949fa1f959c21702309c551d68a2fc49271ec82b275cd43a98838a18d1f1efa9e6413fd3cf3ccaaaa42c3797b6fc7386180ea4537d42344fd46a97d5869e2b453c103e7da4aee0f4363cdb4a4d5505293d7fd4515effa", 0xb0}, {&(0x7f0000000a80)="46afe49924ec4aeb72cd2f536ab43474287002c62e596da62d5638960c473555d830b1f288fc280fe9474bcaf8bf105e64b388767f535b78f176b252917f1e25bc3ced354e5d8545e2c4a7ae2328cc8876310135e646f95e47ce00e660cd642827939cf0f369fe0178793d5a674223a480e943e12345c2bdc51c553a9e26f7fce1d0bf6a5430bf639327b388e32da658b0522d2361", 0x95}, {&(0x7f00000004c0)="db28e1981ccbbfc1787fd161c72a01afd0ae783fb5bde19077f2", 0x1a}, {&(0x7f0000000b40)="e9ed750937f9935574d2b65ace706248f91a90103a772996e2f3ee49d81a585ab369573c4dd89802fc9e664d943dd7727f71586912a0ef5424121135b98296afbc243e76b07cfc584574b73482f70844da7ede0932f36da46d98ba8f04df2c37845cee0acad7f80ca1c682dd02ae68b4f384", 0x72}], 0x9, 0x0, 0x0, 0x80}, 0x4040800) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000d40)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000d00)={r5, 0x1}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000d80)={0x0, 0x1}, &(0x7f0000000dc0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000e00)={r6, 0x3ff, 0x200}, &(0x7f0000000e40)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000600)=r4, 0x4) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r8, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00002ceff0)={&(0x7f0000000cc0)=@delrng={0x10, 0x14, 0x200, 0x1, 0x3}, 0x10}, 0x1, 0x0, 0x0, 0x8820}, 0x84) 2018/04/30 15:51:31 executing program 7: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000280)={0x80000001, 0x3ff, 0x0, 0xffff}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', r3}) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000010000a000000000000000000000000004671319837c4e5a1b6c2fb5b7de6337f420b18cbb320badda277acb01269e96e11879177554b1fe712f178f0cd09481c041163300af568716541a7ed30f04551b3d179a5eb55541fc467e68f94ab041c318ecca076b713c84e", @ANYRES32=r5, @ANYBLOB="000000000000000008001c00", @ANYRES32], 0x28}, 0x1}, 0x0) r6 = getpgrp(0xffffffffffffffff) r7 = gettid() fcntl$getownex(r2, 0x10, &(0x7f0000001200)={0x0, 0x0}) stat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000001380)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001180)=[{&(0x7f0000000380)={0x2d4, 0x39, 0x2, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x8, 0x36, @uid=r4}, @nested={0x2b4, 0x6e, [@generic="a8", @generic="76fee4f7f4d2670cced88d6042828ac96f3338ac7d97bf7453afada609e79af90b55d308e75dc05b8c483f703d15a103cacda4b460ae8e274f5d0f1de2f9427006e78f40085c30797bc6577e3bc8ec9802739ccafc9ee993381a22f324b1a23ef80cba7b0ea6bfab31f813a3b6058f0c42355324ec9ed53e8a56083967dc5d5553fa1692f8105dfac69abc060212c2172d1128c9f1d8cb55f0b0b04db30c748631526c65c27b1fab033ff87330aa8f0b6907e0179650912ba29ea6fb", @generic="73ad762e2a83ebea595b3dcc9ef76338ace6169668e15cc02aeced1a0e4f26bd0d5ceb8ec420ffce9437aba5a5906403f12518995685e37fbde97b4c3e079d0f7d80c1fe4dc1d3cc46e09775964d6d72be6567f818fc5f0fe5", @generic="f9028d315a2c942333c1582494b5b0f35cdb2ebc3c4e42f3e6d0f4076b4adf86ce9805a7fe78de14e0018499b1c0975d4f8b859650962cb7776dc6d4192d745d08fcaf522e8d2449ac4437e44da730b179071b84a2f8d28ae21e83900bde001effdfb05aed075ddd57cbdebd5abf700ce441d573f3edf09d50b60d9b7b63fed28a7f0cc16e5c11cbdb406af057287aa46e40ba90b4661b9e4423a0586c254ab0290b676e75ad1fc9db721336c5aae4a9bec6ce2a135050eddbda9555d3c86dc55e154daf5793f8070f58ae650946f0fe7d", @generic="267fc22c36b250ef14e5eb7d1e4a7cba5811e97f80e5198f84da1b", @typed={0xac, 0x45, @binary="b420e1ba87e525b441b2d9cb879944ab3a28658a140f586407835cd2b6cd2b9fe2d0534318baf981d371aedb0926b18ba0175351d70abc4aa4dd7c1d4db865b56d7e1a51995b9906eac3410c4f7b24ab49d4d2a3f1bad4a08b8678c162c6d1c64304ab37fd55d7ba61a21590f8cbda713fdfdf1c531d715b1581b325bbab113d065a060db8ce8deedd834579db7c31a6ade6861742ba7c0d536ca5c4e2f8dbc77a29fd28724b"}]}, @typed={0x8, 0x56, @u32=0x5}]}, 0x2d4}, {&(0x7f0000000680)={0x110, 0x35, 0x400, 0x70bd2a, 0x25dfdbfb, "", [@typed={0x78, 0x54, @binary="d864dc68bbc2f8e7240455b9f63eb289b2e14d78eb28efb1d1fcf354de5eadc9da88235ff10116d0774431238017242238f1029974f944929e7a3cf753841d187a5fbfe11e012507fa5252782e1da78ac491b8be45924c9fb1658aefbe608ae6d762d3f3a37d366e20d53ccc2349c4e8b4"}, @typed={0x14, 0x69, @ipv6=@loopback={0x0, 0x1}}, @nested={0x68, 0x6, [@typed={0x8, 0x63, @uid=r4}, @typed={0x8, 0x80, @u32=0x100}, @typed={0x8, 0x19, @pid=r6}, @generic="1e187374d4dca692f39e6c81ffb38b9fc379bca69b", @generic="a420ff5e77a55924c575e5a486f15b4b03b5307bee2a8b8238cd1789897b0e8858109437a3123027975fe6", @typed={0xc, 0x6, @u64=0x5}]}, @typed={0xc, 0x28, @str='syz_tun\x00'}]}, 0x110}, {&(0x7f00000007c0)={0x1cc, 0x1d, 0x100, 0x70bd2b, 0x25dfdbfe, "", [@nested={0xa4, 0x5f, [@typed={0xa0, 0x1f, @binary="6ac7d1f2b8e82d5ad46d03984377ab5c02a6ea107aeb7b459d8fc54b756cddab07a03073bd73236350fda5af58d63c28423dd7a0cda0f1ba4769f44ce00ec334994c280940b8f3cd4971e3ce627b26bb5a8a8f98718226db6472abb11be272852497f9e78a837652c1b8972233b82490e7ddd9cde46884fa91ddf1a4223e1b08dbb5802357ca3e3d733f25f16e60404e003468fdf8bbf2e825"}]}, @generic="fb30df2617fa347ebc35bc429510974147fcde4d4ecbae44271fc65f6a9a445be0be1675e32b88f38c9f51657f799ef6ad974d63607af629b9cafb112c6001ee783e28856265a32869ffc31b2edb94a25b2b6c360588e8fb3687e047bc7cc759a234deda0116ca59aa356c3c0c6902dfc61d8522", @generic="39ae7ae1157fd8c3bd8f8129350fe3f362fba3da2d179a831929d419a6858fc48f64be89f3da952fc8306ffa5f6034407014c7e48359c1a6ec9f642cdbaef80c092742defbc89bc35bfd8023b17feb424ddd03cfc58cc9fd9a6f7b6d585d876bec8a07bae57396f564467c7d0d4541dbb818ea8f0d3456d8dab314248e655d5cf56beaeb49962e9248b322386e0be2d9bf83f24e114fbd0c7e64ace3c844f55e076a6edf"]}, 0x1cc}, {&(0x7f00000009c0)={0x378, 0x32, 0x100, 0x70bd27, 0x25dfdbff, "", [@typed={0x8, 0x88, @u32=0x7f}, @generic="a3065a123db30d2ae857fe746db4f4971c051f2593f883bf8f03f7838e97757e608ef8813a93c4e91926380462ce5fc3c05c1c1fd6115a55b98f926d467d44edfa05931bf500964f772c5b792cee6a3755bcc11e303e2dded6c507b93132b3fa178445956f4dedabab7793f7649bbd6a", @nested={0x16c, 0x3d, [@typed={0xc, 0x4d, @u64=0x8}, @typed={0x8, 0x26, @fd=r1}, @generic="2774f98dfa2860ad6a0ae318464e3a83a5bf4b1ce1a85809a4d67728a2b8e97648bedb8e669cae5fb834bb79fcf5c3dadd93f89a7a4a42aacdb384fb6e2761d73208603edde98be1c1a1db20", @generic="40c4ed1ce39bdb1b98aec565f01a83288c07b23f6adb5ef9c4bdb1fd0c709b8bd5c0113e72f9a69b484610a50717018bf164cb085f67143330b049042e5e4d1c04e0464f6ed32a1749ed01", @generic="6fb697b077f0720db3d756c84dd862b60ab36c3a71d54ce3495d6957a9a5eee87dd1437a62fcf2a0965b3d481d45ccf817ec8b6644b6c7d1fb8e9a79ee2fc170277a734a4f03750521c964a0a8276daaca6e2f73706547b99940d3691c8a2c89c388fcddec094accf76113856007d86b3e4720f2ac04bd1d5fe7e9a1459f12e077bd34e205f48b8df66f3d8dfd971d14421c1552f6b6e8978dde8c5a80d07fd5f975e78b5d7f3be8574e116f5a7c8196dea3ce2f8f8fcb2b67f145"]}, @nested={0xd4, 0x1e, [@generic="b4c5aaa6e21b3dcace974d1b6d0f9b604749e40e53df905424bdc344cbf317317d98e95a96cdb2857cae6fb9a9c16766d182135339293ec27a802243e9154621e7de4ad2ec7771ad2c6d8c209a2ff8a293331615afcc058d4c7bc476446c832c39a74864c84cac49fbbb8551a54a53f014031032df3a4beb1eaae40e26d3b9be558a250ff84ebdb9f1620e3834692aad0a8497c36368848ac9a180", @generic="f4da27dfbd1757168fbfa4b888922d6336a645244f7ebdb5c4998a6e864ed083c9c4d791199c9b5d2458", @typed={0x8, 0x85, @ipv4=@dev={0xac, 0x14, 0x14, 0x1e}}]}, @generic="1bacf576a1ad89e27b3ec34d0486a8a2530de3c67bf921b0977ec5ac91f49d2aca42291c89f48b155c50a94c7e1fbfcc8f88982610a0f4be69801d0bbef6b445e00bf7fb76380ea60119c9cddc8518fe9b563c666d627327669cde923cd9e753e07719e79e50f2b244b52e5a2cab0dba450f60ccb1213c808c0f38dd92f5d6b9753f60050b579b58f1c813bc3da019213cd5b5", @typed={0x14, 0x1c, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @nested={0x4, 0x57}, @typed={0x4, 0x5}]}, 0x378}, {&(0x7f0000000d40)={0x10, 0x16, 0xc00, 0x70bd27, 0x25dfdbff}, 0x10}, {&(0x7f0000000d80)=ANY=[@ANYBLOB="d40300003f0000022abd7000fcdbdf2515d5ca049754c452710a08cb5cce4cd3e9315a2503b68ce8e9fab322647365dded07efd6c70ea4803f172e92725a3536f7869e18cf3bbd1c7747e63ae9db74b6a1f0bc2cf5ddf4af947c24b30610314b67183b200112ca97d7c1df9203169a0182e949a3d6fb008af8d5784ec5b18597c1195f281a7db5827006e5bc010d0008000d00", @ANYRES32=r7, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB='\x00'], 0x3d4}], 0x6, &(0x7f0000001300)=[@cred={0x20, 0x1, 0x2, r8, r4, r9}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r2]}], 0x48, 0x10}, 0x20000000) 2018/04/30 15:51:31 executing program 0: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/uts\x00') setns(r1, 0x59fffffc) capget(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000080)={0x7, 0xffffffff00000000, 0x9, 0x6}) 2018/04/30 15:51:31 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00"]) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:31 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00"]) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) [ 281.612585] device lo entered promiscuous mode [ 281.683234] device lo left promiscuous mode [ 281.702652] device lo entered promiscuous mode [ 281.708609] device lo entered promiscuous mode [ 281.724166] device lo left promiscuous mode [ 282.638803] device lo left promiscuous mode [ 282.644062] device lo left promiscuous mode [ 282.651503] device lo entered promiscuous mode [ 282.665280] device lo left promiscuous mode 2018/04/30 15:51:33 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000200)='ns/uts\x00') r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x10, 0x800) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) setns(r1, 0x5a000000) pipe(&(0x7f0000000040)) 2018/04/30 15:51:33 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)}], 0x0, &(0x7f0000000600)=ANY=[]) r2 = syz_open_procfs(0x0, &(0x7f0000176000)="00640001000445") getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001b80)=""/85) getdents64(r2, &(0x7f0000000df0)=""/528, 0xff95) recvfrom$inet(r2, &(0x7f0000000780)=""/250, 0xfa, 0x3, &(0x7f0000000480)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000001a40)=[{&(0x7f0000000780)}], 0x1) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x2) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f00000017c0)={0xffff, 0x60b}) ioctl$KDSETMODE(r2, 0x4b3a, 0x3f) write$cgroup_pid(r2, &(0x7f00000005c0)={[0x0, 0x0]}, 0x2) r6 = accept(r4, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16=r5, @ANYBLOB="10002abd7000ffdbdf250f00000008000496686fbd000c000100080006007772720008000600be0003007f000001000000000000000000000000080005000300000008000b00736970000c00070010000000"], 0x2}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) fallocate(r0, 0x0, 0xffff, 0x4) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000680)) r7 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r7, 0x1, 0x7fff, 0x10000101) dup(r1) 2018/04/30 15:51:33 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00"]) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00"]) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:33 executing program 1: mmap(&(0x7f0000000000/0x53000)=nil, 0x53000, 0xfffffffffffffffd, 0x8000032, 0xffffffffffffffff, 0x0) arch_prctl(0x1006, &(0x7f00000000c0)="228fc6ea2396901c46d2295e05460dc8ffe56f5c00b4df56f8563565e52f1b54648290c3c7b94eba12ba1bcf4bce70f2b069365725d0fdd61ee475f838d4fb964874f0eeca226a5ca8f6028f9b6e83dfa0df4f06e94b8ece38803cdafacc2662") r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000080)=0x8, 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), 0x0) 2018/04/30 15:51:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:33 executing program 7: creat(&(0x7f0000000000)='./file0\x00', 0x100) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_mr_cache\x00') r1 = syz_open_dev$urandom(&(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) dup2(r1, r0) pread64(r0, &(0x7f00000013c0)=""/4096, 0x1284, 0x0) 2018/04/30 15:51:33 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)=0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(r2, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {r4, r5+30000000}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) setsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000200)={@broadcast=0xffffffff, @remote={0xac, 0x14, 0x14, 0xbb}, r6}, 0xc) 2018/04/30 15:51:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00005d5ff3)={0x2, 0x4e20, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0x4e, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) writev(r0, &(0x7f0000000e00)=[{&(0x7f0000000800)="1a", 0x1}], 0x1) recvmsg(r0, &(0x7f00000030c0)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000002e40)=""/255, 0xff}], 0x1, &(0x7f0000002fc0)=""/205, 0xcd}, 0x0) sendto$inet(r0, &(0x7f00000013c0)="11", 0x1, 0x11, 0x0, 0x0) 2018/04/30 15:51:33 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) sendfile(r0, r0, 0x0, 0xcb) 2018/04/30 15:51:33 executing program 7: 2018/04/30 15:51:33 executing program 7: 2018/04/30 15:51:33 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x201) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r1, 0x5a000000) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000180)={'icmp\x00'}, &(0x7f00000001c0)=0x1e) getsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000080)=""/135, &(0x7f0000000140)=0x87) 2018/04/30 15:51:33 executing program 7: [ 283.309592] device lo entered promiscuous mode [ 283.317982] device lo entered promiscuous mode [ 283.329211] device lo entered promiscuous mode [ 283.439911] device lo left promiscuous mode [ 283.447278] device lo left promiscuous mode [ 283.452283] device lo left promiscuous mode 2018/04/30 15:51:34 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000c80)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000c40)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c010000100003000000000000000000ac1414aa000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3}, 0x1}, 0x0) 2018/04/30 15:51:34 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = dup3(r0, r0, 0x80000) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000100)={0x2, 0x2}, 0x2) setns(r0, 0x5a000000) 2018/04/30 15:51:34 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) read(r2, &(0x7f0000000040)=""/1, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)) dup3(r2, r1, 0x0) 2018/04/30 15:51:34 executing program 3: r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x2, {0xa}}}, 0x32) setsockopt(r0, 0x400000000000111, 0x1, &(0x7f0000000580)="4f4610cf", 0x4) sendto$ax25(r0, &(0x7f0000000000)="1ac58656dd9d8b", 0x7, 0x0, &(0x7f00000002c0)={0x3, {"1e3b6459dd5581"}}, 0x10) 2018/04/30 15:51:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:34 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00"]) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:34 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000140)) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) 2018/04/30 15:51:34 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'sit0\x00', 0x202}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000080)=0x1) 2018/04/30 15:51:34 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2, 0x0, 0x0, 0xffffffffffffffa2}, [{0x0, 0x5, 0x0, 0x1, 0x7f, 0x0, 0x0, 0x9}], "", [[], [], [], []]}, 0x458) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1', "9666852858a43b59171cc60233a50b8e732ddcea02107599f4e6b5fc6db73f367ba3c6a186c34cec5418a4d9727f873fed4474588e20"}, 0x3a) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000e00)) 2018/04/30 15:51:34 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x5, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000180)) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x0, 0x0, 0x775, 0x80000001, 0x0, 0x0, 0x5, 0x1}) 2018/04/30 15:51:34 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000300)='ns/uts\x00') setns(r1, 0x5a000000) r2 = add_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x10081, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r4, 0x2288, &(0x7f0000000240)) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) keyctl$chown(0x4, r2, r3, r5) 2018/04/30 15:51:34 executing program 1: 2018/04/30 15:51:34 executing program 1: 2018/04/30 15:51:34 executing program 1: 2018/04/30 15:51:34 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) ptrace$peek(0x2, r0, &(0x7f0000000080)) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r1, 0x5a000000) 2018/04/30 15:51:35 executing program 1: 2018/04/30 15:51:35 executing program 3: [ 284.829892] device lo entered promiscuous mode [ 284.838749] device lo entered promiscuous mode [ 284.918156] device lo left promiscuous mode [ 284.930025] device lo left promiscuous mode 2018/04/30 15:51:36 executing program 1: 2018/04/30 15:51:36 executing program 3: 2018/04/30 15:51:36 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 2018/04/30 15:51:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:36 executing program 6: 2018/04/30 15:51:36 executing program 2: 2018/04/30 15:51:36 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000140)={0x303, 0x33}, 0x4) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000180)=0x3, 0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r2, 0x1000000000015) 2018/04/30 15:51:36 executing program 7: 2018/04/30 15:51:36 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffffddae0053, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:36 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) sendto$inet6(r0, &(0x7f00000000c0)="7409000000202cb57e7903ec1337bbd26c5154755be022e0a482678d1800a81131eb037b9d5235ad1bd0926192178b6a14d11b886a09aae2f0e2f4a407edc382f807778170aa8f9a05", 0x49, 0x20004000, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) 2018/04/30 15:51:36 executing program 6: r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x2, {0xa}}}, 0x32) setsockopt(r0, 0x400000000000111, 0x1, &(0x7f0000000580)="4f4610cf", 0x4) sendto$ax25(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000002c0)={0x3, {"1e3b6459dd5581"}}, 0x10) 2018/04/30 15:51:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/188, 0xbc}], 0x1) 2018/04/30 15:51:36 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={"6c6f00aeabd1cd0000000000f9ff00"}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="3400000014000100000000000000000002000000", @ANYBLOB="140006000000005d8a000000000000000000000008000200ac141400"], 0x2}, 0x1}, 0x0) 2018/04/30 15:51:36 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) unshare(0x2000400) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/user\x00', 0x2, 0x0) 2018/04/30 15:51:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0xe01fcf4c3277df96) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x20004010, &(0x7f00000001c0)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x264) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x7ffb, 0x7fffffff}, 0x14) sendto$inet(r0, &(0x7f00000000c0)="92", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/30 15:51:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:36 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:36 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) [ 286.327146] device lo entered promiscuous mode [ 286.341121] device lo entered promiscuous mode [ 286.346779] device lo entered promiscuous mode [ 286.366327] device lo entered promiscuous mode [ 286.487238] device lo left promiscuous mode [ 286.492615] device lo left promiscuous mode [ 286.499213] device lo left promiscuous mode [ 286.512507] device lo left promiscuous mode 2018/04/30 15:51:37 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) nanosleep(&(0x7f0000000100), &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000180)=0xc) syz_open_procfs(r1, &(0x7f00000000c0)='net/ip_tables_matches\x00') 2018/04/30 15:51:37 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffffddae0053, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:37 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet6(0xa, 0x2, 0x61) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000240)={'security\x00', 0x1f, "fecea5a0ce279107d5542ed53f00735baec6cbf1e2542a0d3a7bfa199a7ec8"}, &(0x7f00000002c0)=0x138) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) 2018/04/30 15:51:37 executing program 7: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)}], 0x0, &(0x7f0000000600)=ANY=[]) r2 = syz_open_procfs(0x0, &(0x7f0000176000)="00640001000445") getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001b80)=""/85) getdents64(r2, &(0x7f0000000df0)=""/528, 0xff95) recvfrom$inet(r2, &(0x7f0000000780)=""/250, 0xfa, 0x3, &(0x7f0000000480)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000001a40)=[{&(0x7f0000000780)}], 0x1) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x2) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f00000017c0)={0xffff, 0x60b}) ioctl$KDSETMODE(r2, 0x4b3a, 0x3f) write$cgroup_pid(r2, &(0x7f00000005c0)={[0x0, 0x0]}, 0x2) r6 = accept(r4, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16=r5, @ANYBLOB="10002abd7000ffdbdf250f00000008000496686fbd000c000100080006007772720008000600be0003007f000001000000000000000000000000080005000300000008000b00736970000c00070010000000"], 0x2}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) fallocate(r0, 0x0, 0xffff, 0x4) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000680)) r7 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r7, 0x1, 0x7fff, 0x10000101) dup(r1) 2018/04/30 15:51:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:37 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0xe01fcf4c3277df96) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x20004010, &(0x7f00000001c0)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x264) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x7ffb, 0x7fffffff}, 0x14) sendto$inet(r0, &(0x7f00000000c0)="92", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/30 15:51:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:37 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x400400080, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000100)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r2 = gettid() prlimit64(r2, 0xe, &(0x7f0000000040)={0x0, 0xe8}, &(0x7f0000000080)) getpid() setns(r1, 0x8020000) 2018/04/30 15:51:37 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffffddae0053, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:37 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffffddae0053, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:37 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:37 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0x1c) setns(r0, 0x5a000000) [ 287.318803] device lo entered promiscuous mode [ 287.406406] device lo left promiscuous mode [ 287.475005] device lo entered promiscuous mode [ 287.481327] device lo entered promiscuous mode [ 287.487021] device lo entered promiscuous mode [ 287.567601] device lo left promiscuous mode [ 287.579715] device lo left promiscuous mode [ 287.592409] device lo left promiscuous mode 2018/04/30 15:51:38 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:38 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:38 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x20000020000000) syncfs(r0) 2018/04/30 15:51:38 executing program 1: getpeername(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000000080)=0x80) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @broadcast}, &(0x7f0000000100)=0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 2018/04/30 15:51:38 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:38 executing program 2: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/validatetrans\x00', 0x1, 0x0) writev(r0, &(0x7f0000001740)=[{&(0x7f00000000c0)="72839e6b9491b8a905663bf9f8e6188aa2d37c5b4304866985d758bb309c76fb7dc1c4b2784a484cbb7e1a0775e617a7e28bdfc2f887f8f128e52deb0620cdedd67576bf9e7ad136169915ad1819e1e083787b78018877a8a036b6", 0x5b}, {&(0x7f0000000000)="794ecaa99ff26be8a3378956406c0a8ccdb122ee90849031bc4be395e2adb56c47766be6ba99938eda965eb95464863fa215fea0f436577ffb18746b2941ef85edcba8003decbbe23a9e000000000000", 0xb9}, {&(0x7f0000001680)='\x00', 0x1}], 0x3dc) 2018/04/30 15:51:38 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000000140)=[{}, {}], 0x30) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f00000000c0)=""/19) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) getpeername(r3, &(0x7f0000000180)=@hci={0x0, 0x0}, &(0x7f0000000200)=0x80) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000240)=r4) tkill(r1, 0x1000000000015) r5 = add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000400)="1b8d77ef9b0d059b46b47057f811cd0bfd43f7bd58a472c2e338d28afea9714729fc303485eeefda3cc51caec9c5a4d4199752b6ffd10bea83f418a10e11458ae890eb9e8bf1cec99f0a76d5eb385dc79f7ebda2ef6a41f66457efe3080c4250e142b06b102c76d1033e23dff33ade083c9640f68048abcc333d1f138c686ebdf23dd647e8c2b5ed74f0f9af65ddff8e043de5fbf13e4d4ea5f94927f490caf85af4a3b74628e0c526bb280a53d8ec8d22590b1449b484b2bf20c9c1797bf5d834de0e9ed18fc954eeb4e6dced30f8ca1e017dcc335095beaebb01cfafa44c3d62", 0xe1, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000380)='keyring\x00', 0xffffffffffffffff) keyctl$link(0x8, r5, r6) 2018/04/30 15:51:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x7fff000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000180)=0x4) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000140)=0x4, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0xc02, 0xa) r1 = creat(&(0x7f0000000440)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r2, 0x80000) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/30 15:51:38 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f00000000c0)='ns/pid_for_children\x00') setns(r1, 0x59fffffe) 2018/04/30 15:51:38 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:38 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0xbcf}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x7, 0xd386, 0x1, 0x3, 0x5, 0xd2f, 0x6, 0x101, r2}, 0x20) setns(r0, 0x5a000000) 2018/04/30 15:51:38 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffffddae0053, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:38 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffffddae0053, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) [ 288.553822] device lo entered promiscuous mode [ 288.560199] device lo entered promiscuous mode [ 288.565689] device lo entered promiscuous mode [ 288.607456] device lo left promiscuous mode [ 288.628003] device lo entered promiscuous mode [ 288.638754] device lo left promiscuous mode [ 288.661780] device lo left promiscuous mode [ 288.673774] device lo left promiscuous mode 2018/04/30 15:51:39 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffffddae0053, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:39 executing program 0: setns(0xffffffffffffffff, 0x5a000000) r0 = getpgrp(0xffffffffffffffff) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) fcntl$setown(0xffffffffffffffff, 0x8, r0) 2018/04/30 15:51:39 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000200)=0x3, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) socket$inet6(0xa, 0xf, 0xffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f00000002c0)="e8d3df07a0eeaed668d3e5e3e82c89e7d37a3545b2e569d86a05ea4d88d062cad476cfde68", 0x25, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffe) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0xa010200}, 0xc, &(0x7f00000001c0)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="1000000a2a0000000000860000000000"], 0x10}], 0x1, &(0x7f00000017c0)=ANY=[@ANYBLOB='0\x00', @ANYRES32, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32], 0x12}, 0x0) ftruncate(r2, 0x7fff) r3 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x6}, 0x1c) sendmmsg(r3, &(0x7f0000002dc0), 0x40000ff, 0x0) 2018/04/30 15:51:39 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000000140)=[{{}, 0x4, 0x40, 0x1}], 0x18) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) 2018/04/30 15:51:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(0xffffffffffffffff, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:39 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:39 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:39 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffffddae0053, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:39 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20000, 0x0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000240)=""/83) setns(r1, 0x5a000000) 2018/04/30 15:51:39 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffffddae0053, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:39 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffffddae0053, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:39 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffffddae0053, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:39 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000180)=@get={0x1, &(0x7f0000000080)=""/218, 0x81}) setns(r0, 0x5a000000) 2018/04/30 15:51:39 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffffddae0053, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:39 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffffddae0053, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 288.940469] device lo entered promiscuous mode [ 288.947886] device lo entered promiscuous mode [ 288.955661] device lo entered promiscuous mode [ 288.968553] device lo entered promiscuous mode [ 289.047998] device lo left promiscuous mode [ 289.101806] device lo left promiscuous mode [ 289.112953] device lo left promiscuous mode [ 289.123425] device lo left promiscuous mode 2018/04/30 15:51:40 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x7f}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:40 executing program 4: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/enforce\x00', 0x100, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f00000004c0)) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x400000, 0x0) pipe(&(0x7f0000000440)) setsockopt$inet_buf(r2, 0x0, 0x10, &(0x7f0000000140)="5a1a9821c6b1570c4eeabd45fe341995d4248afc8bc94187e396db8eff5b7872526ee9e6f5349be7f3fc33096bfcc151ec00793cc3311b98f79d0170ae780193", 0x40) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r3 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200)="56240b71835707641202fdf7eadf50cf9742bec901297f67479cdf04d885f30766df3e56aae4642b0550fcf8eb18be8343503942cfd4d3eb0cf99e3920e9b1dd4e583faadb8d9e6700f08d98fa8f820d6ef4064cf9f3407e408efe5c89a09e56fabddec7387ce4ebf1c86ec071c3c8f51391308deaafd2ed1820ffa504f380c44df95609ddcc60b58fdd23cc8481a26b27c6cbc9f5b49c1d80f2183cc44124983109b1ef231e8623078aa1768dadde12a3f35c785e6f9053f6d83e848f67bf037dc98789176b25c375b9c719be7dd58a2bafab5d14", 0xd5, 0xfffffffffffffffb) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$search(0xa, r4, &(0x7f0000000300)='id_legacy\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, r5) tkill(r3, 0x1000000000015) 2018/04/30 15:51:40 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r1, 0x620, 0x70bd29, 0x25dfdbff, {0x2}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x1d}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3a}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_AF={0x8, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r2, 0x5a000000) splice(r2, &(0x7f0000000440), r2, &(0x7f0000000480), 0xffffffffffffffac, 0x5) r3 = dup3(r0, r2, 0x80000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}}, &(0x7f0000000300)=0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000340)={r4, @in6={{0xa, 0x4e22, 0x1, @loopback={0x0, 0x1}}}, 0x80000001, 0x7, 0x7, 0x100, 0xffff}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000040)=0x9, 0x4) 2018/04/30 15:51:40 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xb, &(0x7f0000000080)=0x6c5, 0x4) r2 = accept$ax25(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="85ace0073bc515f3adbed20d060a3eee25e220eeaed668d3e5e3e82c89e7d37a3562fa", 0x23, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffe) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f00000006c0)='./bus\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000880)=0xe8) fstat(r1, &(0x7f00000008c0)) sendmsg$unix(r1, &(0x7f0000000980)={&(0x7f0000000200)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000280)="3cf94731f1132e1fb72471f2893c060c1aafe79540a8b5ca5e22e94c8ef261899aa331266b7ad499cd04e648eee06d94e8db242aa9ff76acfcd6e48509b6c2e64da330ab6184563736f3d112cf5de88a6aef71b39845f2e27c4b969d9ecd8b059486f1132de60329f156955c27b56a1fa7240e016ab5082d2f6c7975f4bcb1", 0x7f}, {&(0x7f0000000340)}], 0x2, &(0x7f0000000940)=[@cred={0x20, 0x1, 0x2, 0x0, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7}], 0x40}, 0x1) dup(r2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000180)={0x7, 0x5, 0x0, {0x77359400}, 0xe5a2, 0x2}) 2018/04/30 15:51:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x0, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:40 executing program 7: unshare(0x400) r0 = eventfd(0x400000) inotify_init1(0x0) r1 = dup(r0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) 2018/04/30 15:51:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:40 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(0xffffffffffffffff, 0x2, 0x2, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) preadv(r2, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r3, &(0x7f00000001c0)='./file0/file0\x00', r5, &(0x7f0000000200)='./file0/file0\x00', 0x1) r7 = socket(0x800000000000011, 0x800000002, 0x0) bind(r7, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r5, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r7, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={r8, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:40 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ce9ff3)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x8, @mcast2={0xff, 0x2, [], 0x1}}}, 0x1000, 0x5, 0x1e8413b9, 0x2, 0x7576}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x0, 0x4}, &(0x7f0000000180)=0x8) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000200)) 2018/04/30 15:51:40 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], [], []]}, 0x858) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:40 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000100)='ns/user\x00') setns(r1, 0x5a000000) 2018/04/30 15:51:40 executing program 7: r0 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'bcsh0\x00', 0x2001}) r1 = socket$unix(0x1, 0x400000000005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8923, &(0x7f0000000080)={'bcsh0:\x00'}) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r3 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x1f1209c3, 0x6, 0x0, 0x2, 0x0, 0x1, 0x80, 0x5, 0x7, 0xffffffffffffffe1, 0x0, 0xcea3, 0x1, 0x1, 0x100000000000, 0x4, 0x6, 0xf8cc, 0x966, 0x8, 0x155, 0x101, 0x6, 0xcb, 0x7, 0x7, 0x2, 0x52ee, 0x4, 0x7, 0x8, 0x3, 0xfffffffffffff800, 0x5, 0x31a, 0x563, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000240), 0x2}, 0x4020, 0x8001, 0x3c572852, 0x7, 0x1, 0x5, 0x7}, r3, 0x1, r2, 0x3) socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f00000000c0)={@empty, @multicast1}, &(0x7f0000000100)=0x8) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x201, 0x0) getpeername$inet6(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) 2018/04/30 15:51:40 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:40 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:40 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a63fff), 0x0, 0x20020004, &(0x7f0000385ff0)={0x2, 0x1, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f000074847c)=[{0x8}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000f8e000)={0x0, 0x20000000012c6, 0x1000010004}, 0x14) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000240)="3f2cc696e4ecbc41c1eb5b53639ae865e4d6272df1054da56b58ceddf15d4db6030baede12dbbd3b6c999906f302a60a1d6b7a236d917548f77807157817afd73cbb92902b8ba6b7a9aa00ca08e10ab035ab5b9c63675f3bb823850662a0d945e5056789c3cbae9f08bbc8ed1b443853bb816ef47e32668b3f5d81e7b59d1b751aedb09ee881a5fdeaf6f03c56ff291925d60bd9f9d8f0749c9e934576f547fbe774c4d95cb3b5b516727f90ebabb253cb1533b742", 0xb5, 0x24000800, &(0x7f0000000300)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000cf1f96)='N', 0x1, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f00007b1ffc), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000003100)={0x0}, &(0x7f0000003140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000003180)={0x0, 0x9, 0x30}, &(0x7f00000031c0)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000003280)={0x0, 0x5072, 0x7, 0x8}, &(0x7f00000032c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000036c0)={0x0, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, 0x6, 0x32d9, 0x8, 0x9, 0x20}, &(0x7f0000003780)=0x98) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000004a80)={0x0, 0x5, 0x6, [0x0, 0xc3, 0xfffffffffffffffe, 0x6, 0x9, 0x80]}, &(0x7f0000004ac0)=0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000004b00)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000004b40)=0x1c) sendmmsg$inet_sctp(r1, &(0x7f0000004c40)=[{&(0x7f0000000080)=@in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000000440)=[{&(0x7f00000000c0)="84b4aa5c25777d69a12d14d16af32350779595538fa5190b9c39495ee623993cc8fbbea567e3d4a5cf076baeb8928110b2cd98f0ddcb05e8a7f6d6e16a2d65e95bad8edacc92e6e0de7314fb840c5672232583cd5d82c687d9d9cf89c861274c192a39339a4f2e313dfbeffdf8dd579fa819", 0x72}, {&(0x7f0000000140)="7280d16d0fbfaeba4ee04e8d64b1df8694574b8a7f8665d5217e78ddb64532cbff49b082e170d0d5c547712c899aa2f26da8042bb6be70cba1da0c899f9eb511107367ee7b3c469609e70a5aadb6d65b00daa23e1ced132fb847df9e71363b8595997a14801137f2eaf491ec7434e4395cf5273ed08fcb1d30cf68c632d0aa67123d6d1ee5048cf0b3e947ff937e61d2524b220ee942c7db66349940a7f658", 0x9f}, {&(0x7f0000000340)="d7d5284cfa85a9c1a34040700d7e49128677491509ad0ee02863b3bf6404a02adbf4bf21eda4fb35680e544eb0217f5e587de44cf9d333035c5148a299019910506eac189c69e457bc7c710b363cf1a3ded9c950a52a23d2cb9d164ebd99c277e92b84016d1fc4a7aa74733a9195554209c79f948fdc79f5d29459b7e4c2bbccf22c9d7d98f0aa66a767bbb00a414821d1b9fef0ad3b0f222b22f7248512df1b70ffce95ab3275af77534e879935140acba89783775cbc46a139a1cede4e83a75aea13e535aef03826f7e3e725943d80fb30141326dffb225d544cab5688af185de791ab661754f4e6414c700dc160479c15267c", 0xf4}, {&(0x7f0000000200)="ff23824f777761ac1f2a96772c553a5a3bb0e0687401868c1f4a197cc71115", 0x1f}], 0x4, 0x0, 0x0, 0x4000000}, {&(0x7f0000000480)=@in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000004c0)="a52f7c1feacc742198067e1043993d17a4b798b69374c1df4336870d3613cb77cfd6fc4cf626118eb910d92c6ed4d77a0df407a089cb97bcea7603990311466c0865120d6201a64b8ffb8c6c1bd85729ba2740d282722048f16e966b7146a65abbf00745bf8f4db2d20a11919474b6bd1a8ae034d79ecbe85992d7c03703714a773c215db9ac2f49a23cc985a82a520716fc688439a894dc39b7563132ab9d942f9d52ae64e2dbf2e56a994b0bcf6fb004ae281af193", 0xb6}, {&(0x7f0000000580)="7e1285e3fca4429489dde64d49f5581d899d501c32b82e0070e0ea261ed2d3af8a9163c31b28e72eddfc2e4ebdadf9cd", 0x30}, {&(0x7f00000005c0)="1a686a1383907fdaab3c0c21b8c52efdd94907e9ffd0615923f8f0bb100d427652c4e944bbd07cd7ff2786fd0ae23f7e0b0a00f68384163835fa88e6bfe3ee2c784fe89d4865b776cd5427eafee6b6050b5fd62f7717ba7d0185ea9b520f06007fb1a8e43aaa20c7ca16ad8cdc9b0ab0e930685140657d08d76252e1cb9e2c3e68699f74a3f8a25d8908ded0dfbc5eeba67a76eb", 0x94}, {&(0x7f0000000680)="2e26c01c267b7da4b2a93802e30acf0f60c6f9bb2030965bcea3a9e94950d5c77a518efdd97bb15b7bce4732aa277d31eee681", 0x33}, {&(0x7f00000006c0)="31d5078f620289f67277d66bb5b869631365412f6fbfc0f31ecf658bad62f82d646657ec1f488291e22f824ff77a203a289d7c460d08bf8061ca21cfacda7cd26408e4e0bacac859a23a7a7366003f7a8c1de9d94223b8452a46541d0cafaba70919f79feedd6918dd2a", 0x6a}, {&(0x7f0000000740)="ede4c087ce991f09bc032a0a2479d2fb8e9ae219b27c37104367d38b", 0x1c}, {&(0x7f0000000780)="b1dab8fc597372047aaec81a0a6a15a45c07cd3460a0d09ff8d1fecc929c109bdfd99ce6b4e322ad75a189c12dcaa568e51d16be6ad614c10ed5b44b9e7d6aeb72cf9faa7f2fef5f98cd3818144e4e663e2835c64ae8be37671ab5433c142a77d77473d35cbcc77b26565a10c5c1a0798feebb241170fac3a2c91139b878", 0x7e}, {&(0x7f0000000800)="3821f52b41a4b7e3a711a0f497fdac2f92604cea90082efbbed4062ff7c4656847a1ad0b1ba55cae0994b6a4f1ade4ea467fb77bb3c8cf04d7339d3f3a6b1df6f9be225b3f5fad56ed4e7a05d598c9533e299c81f1d201bd9bfb5e261f5d88becf310359f8a10026a394ef0a102247dd9add071302925b7d24b16c7f1e52f25256", 0x81}, {&(0x7f00000008c0)="dd5790138052cb2aacd2e60e28fd8b85f5097b2c373378871221f36ae505b52ac6241cb0dee26e23c3b5", 0x2a}], 0x9, 0x0, 0x0, 0x40}, {&(0x7f00000009c0)=@in={0x2, 0x4e23}, 0x10, &(0x7f0000002d40)=[{&(0x7f0000000a00)="2a7f1d5310465096f7af3b4d04333cc5d0a3e99df4d26a2dd6159ed897ee44c66620bc2abbb1e53acd3d679a66eb204ed4979f3e8980e8996286d73f8b78170106f698c61e76f23b99f0e0327bd8", 0x4e}, {&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000001a80)="4cc613bf", 0x4}, {&(0x7f0000001ac0)="62ab2fb05923b4a51596518ea7ad43c26b98f941e35b1ccb62a3dd4d", 0x1c}, {&(0x7f0000001b00)="9f13bf1823e6778e711a44be26fe6a8565e3cd7a7df0b69bb32c2b0f754e9d9aeef9438e929735e7d4d95a9fc96128eb0cddf8fa95452f057e5efeae39b8e535b6499872e95a6f060157fd38ca4cd6d5e9be421fcb60d2eafe27da96f1d72180dee6bebc9096248886571bd4ed78ceac364a5241abb6c99c6210d810355db3b51315cba96756613ea9fe6a3b6744e747369b1fc246f822ae21a9e4485a6261557b298681a5b0d107d1db2bc38576c0c39221edd36467496f443184f49faf", 0xbe}, {&(0x7f0000001bc0)="c704a16e8dd1642c6c1887426da6200f6a57d29174fc7fe23d73cb4c2445a18b94955acefeca0972cef4a59e036bf3c1cb3bfd79e02ff16d62fb0553a42007e494ea", 0x42}, {&(0x7f0000001c40)="80586374347df672619c1be657922a39386841050a9a445be9dcd9278c6afe3d6889c3801b675c42d2a2197aa78c4e5838103b42a702928f09d35d663625a86c0b0387745f38b7fa12e9fc7c1854c4d3b3411882a0cb3513bf8dd3a4660d90ae07295aa2301aa5b06170934caa0bff976065be16cdd6f9497c6acf43e9a730a58dad2ae553fdeda0a9a0114cf1027b9b284420c680aa2624a2ec", 0x9a}, {&(0x7f0000001d00)="852818", 0x3}, {&(0x7f0000001d40)="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", 0x1000}], 0x9, &(0x7f0000002e00)=[@authinfo={0x18, 0x84, 0x6, {0x3}}], 0x18, 0x8001}, {&(0x7f0000002e40)=@in={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10, &(0x7f00000030c0)=[{&(0x7f0000002e80)="6d5970c3154a0ff832632dd5cd4592e05e62ec4f92bb5b31d2e70f0de4575d821d399907b38779b3a3da674c161c039ac4ef1c914fd607f651d2f529b079f99d5c27b66f", 0x44}, {&(0x7f0000002f00)="cbd338c1484bb6c50c72fcde1d756e2c00870b55c5ecf7ae465df450956d41829139a193895120cc2077d587a5f5c1f835d47df94fd17ba1be0dee11514e784d22634cf11afa0e71c8a1f60d79024f0385738c5eb29beed84bf6825c15ea6e792c34ed8945617014db2de904b016fbd7d79ea431e4d98b8ac71b0d18e6b57e79ddbbd046e865c6df25cb76ce0dc6c2b7023997f7ea73d1ad8b6078a6f28f083c14869583be23834f22083985f7609ec1c618c4c5b04a0ec3a31074d2671a96fdafbc25b6231a74c2feeb26c9b519621ec10f8b55", 0xd4}, {&(0x7f0000003000)="77d95bdc071cc17f0eb2fcbf1043337821568aa4ac2f0cfca2695a2fa65a812e058c8730e338c81374c245505f9d60cbb89dd93fb9bf9b85da062dba58dd667c70180d5dfe1c680d5f381cf8fb4ed9790458b19807d4f02ca1b9d4377873142a2cc6275bf46b4b083b98f6e595cd745609ff26ab364222a7044084192bfaafc78e6d91f32f12a3431b59e6aa4054e59b8c401de136999f3803d2ff29f28b90680f6b5c5d70230f8e248bcf223083790c3e637b3e7088498e87dba03a4e21", 0xbe}], 0x3, &(0x7f0000003300)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast1=0xe0000001}, @sndinfo={0x20, 0x84, 0x2, {0x9, 0x2, 0x800, 0x9, r2}}, @init={0x18, 0x84, 0x0, {0x100000001, 0x6, 0x100, 0xf46}}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0x6, 0x8, 0xede3, 0xfffffffffffffffd, 0x0, 0x20, 0x8ad, r3}}, @dstaddrv4={0x18, 0x84, 0x7}, @sndinfo={0x20, 0x84, 0x2, {0x32d4bce8, 0x200, 0x0, 0x1f, r4}}, @authinfo={0x18, 0x84, 0x6, {0x6cc3ed11}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x14}}, @authinfo={0x18, 0x84, 0x6, {0x2}}, @dstaddrv4={0x18, 0x84, 0x7, @local={0xac, 0x14, 0x14, 0xaa}}], 0x120}, {&(0x7f0000003440)=@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10, &(0x7f0000003680)=[{&(0x7f0000003480)="32e51618d1875a604c1c8054f5aefc706a4fc1d7c1dba93eec2b691bf5ab29b23a32015864734cb6668950eb2bda2f6ea2d100017f10d69eaef038eedb05626371f3fd5f77ac32139d4168c5f674b6715c437d79948bc10c74a3ada33b71bd62c4cef6e7352aa34621d2bfe5a6d67c38d43b47a58ecc7fd95583de223671705348bb5e18bba84ca2b442163275997f5c94967fad1160403f06796dd989fcf1eb08104e44e4cf92f88ab599442a0d1ddf018882697aadc67a7b3213837d155b0687ffde9c7e0d0f4a13d2930ec5b7cd5f44241324725e2393eee51856b0c2aa425642", 0xe2}, {&(0x7f0000003580)="8b36a98a6b9a40efb67f9af8deaa3a5ae74a8c14dc40da7f4635fb6ba4e621f9a89b8fcc8414d1a609775c8ad69d311f54697e3ff51a91d65df4d4a8a6ac7169dc015fc36ae6db30a9633d1de24cd54573bd5af7f6bb6eec786cf710a53b7139045210ff913a80a0fd4661c0d494028b8302", 0x72}, {&(0x7f0000003600)="4420ba740359eff4e2e48c0b016f2bfc5b958be6044cb5e2eb1ae366af7804cee37110c1c91df7f123ea4cde4ff88de6cce2eecea96df95ea09137327430a25c25a0ad0021cbe8aaf259ac919162049e0444eefe71", 0x55}], 0x3, &(0x7f00000037c0)=[@init={0x18, 0x84, 0x0, {0x10001, 0x78c9, 0x40, 0x7fff}}, @sndrcv={0x30, 0x84, 0x1, {0x7, 0x36, 0x203, 0x10001, 0x101, 0xab, 0xfffffffffffffff7, 0x7fffffff, r5}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2=0xe0000002}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x1}}, @authinfo={0x18, 0x84, 0x6, {0x400}}, @dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x12}}, @authinfo={0x18, 0x84, 0x6}], 0xc0, 0x4000}, {&(0x7f0000003880)=@in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10, &(0x7f0000004a40)=[{&(0x7f00000038c0)="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", 0x1000}, {&(0x7f00000048c0)="d1510b77665837586647cf842df1e4ce", 0x10}, {&(0x7f0000004900)="0f4502368296f7aeb524d85fdd2f746cf4dac12e4de0adfe8f8956e1036efaeb1182b614c802471a51e5176948624dc0a8071f66cfb607ffff96a582db349906638660ac99a19ff404983d6c83f72f245aacf96970e49a32964ec535c43d0232ba0392cb3620f6270e03ca8c6f8b461b1545f2", 0x73}, {&(0x7f0000004980)="900a3bcbc92f6888f41d3a8e0e0d68b9e84f32ab206acb6afee3e5c39ce27333a11c4ca4cf0eca2d550addf0224cbaef0d6681d4dade922ecac11c9c04c23d447937bb1b9c50d590566c7dae424ce166ca14853450a804646f0f4daf1ddc9ec9f69654b0b37878087290c2993c6b84262cbb9b73d7273de5177948cb9c6b77e9f27e52daa9b0f9d71713fb0abbae78c66ef03ab787f70d27fa050e49c71a434379c6e601becec558cff25a2c3c0442c4596be37a49b16e4c547900f12d9a", 0xbe}], 0x4, &(0x7f0000004b80)=[@sndrcv={0x30, 0x84, 0x1, {0x3, 0x0, 0x8, 0x38720a95, 0x1, 0x8, 0xfffffffffffffffa, 0x7, r6}}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @init={0x18, 0x84, 0x0, {0x2f5, 0x1, 0xfff, 0x8}}, @dstaddrv6={0x20, 0x84, 0x8, @local={0xfe, 0x80, [], 0xaa}}, @sndinfo={0x20, 0x84, 0x2, {0x1, 0x4, 0x5, 0x3, r7}}], 0xa0, 0x801}], 0x6, 0x40) 2018/04/30 15:51:40 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) 2018/04/30 15:51:40 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 290.050667] device lo entered promiscuous mode [ 290.064722] device lo entered promiscuous mode [ 290.185418] device lo left promiscuous mode [ 290.191063] device lo left promiscuous mode [ 290.196723] device lo entered promiscuous mode [ 290.254230] device lo left promiscuous mode 2018/04/30 15:51:42 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') setns(r0, 0x5a000000) 2018/04/30 15:51:42 executing program 7: r0 = socket$inet(0x2, 0x80001, 0x0) bind$ax25(0xffffffffffffffff, &(0x7f0000000100)={0x3, {"e0566df1b9ddde"}}, 0x10) ioctl$sock_inet_SIOCSARP(r0, 0x8954, &(0x7f0000000180)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @loopback=0x7f000001}, 'syz_tun\x00'}) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000200)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) getpgrp(0x0) bind$ax25(r1, &(0x7f0000000380)={0x3, {"db203382c99552"}, 0x80000001}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000000300)=0x98) setrlimit(0x0, &(0x7f00000000c0)={0xffffffffffff0000, 0x5}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="c0000001ac1414e90000000902000000ff69a9ffac1414aa"], 0x18) 2018/04/30 15:51:42 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:42 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x0, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x0, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:42 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0xbf6, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) 2018/04/30 15:51:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) pipe2(&(0x7f00000000c0), 0x4000) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000580)=""/176) 2018/04/30 15:51:42 executing program 0: r0 = getpgid(0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000040)='/Pid\x00\x00\x00') r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x6, &(0x7f0000000180)=0x2) setns(r1, 0x5a000000) setsockopt$inet6_buf(r2, 0x29, 0x0, &(0x7f00000001c0)="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", 0x1000) 2018/04/30 15:51:42 executing program 7: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000000000039a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)=0x0) getpgrp(r0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)="6e65742f617270006733d23d5a2e0e340e196a300bf064412c5b3a8613d38d04d7d711008a11ae5827c5bb58e59a4df064e43a1a8bece350c6f027a75f7357cf3b5bc6b57b6807150b8ff02bbb59c9bca9e4c82a4f2408e6b86f0f5bc73b07ecfb7dd81180bacd2b2634dcf3f170c9552d36504aecdbfe2dedf5d9b509eb70a5d32aa9475fabfe6eb16c0959ec1d8aaf") preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x10400003) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f00000004c0)={0x4, 0x8, 0x1}) 2018/04/30 15:51:42 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:42 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:42 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000080)={0xc21, 0x0, 0x9, 'queue1\x00', 0x200000000000000}) setns(r0, 0x5a000000) 2018/04/30 15:51:42 executing program 7: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000000000039a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)=0x0) getpgrp(r0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000001c0)="6e65742f617270006733d23d5a2e0e340e196a300bf064412c5b3a8613d38d04d7d711008a11ae5827c5bb58e59a4df064e43a1a8bece350c6f027a75f7357cf3b5bc6b57b6807150b8ff02bbb59c9bca9e4c82a4f2408e6b86f0f5bc73b07ecfb7dd81180bacd2b2634dcf3f170c9552d36504aecdbfe2dedf5d9b509eb70a5d32aa9475fabfe6eb16c0959ec1d8aaf") preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x10400003) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f00000004c0)={0x4, 0x8, 0x1}) 2018/04/30 15:51:42 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 292.086060] device lo entered promiscuous mode [ 292.097204] device lo entered promiscuous mode [ 292.103123] device lo entered promiscuous mode [ 292.187614] device lo left promiscuous mode [ 292.209173] device lo left promiscuous mode [ 292.236831] device lo left promiscuous mode 2018/04/30 15:51:43 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:43 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x12000000) 2018/04/30 15:51:43 executing program 7: openat$ashmem(0xffffffffffffff9c, &(0x7f000001b000)='/dev/ashmem\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x0, 0x6) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000280)={0x303, 0x33}, 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x200000, 0x0) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000240)) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000002c0)={0x8001, {{0x2, 0x4e23, @rand_addr=0x3fffffffc00000}}}, 0x88) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000400)=""/241) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f00000003c0)={0x3, 0x9, 0xfffffffffffffff9, 0x8, 0x1, 0x20}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_dccp_buf(r4, 0x21, 0xc, &(0x7f0000000140)=""/80, &(0x7f00000001c0)=0x50) 2018/04/30 15:51:43 executing program 6: r0 = socket$nl_generic(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f00000026c0)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, 0x1, 0x2, 0x3, 0x4}}, 0xffffff3f, &(0x7f0000001300), 0x0, &(0x7f0000000300)=ANY=[@ANYRES32=r0], 0x11}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x9c, r1, 0x204, 0x70bd2b, 0x25dfdbfd, {0xa}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x196}]}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local={0xfe, 0x80, [], 0xaa}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000800}, 0x1) 2018/04/30 15:51:43 executing program 2: r0 = open(&(0x7f0000000200)='./bus\x00', 0x141041, 0x0) fallocate(r0, 0x11, 0x0, 0x3fffffb) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400000, 0x0) fadvise64(r0, 0x0, 0x8002, 0x4) 2018/04/30 15:51:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:43 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x80, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) setsockopt$inet6_opts(r2, 0x29, 0x39, &(0x7f00000000c0)=@srh={0x33, 0x4, 0x4, 0x2, 0x5, 0x8, 0x7ff, [@loopback={0x0, 0x1}, @mcast1={0xff, 0x1, [], 0x1}]}, 0x28) tkill(r1, 0x1000000000015) 2018/04/30 15:51:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:43 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x81, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x2, 0x0, [0x0, 0x0]}) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/uts\x00') setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000100)={'mangle\x00', 0x2, [{}, {}]}, 0x48) setns(r1, 0x20000000) setns(r1, 0x0) 2018/04/30 15:51:43 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00009c8000)="636c6561725f72656673007edb") write$cgroup_int(r0, &(0x7f0000000000), 0x1e) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000000)={0x5, 0x711a, 0x0, 0xfff, 0xa, [{0xffff, 0x3, 0x9, 0x0, 0x0, 0x1009}, {0x6ddc88b3, 0x8, 0x6, 0x0, 0x0, 0x2200}, {0x0, 0x5, 0x1, 0x0, 0x0, 0x8c}, {0x5, 0x4, 0x7ff, 0x0, 0x0, 0x800}, {0xd6d, 0xffff, 0x824a, 0x0, 0x0, 0x4}, {0xffffffffffffff06, 0x800, 0x3ff, 0x0, 0x0, 0x2000}, {0x9, 0x0, 0x3, 0x0, 0x0, 0x600}, {0x3, 0x717, 0x6, 0x0, 0x0, 0x1000}, {0x4d5f, 0x3, 0x9, 0x0, 0x0, 0x1003}, {0x0, 0xffff, 0x7, 0x0, 0x0, 0x200}]}) 2018/04/30 15:51:43 executing program 0: r0 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000040)='/dev/pktcdvd/control\x00', 0x600803, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)) getpgid(0x0) r1 = gettid() r2 = syz_open_procfs$namespace(r1, &(0x7f0000000200)="80") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000100)) setns(r2, 0x5a000000) 2018/04/30 15:51:43 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000480)=ANY=[]) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3000000004) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000100)={0x0, 0x8001}) 2018/04/30 15:51:43 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:43 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0xf) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000200)={'icmp\x00'}, &(0x7f0000000280)=0x1e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={r2, 0x58, &(0x7f0000000140)=[@in={0x2, 0x4e23, @multicast1=0xe0000001}, @in={0x2, 0x4e23, @loopback=0x7f000001}, @in6={0xa, 0x4e23, 0x7, @ipv4={[], [0xff, 0xff]}, 0x6}, @in6={0xa, 0x4e23, 0x1f, @mcast2={0xff, 0x2, [], 0x1}, 0x5}]}, &(0x7f0000000240)=0x10) [ 293.714084] device lo entered promiscuous mode [ 293.725770] device lo entered promiscuous mode [ 293.733561] device lo entered promiscuous mode [ 293.857865] device lo left promiscuous mode [ 293.864685] device lo left promiscuous mode [ 293.876118] device lo left promiscuous mode 2018/04/30 15:51:44 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e21, 0x1c0e, @dev={0xfe, 0x80, [], 0x12}, 0x56e}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) 2018/04/30 15:51:44 executing program 2: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000180)=0x7) getpeername$ipx(r1, &(0x7f00000001c0), &(0x7f00000002c0)=0x10) times(&(0x7f0000000400)) accept(r0, &(0x7f0000000200)=@sco, &(0x7f0000000280)=0x80) setreuid(0x0, r3) setresuid(r3, r3, r3) 2018/04/30 15:51:44 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=ANY=[@ANYBLOB="180000000000000001000000010000001300000014000000"], 0x18}, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) r4 = memfd_create(&(0x7f0000000000)='wlan0\x00', 0x2) mkdirat$cgroup(r4, &(0x7f00000000c0)='syz1\x00', 0x1ff) close(r3) 2018/04/30 15:51:44 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:44 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = dup3(r0, r0, 0x0) fgetxattr(r1, &(0x7f0000000040)=@random={'os2.', ']\x00'}, &(0x7f0000000080)=""/231, 0xe7) ioctl$KDSETMODE(r1, 0x4b3a, 0xa6) 2018/04/30 15:51:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:44 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:45 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') syz_open_dev$random(&(0x7f00000000c0)='/dev/random\x00', 0x0, 0x280) setns(r0, 0x4000000) socketpair$inet6(0xa, 0x2, 0x7, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback={0x0, 0x1}, 0x9979, 0x0, 0x1, 0x4, 0x9, 0xf9c3, 0xfffffffffffffcba}, 0x20) 2018/04/30 15:51:45 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x3}, &(0x7f0000000100)=0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fallocate(r2, 0x1, 0x3, 0xfffffffffffffffc) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r5, 0x111, 0x4, 0x1, 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/30 15:51:45 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:45 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000180)=""/244, &(0x7f0000000140)=0xf4) socket(0x1, 0x805, 0x0) 2018/04/30 15:51:45 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) r2 = epoll_create(0x4000000010011) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000336ff4)) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000002000)}) fcntl$getown(r2, 0x9) 2018/04/30 15:51:45 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:45 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 294.606866] binder_alloc: binder_alloc_mmap_handler: 26281 20000000-20002000 already mapped failed -16 [ 294.628966] binder: BINDER_SET_CONTEXT_MGR already set [ 294.644267] binder: 26281:26288 ioctl 40046207 0 returned -16 2018/04/30 15:51:45 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0xc2, 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x2}], 0x0, &(0x7f0000000480)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x41, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000240)=0x1) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000780)={0x0, 0x100}, &(0x7f00000007c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000800)=@assoc_value={r2, 0x4c}, 0x8) open(&(0x7f0000000680)='./file0\x00', 0x400000, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup2(r3, r0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') accept$packet(r4, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x14) sendmsg$nl_route(r4, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40210000}, 0xc, &(0x7f0000000600)={&(0x7f0000000840)=ANY=[@ANYBLOB="bedc7422a700f169eb89f9003a06ea98aaa5351f953acda12e4fe856192843867a18419c82fa8d031bdaf2c97180e4ce8c853e83d1fca14ac42af1d13c5ce239e9a604c72f8047900c0dbc191611174fea40d2664c47a94b151f50b3b9027b1204", @ANYRES32=r6, @ANYBLOB="200008021400010000000000000000000000feffffff0001080055ffba330500"], 0x38}, 0x1, 0x0, 0x0, 0x11}, 0x4008004) accept(r4, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) sendmsg$IPVS_CMD_GET_INFO(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x6c, r5, 0x10, 0x70bd2a, 0x25dfdbff, {0xf}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1000000000000000}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xdbbe}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback=0x7f000001}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x2}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x850}, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/relabel\x00', 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) [ 294.652962] binder_alloc: 26281: binder_alloc_buf, no vma [ 294.652982] binder: 26281:26282 transaction failed 29189/-3, size 0-0 line 3133 [ 294.692915] binder: undelivered TRANSACTION_ERROR: 29189 [ 294.699447] binder: release 26281:26282 transaction 39 out, still active [ 294.707277] binder: undelivered TRANSACTION_COMPLETE [ 294.741569] device lo entered promiscuous mode [ 294.744347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=167 sclass=netlink_route_socket pig=26299 comm=syz-executor2 [ 294.772965] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=167 sclass=netlink_route_socket pig=26301 comm=syz-executor2 [ 294.795944] binder: send failed reply for transaction 39, target dead [ 294.810453] device lo left promiscuous mode [ 294.973604] device lo entered promiscuous mode [ 294.985770] device lo entered promiscuous mode [ 295.091623] device lo left promiscuous mode [ 295.105762] device lo left promiscuous mode 2018/04/30 15:51:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:46 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') setns(r0, 0x5a000000) 2018/04/30 15:51:46 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:46 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x3}, &(0x7f0000000100)=0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fallocate(r2, 0x1, 0x3, 0xfffffffffffffffc) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r5, 0x111, 0x4, 0x1, 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/30 15:51:46 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = dup3(r0, r0, 0x80000) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0xffffffffffffff01) r2 = gettid() ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000240)=0x1) syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/cgroup\x00') timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000400)="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", &(0x7f0000000140)="65beba68d2b97f5c5c2547ee35d28bd3df43ef873a4763905359ac053b8c5c9747c9d49a82bffccb172d2a25ffc9d4b41d0a118bc02cce73e52602ff87fd946b020fe2904fd1a7f66ef501bedac88ef663957009af9072f8a494867588cfeb8a1bee2b479c220a6f2eb6f96f0d309a9d96207e6b31b5bc7a1840907fa03bbf30f47caaf501e7af8242d48636177f81804a42a22f0d4c1849eface4a8402ffb270378fe2613ba40b2352011785b46f66b1c2ebd7f3a4de9762494d6"}}, &(0x7f0000000200)) capset(&(0x7f0000000280)={0x39980732, r2}, &(0x7f00000002c0)={0x6, 0x1, 0x20, 0xfff, 0xff, 0xfffffffffffff5bc}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r2, 0x1000000000015) 2018/04/30 15:51:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:46 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xc080, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x6, [0x5c7, 0x1, 0x4, 0x9, 0xfffffffffffffffb, 0x2]}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYBLOB="6d0d0000019b3eafc7a373569bc50000040009"], 0xe) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x8) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000080)={0xdf, 0x5, 0x5, 0x5000000000000000, 0x7, 0x0, 0x6f8, 0x9, 0x100000001, 0x1, 0x7ff, 0x5}) 2018/04/30 15:51:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:46 executing program 0: r0 = memfd_create(&(0x7f0000000040)='}system\'systemkeyring&@%\x00', 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x7fff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={r1, 0x97, "19a572f8a7d51a414a93a240952bfb2df3bd6e812535febd4b26a2ad71124a578cde3e5897a354632d26fef2136e3e82061657538063beda59cd1bf25267ad59a9f4aebdc7841ec83b809849886c7c0fe9a4ca276271e297e283e2f6b1d1e9e9d9d8454a3ea5c58367528b18a8a178c9ce47458f51a91c4d9c4554256227f30271d4665038ac67225b642e8f13e78f127cfe81de121e06"}, &(0x7f00000001c0)=0x9f) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r2, 0x5a000000) getsockopt$ax25_buf(r0, 0x101, 0x19, &(0x7f0000000200)=""/12, &(0x7f0000000240)=0xc) 2018/04/30 15:51:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:46 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x28000000) 2018/04/30 15:51:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 296.298023] device lo entered promiscuous mode [ 296.303155] device lo entered promiscuous mode [ 296.317574] device lo entered promiscuous mode [ 296.339104] device lo entered promiscuous mode [ 296.377192] device lo left promiscuous mode [ 296.502428] device lo left promiscuous mode [ 296.519027] device lo left promiscuous mode [ 296.524443] device lo left promiscuous mode 2018/04/30 15:51:47 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:47 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(r1, &(0x7f0000000280)=@generic={0x19, "85b628390298d1123888a47ec4846e7d47f7aa064ed80c45b16d2090c47a5cf606ca25ed4a6210a0c2db8081a0b7c0565b6897ea3a00cda4b42f8739270bfff52a361cec4d59ad895a4b69c0ea56e615ee1dc1ecd8c4ad0ae2952bab49006ef00b7a56994631ecd8b3100a8775c6cc709ed67aeea8ff04e071abb898dfd1"}, 0x80) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f00000001c0)=0x80, 0x80000) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000200)={0x303, 0x33}, 0x4) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x1f, 0x10, 0x1ff, 0x9}, &(0x7f0000000240)=0x18) ioctl$KDGETLED(r3, 0x4b31, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000100)={r4, 0x101, 0xf5d, 0x80, 0x6, 0x9}, 0x14) 2018/04/30 15:51:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:47 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:47 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) r3 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x4, &(0x7f00000004c0)=[r2, r3, r4, r5]) ptrace$setregset(0x4205, r1, 0x202, &(0x7f0000000140)={&(0x7f00000000c0)="0a4a69b6a1d3721f6579c71daf97d603de45272b4535cce615f8a18f9a64318b9ae60aab51607130f8901a5614f613943a783f3d1d63e418", 0x38}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x39) setsockopt$inet6_group_source_req(r6, 0x29, 0x2f, &(0x7f0000000180)={0x8, {{0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x18}, 0x3}}, {{0xa, 0x4e23, 0x6, @loopback={0x0, 0x1}, 0x7}}}, 0x108) 2018/04/30 15:51:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x3}, &(0x7f0000000100)=0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fallocate(r2, 0x1, 0x3, 0xfffffffffffffffc) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r5, 0x111, 0x4, 0x1, 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/30 15:51:47 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000040)='/dev/pktcdvd/control\x00', 0x80, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000180)) recvfrom$inet6(r1, &(0x7f0000000080)=""/238, 0xee, 0x40000002, 0x0, 0x0) 2018/04/30 15:51:47 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:47 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) 2018/04/30 15:51:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000080)=@req={0x28, &(0x7f0000000040)={'erspan0\x00', @ifru_map={0xffffffff97f8fe32, 0x1, 0xfffffffffffffff9, 0x5, 0x10001, 0xfff}}}) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r1, 0x5a000000) [ 297.478976] device lo entered promiscuous mode [ 297.485752] device lo entered promiscuous mode [ 297.492000] device lo entered promiscuous mode [ 297.504626] device lo entered promiscuous mode [ 297.523981] device lo entered promiscuous mode 2018/04/30 15:51:48 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') setns(r0, 0x5a000000) [ 297.631229] device lo left promiscuous mode 2018/04/30 15:51:48 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') pwrite64(r0, &(0x7f0000000040)="05d14eb6c26d7065444c2b04a2b5900480b6d94ebbaa13bd09c240dfe8be9529d3f8c3babf558762a646059117810ffb3de24b44cd4d98e6d7079bc51d0eebafa71892fdd4181792844324e18cc13d82d05ea7cdcaeb2f9892d8ecc20e4f3c8cd8ce13fd0e60fceaf07248e6648edc28d3122804bc6d1ce243930f646766bc0b61fa7fa3de1918f7ee6225b2c817c86559614edc6227c39ce564a576ac2460509c3ddcc5006e3a586ad6d77448fea4bbd2b01a70ac1afc2eda1388bbe36114132bb3591bceebc117fd3e297423c1ff7444df9ff854fe40f4872955581bb8009eb79a431f215bd50067", 0xe9, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x2, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setns(r0, 0x5a000000) 2018/04/30 15:51:48 executing program 6: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') syz_open_dev$random(&(0x7f00000000c0)='/dev/random\x00', 0x0, 0x280) setns(r0, 0x4000000) socketpair$inet6(0xa, 0x2, 0x7, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback={0x0, 0x1}, 0x9979, 0x0, 0x1, 0x4, 0x9, 0xf9c3, 0xfffffffffffffcba}, 0x20) 2018/04/30 15:51:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:48 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737990312b3fff49838b58901b141de93c3a259b4923b3b4a17d9e8971ea"], 0x4) socket$inet_udp(0x2, 0x2, 0x0) 2018/04/30 15:51:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:48 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000140)=""/11) r2 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/pktcdvd/control\x00', 0x8003fffe, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x10) 2018/04/30 15:51:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) [ 297.669865] device lo left promiscuous mode [ 297.684246] device lo left promiscuous mode [ 297.693289] device lo left promiscuous mode [ 297.706669] device lo left promiscuous mode [ 298.055462] device lo entered promiscuous mode [ 298.070992] device lo entered promiscuous mode [ 298.081188] device lo entered promiscuous mode [ 298.189267] device lo left promiscuous mode [ 298.194677] device lo left promiscuous mode [ 298.199625] device lo left promiscuous mode 2018/04/30 15:51:49 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:49 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xf5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x9c6}, [{0x7}], "", [[], [], [], [], [], [], []]}, 0x758) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000040)) 2018/04/30 15:51:49 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/221, 0xdd) 2018/04/30 15:51:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:49 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:49 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x20000, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x600000, 0x0) connect$llc(r1, &(0x7f0000000140)={0x1a, 0x30c, 0x81, 0x1, 0x3ff, 0xa4, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}}, 0x10) r2 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r2, 0x1000000000015) 2018/04/30 15:51:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:49 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000280)={0x0, 0x0}) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000200)="6e732f0074730012714952360c438012cf24924d87a9579ea0cbd970e1d715a8d2c59917d40ca47b8c950c09341caeae03cf9a2451b8863d53cb432a48021bffc47910ebe98ce5704ed2fa86f043dc13a4720c4cb08f7f63d0b911a185c2fc744eaa28a298044775daab353687912500e70643") setns(r1, 0x5a000000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) 2018/04/30 15:51:49 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) accept$netrom(r0, 0x0, &(0x7f0000000040)) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:49 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000040)=0x6) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000080)={0x1}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 2018/04/30 15:51:49 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0x5, [0xfffffffffffff5dc, 0x0, 0x2, 0x0, 0x4]}, 0xe) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) [ 298.941098] device lo entered promiscuous mode [ 298.959620] device lo entered promiscuous mode [ 298.969276] device lo entered promiscuous mode [ 298.974822] device lo entered promiscuous mode [ 299.004460] device lo entered promiscuous mode [ 299.113404] device lo left promiscuous mode [ 299.159910] device lo left promiscuous mode [ 299.170553] device lo left promiscuous mode [ 299.184811] device lo left promiscuous mode [ 299.192638] device lo left promiscuous mode 2018/04/30 15:51:50 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000005c0)={0x0, 0xb0, "283bffb65b256a87546b67477842faf27987bb1841bcf79d9d6238eaaef6074fe8f16ae2bd4f50325e8405b26c1f7fc2b2c0f9b6407008709f398047611e398905d5bced54daeebf3968b1eb8388c4573d520be63bd62b07f77bfc6c02f4ba78cc28b4d4fcdf8bae085cfe0166358876fd3382ff4d00c21b71e278af8c82ce5630549f1917fb6d38f809053d44d5e6f245abc6e9dd32928928cba07de3097fb79784940b5913b4ee050c83f25ccc0c94"}, &(0x7f0000000680)=0xb8) sendmsg$inet_sctp(r0, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x9, @loopback={0x0, 0x1}, 0x9}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000080)="4c843067ca124f5c9abd36d1611809d19677729467e10546de44de49b73129810676299cffae0ed1e66e678e3bb45062af018074fbc37456d31a4dca66f746655b17fb6f45dd4ccf62d8242d5159", 0x4e}, {&(0x7f0000001200)="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", 0x1000}, {&(0x7f0000000100)="6c531a11df2fac55d0e0f9cd3660c65f5d0aec0fb8730e4665dab4d2dc838ea57fc2ee358a73dcc5088bb27fccb87803dfb107fbbde838dbdc0e69cf42ed1ef2141e81418b0b20a2b869099c66066adf6d06127df6219b75d01bd0be064a2756353b8e44a47dd1e12353951c663b07de320f0e73c0fac9d7df8bef8c44a3281e23abf90aac6eaf09845be6956b85c96b3931f0e70f64dc99566e8cb06ce94ce3bdf7d97a3ec4ec1aaa1d6433061c6cf90ac4af61bfd66f0a9852f45fdce344a53d709207c681c89f5acff66cc0557156e9c6d463ba83840a31a689236e5d7282c15f46c85dc672efebb4f4c3f1cb43fe5082", 0xf2}, {&(0x7f0000000240)="e799ab2a1a6e11330fcd3bf9fb738ccf6c5ac0dae6835f62393ab032eb8bbd58e2b92a1f6b9216618589c766c080fd00d7747b9b2a241f0fa47da2d46c9e8d1b9a424d156fe4ce0f464e610dd292f9aebcee7075d59488ca084ad32916cdacfc610d09fdeaff5d9ac55bb382beb4dc367e82af181fa477312fa5c21b7d392d578b232bd5d102fe5d55ed8fd51c005d239e", 0x91}, {&(0x7f0000000300)="dd3d0585cb981fb773413eb35f7ad6046d703056f63b9ddcd31229f1b6a0d7f1b476534ee536b34caf5beb2ff4f6af1298bb83b3840bf636758b3d2f84b77020a2b0fa1b6716609756e7eb85fc83bfcb95844c2f27675758caad520869a857072e10a1a421411461be6d653d3172a6cd9a1ab6be24eba36be0c9c65cb7f6a16b930abf4bfc63a6590abe753ccd13bdd0b06eaeb6a8f450634ad9ef5bad45ee32f19970643314bb9f4c65f78ff51bc0ff0aca5aea", 0xb4}, {&(0x7f00000003c0)="bc7d2d588b2ae8c6d7a8374e35556d157c30bedb2988d0c90dd448ec12514424d23c3f7d30df8b2b0e63dadee3cc94fb8bba118cabc394aa8cc914f3d37753b5be4b42de6c6fb7ca68e934608482ca15cef16f8723fc1a0cd73c90eca7d5c7b9b711cb92c2803f6b9a78bcd67accbcfca57d", 0x72}, {&(0x7f0000000440)="25a7e7d83b4cc2cf471254305d0981eaea30d472c79036ec50a01abf12d469849ab1f07e8047002da086600a3e7fba02e1f5316b32c850f16be29bac31c292fb9d3917cd85f15d9d9d51110b8ef71fb647df7bf55ec078b87ee9c441579d76a478271b8d66ab04e5ff1f28dfa74c977a507c034fdb5d2b7f651a76fd66a74d11ad531630c9f964982293d291873d60acacc0ecbb8db0eabfbf1edb4cb6bbceafa21c12827101c3a65f69653a50762b3267f8f52a8ae8bacb4b758a7ed50527ca3b89c144562dcf6cf445521dc3f27b918aab9b092528f33912e3", 0xda}], 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="3000000000000000841700000100000005000600000000000000000700040002000000", @ANYRES32=r1], 0x30, 0x81}, 0x4000000) write$binfmt_elf32(r0, &(0x7f0000002200)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000217fc65c0930f24e2300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001de66d4fec037a1659c9da48ade4b406cbf241d9f63557066d7a"], 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:50 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) syz_open_procfs(r0, &(0x7f00000000c0)='numa_maps\x00') r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r1, 0x5a000000) 2018/04/30 15:51:50 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/mcfilter6\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0xd0, r1, 0x530, 0x70bd2b, 0x25dfdbfb, {0x2}, [@IPVS_CMD_ATTR_SERVICE={0x4, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x401}, @IPVS_CMD_ATTR_DAEMON={0x84, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3ff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x12}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local={0xfe, 0x80, [], 0xaa}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x401}]}, 0xd0}, 0x1, 0x0, 0x0, 0xc0}, 0x1) r2 = perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x1a2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000001c0)=0xffffffffffffff81) fcntl$getownex(r2, 0x10, &(0x7f0000000340)) 2018/04/30 15:51:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:50 executing program 6: r0 = gettid() r1 = signalfd4(0xffffffffffffffff, &(0x7f0000336000), 0x8, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000005b000)) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x400) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f0000000040)={{0x3, 0x1}, 'port1\x00', 0x8, 0x808, 0x3, 0xe4b7, 0x6, 0x1000, 0x0, 0x0, 0x0, 0x8}) rt_sigprocmask(0x0, &(0x7f0000479000)={0xfffffffffffffffe}, 0x0, 0x8) tkill(r0, 0x4) 2018/04/30 15:51:50 executing program 7: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000001c0)=0x6, 0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x20200, 0x0) getdents64(r1, &(0x7f0000001500)=""/169, 0x5299b87e23cda608) signalfd(r1, &(0x7f0000000480)={0x424}, 0x8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000500)=""/4096, 0x1000, 0x2003, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x4000001, 0xaaaaaaaaaaaacd2, &(0x7f0000001640), 0xfffffffffffffffe, &(0x7f0000000540)=ANY=[]) r3 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000240)=""/206, 0xce) signalfd(r3, &(0x7f0000000440)={0xf2d}, 0x8) open(&(0x7f0000000140)='./file0\x00', 0x80001, 0x1) getdents64(r3, &(0x7f0000000340)=""/196, 0xc4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f00000015c0)=0xc) fcntl$setownex(r2, 0xf, &(0x7f0000001600)={0x0, r4}) 2018/04/30 15:51:50 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) sendmsg$nl_crypto(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000800}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xf8}, 0x1, 0x0, 0x0, 0x44080}, 0x4001) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/74) 2018/04/30 15:51:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:50 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x6, 0x20201) 2018/04/30 15:51:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:50 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x48) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000500)={0x0, 0x2}, &(0x7f0000000540)=0x8) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x400201, 0x0) getsockname$netlink(r3, &(0x7f00000005c0), &(0x7f0000000600)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) sendmsg$nl_netfilter(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1100010}, 0xc, &(0x7f0000000300)={&(0x7f0000001880)=ANY=[@ANYBLOB="c81200000006000426bd7000fcdbdf250300000664008e0008"], 0x19}, 0x1}, 0x8000) getsockname$netlink(r3, &(0x7f0000001800), &(0x7f0000001840)=0xc) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000640)=@assoc_value, 0x8) tgkill(0x0, 0x0, 0x0) eventfd2(0x2, 0x1) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) setgroups(0x1, &(0x7f0000000140)=[r4]) 2018/04/30 15:51:50 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x820000) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/30 15:51:50 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x3f, 0x8, 0x18fb}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000200)={r2, 0x0, 0x3ff, 0x8}, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x404000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x300, 0x70bd27, 0x25dfdbfc, {0xa}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x496}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x40000) [ 299.811934] device lo entered promiscuous mode 2018/04/30 15:51:50 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) r2 = open(&(0x7f0000000100)='./bus/file0\x00', 0x0, 0x80) write$tun(r2, &(0x7f0000000180)={@pi={0x0, 0x8119}, @hdr={0x2, 0x5, 0xf07, 0x7f, 0xfff, 0x20}, @arp=@generic={0x30f, 0x8eff, 0x6, 0x0, 0x1, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, "", @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, "bb0c869c4173319d6cea764029da78e0"}}, 0x32) r3 = syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) write$fuse(r3, &(0x7f0000000040)={0x30, 0x5, 0x5, @fuse_notify_retrieve_out}, 0x30) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x280000) 2018/04/30 15:51:50 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYRES16, @ANYRES64], 0xfffffffffffffe17) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), 0x4) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)={'\b\x00', "6b624d5a4a39b391e82cf2d930e4815f9695a6574e4f63de11fcf2a565d3915201e0498a4124611c2e3bfcbc27e77a60f2ea0ba21a3b73582bd4851e7284e71026babc83f8f1d08130308c6a3c1a98a9dbe0ead2a3b9e04b1ebb04330d3b540df3efb16cffe0"}, 0x6a) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) [ 299.880578] device lo left promiscuous mode [ 300.495283] device lo entered promiscuous mode [ 300.502820] device lo entered promiscuous mode [ 300.508114] device lo entered promiscuous mode [ 300.513377] device lo entered promiscuous mode [ 300.611107] device lo left promiscuous mode [ 300.640509] device lo left promiscuous mode [ 300.661381] device lo left promiscuous mode 2018/04/30 15:51:51 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0xfffffffffffffffb, 0x9, 0x5, 0x1c, 0xffff, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x5, 0x1}, 0xb) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00f2ba55497739ae0c3d3a97976108ee73cb5b26c4760bc1dcc5e180ca6e589cdc1a4d196d9b9ad3"], 0x805e67744726fa2b) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000080)={0x1000, 0x20, 0x3fffffffc00000, 0xfffd, 0x7, 0x3}) 2018/04/30 15:51:51 executing program 0: r0 = gettid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/uts\x00') setns(r1, 0x5a000000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/net\x00') syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000140)="87ddb27ac046ebd089d7bb5f9ac19c8745d29ef58772b1ae1932e806ca8202d5571b0567debde91d63be41e8", 0x2c, 0xfffffffffffff800}, {&(0x7f0000000180)="92d8406643ad32bfd69c014c5233b3c8f990e99a01233086a367036acd11935cba55b1", 0x23, 0xfffffffffffffffc}], 0x80008, &(0x7f0000000200)=ANY=[@ANYBLOB]) 2018/04/30 15:51:51 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x48) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000500)={0x0, 0x2}, &(0x7f0000000540)=0x8) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x400201, 0x0) getsockname$netlink(r3, &(0x7f00000005c0), &(0x7f0000000600)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) sendmsg$nl_netfilter(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1100010}, 0xc, &(0x7f0000000300)={&(0x7f0000001880)=ANY=[@ANYBLOB="c81200000006000426bd7000fcdbdf250300000664008e0008"], 0x19}, 0x1}, 0x8000) getsockname$netlink(r3, &(0x7f0000001800), &(0x7f0000001840)=0xc) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000640)=@assoc_value, 0x8) tgkill(0x0, 0x0, 0x0) eventfd2(0x2, 0x1) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) setgroups(0x1, &(0x7f0000000140)=[r4]) 2018/04/30 15:51:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x48) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000500)={0x0, 0x2}, &(0x7f0000000540)=0x8) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x400201, 0x0) getsockname$netlink(r3, &(0x7f00000005c0), &(0x7f0000000600)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) sendmsg$nl_netfilter(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1100010}, 0xc, &(0x7f0000000300)={&(0x7f0000001880)=ANY=[@ANYBLOB="c81200000006000426bd7000fcdbdf250300000664008e0008"], 0x19}, 0x1}, 0x8000) getsockname$netlink(r3, &(0x7f0000001800), &(0x7f0000001840)=0xc) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000640)=@assoc_value, 0x8) tgkill(0x0, 0x0, 0x0) eventfd2(0x2, 0x1) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) setgroups(0x1, &(0x7f0000000140)=[r4]) 2018/04/30 15:51:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:51 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000000200)={0x0, 0x15, 0x0, @tid=r1}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) 2018/04/30 15:51:51 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="000080990100290e060000000d05ffff009c0a63ffffffff0000000000000401ffffffffffffffffffff000018b2f71d03643256bb6afb12e50ec747163399ece02e5cdf415901bb23127f59faff01000000000000b143e67c2f4f6057045d605c2641aceb3cddea8ac7b358290000323b1fef2fc5540decce70d10185d1fe365e75ce9faeed8c354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d50ffa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca45cd1c95f8f7c88f708f8ad8721a500409056aef3460d7fe9add9b59a9c4a3fc86cc3358c98594ab843daf04114b6428bbf9db62fb33a5c672ab5e543a68887e76bd7a1452b6b0389f7c8d8b9e416907af31e133c41147910c5cf80c053ae52a39456226c7cf7a9"], 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) r2 = open(&(0x7f0000000100)='./bus/file0\x00', 0x0, 0x80) write$tun(r2, &(0x7f0000000180)={@pi={0x0, 0x8119}, @hdr={0x2, 0x5, 0xf07, 0x7f, 0xfff, 0x20}, @arp=@generic={0x30f, 0x8eff, 0x6, 0x0, 0x1, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, "", @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, "bb0c869c4173319d6cea764029da78e0"}}, 0x32) r3 = syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) write$fuse(r3, &(0x7f0000000040)={0x30, 0x5, 0x5, @fuse_notify_retrieve_out}, 0x30) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x280000) [ 301.385960] device lo entered promiscuous mode 2018/04/30 15:51:51 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x8080, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x100) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000140)=0xfffffffffffffd81) write$binfmt_elf32(r1, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0000b9affc8d02c3362874364ad6d900000000"], 0x4) [ 301.443597] device lo left promiscuous mode 2018/04/30 15:51:51 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 2018/04/30 15:51:52 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)={0x0}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000b80)) r4 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000c00), &(0x7f0000000c40)=0x10, 0x80000) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000f80)={0xd8, 0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="01634040010000000000000004000000000000000000000011000000000000000000000050000000000000004000000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="852a62730a000000", @ANYRES64=r1, @ANYBLOB="0300000000000000852a646600000000", @ANYRES32=r2, @ANYBLOB="0000000004000000000000008561646600000000030000000000000000000000000000002500000000000000"], @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="300000000000000078000000000000003800000000000000300000000000000022e363f80be4e1b1480000000000000038000000000000007800000000000000"], @ANYBLOB="00634040020000000000000002000000000000000000000011000000000000000000000058000000000000004000000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000100000000000000852a747001000000e5d2d4cbd0f357425e1dc0e6606070bf2edff41b9a7075e92f5ef317ca0a00eb2526624d871204218ec6568ad4c303fdc7c47ea351a64c96362b5f18f1f3d01ad6f835629727b450b82d7f02c1c51efa0eae70f3489be03b9df7f49c", @ANYPTR=&(0x7f0000000bc0)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="010000000000000009000000000000001200000000000000852a646600000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000d00)=ANY=[@ANYBLOB="18000000000000003800000000000000180000000000000078000000000000000000000000000000300000000000000000000000000000001800000000000000"], @ANYBLOB="126348400200000000000000000000000000000000000000e815d611000000000000000000000000000000003800000000000000", @ANYPTR=&(0x7f0000000d40)=ANY=[], @ANYPTR=&(0x7f0000000d80)=ANY=[@ANYBLOB="6800000000000000380000000000000048000000000000007000000000000000780000000000000018000000000000000000000000000000"], @ANYBLOB="ca3a0000000000000b630000"], 0xbb, 0x0, &(0x7f0000000ec0)="eacc05001013cba077e9ead801f3177c5bdb7ed51e776de2468f70c3c05484e9f0d6a37ce3d5d78c96c5618905b497a3d9dfc0b4d4f702f9096ff93014fbaf73de0821dd358229f55367473c6860dc61a4780734a2f420e8abee5c5e7c7b2438d585ebefc58507a2ab2baa23ea52b2515b19646b02d2a73e80ee7633398e412ae103fcc5814c45acd9029f7af57b4624b60e16304e0652148486c00567cc30132d0a97f8eac5054472fae54e56e5ba41a49be8ddfd9f5c40d0235b"}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r5, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r5, &(0x7f0000000040)={"b4194a41"}, 0x4) setsockopt$packet_buf(r5, 0x107, 0x5, &(0x7f0000000280)="2d80271f4e1a6626ccf18e82d2f5f7cacfc2cd4eb4c218969848643948e015da9f4836d96f62aa5ff8637de64e65e20198ba84f485f11c76533c2a728bdd9b9b459f3876ebafa9c380a5cdcf3f1a6925c56b425a7b4185ccc1775365a572d4b2eab74b0b231b79e77c09aa229175a0f4bd91132e37e997d3d5472f2d", 0x7c) 2018/04/30 15:51:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:52 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) r1 = open(&(0x7f0000000040)='./file0\x00', 0x4000, 0x27) dup2(r0, r1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r2, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r2, &(0x7f0000000140)={'syz1', "7d158f770ba8668a88c20ccb32eb96326dc17c517a421bfaa1594c9d65722f4f3c589a00000000000000078275a71b795f3f7eee0009e8da94e13577a5"}, 0x41) 2018/04/30 15:51:52 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x10000, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x140, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x100, 0x2, 0x6, 0x11, 0xffffffffffffa7d5, 0x5, 0x7, 0x3, 0x6a, 0x3, 0xffffffffffffff01}, 0xb) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x101204, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x800, 0x0) bind$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x6, 0x76d, 0x1f, "6de2771a9ad23cffdb9640c50f5ab496c035a251dd20d5d54f3e7ca15f3f196e91e07fa3b259d43037ce94d686d15f83782b5de155d2411398e5f6ead40355", 0xd}, 0x60) write$binfmt_elf32(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="480723e6f82f1b689a7450bee9e4221c9649b1837e5184efe78098d0b685508713b4ea6cddb68ed10faa"], 0xffffffffffffff7a) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000000)=0x3) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000040)={0x0}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000280)={r4}, &(0x7f0000000300)=0x8) 2018/04/30 15:51:52 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x100ffe, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, 0x0}, &(0x7f0000001140)=0x14) sendto$packet(r0, &(0x7f0000000080)="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", 0x1000, 0x40800, &(0x7f0000001180)={0x11, 0x4, r1, 0x1, 0x742, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000001080)) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000011c0)={0x4, &(0x7f00000010c0)=[{}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000001200)={r2, 0x1}) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r3, 0x5a000000) 2018/04/30 15:51:52 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000a00)=""/4096, &(0x7f00000000c0)=0x1000) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005b6133249cf69ecaf18b233f37595ab52e7fcca5c4c96437adda6d136276f105698fb0ce47504186d9a57408bb7ddbb97bdae1cfa92ffb247225159164c3859536091e654c"], 0x758) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000009652eaf6c193c4fdb11000"], 0x4) 2018/04/30 15:51:52 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000040)) 2018/04/30 15:51:52 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2102, 0x0) connect$pppoe(r0, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'sit0\x00'}}, 0x1e) sendto$inet(r0, &(0x7f0000000140)="524dfbf8f6e216f6c209be63fd6f95d2316504de0ca9f11fb51e402d4229c240d6c7936a35273ac8e5cd85aafcdfd6384da9288d922d09184c45db83045c4e4519838c44b8095e2203c0aca2d9e20633173d566e451b3ee471c86eccba2cf3c1cf1fc33d041a6e80c38094b7138bcbc0c69fab461fc3148bce83b25b0c8d72fa2d5092734d77c507e0528c0cbbfedbc20d7cb5c20bd828258bd267e3c66023c5596c8fed3ae13d3577ab5fa8c9c3cb5c05e882ce29f812fe0951538330580c96829683754fc18f397d886fadda403cd0047dbf8e3da1ef8ac0ab9b5c5df4e73ad44c8590268d18198d777ef73fb8095ae57d597b2fa4ebfe9b2308864b9060fc3ad00a484f17f0ab9bd796fbb34c495fe398d9b7169cbf53509f151da6f3019af67b007ad77cbe89bc2acb587d1b41969c31b754f2ae2bd598d11b28212861c4a75c4590b8777fa0cfc88a1245c7f94df3cd98e5dddd895410fc51cf382a1465dea7eeafd1f8126d8917463b9c02ef9949486011b4dc2b679355ee619bf0e16787e7677ade96f6fe7e55851b3f61d78e199fdff02ff504060f54e8dfc06476e7791d53841cddfce35d9057d5adbb862b365366857e943a61401ec83e664d452e651aa76aa1a05915a0ce4cfead4c847d923814e607d963fd4ea6e5160b3b29c04118405a1c37d90627c914e764b9d6e1e7019879a797024170b182c8588e004eaf4022effc02ca9c88dcdc2734f6cce37b72026b8ba0474cac005f2b3e20e05f2454ad50d30177811a8655a0c2da5433158b7d338015c10ff9f0bc7c7287d3429b9d37d5e4ef2e7c158377d891585dcc9fbdd4f7749196ff3ef27558d7a5544c9befc68ec8f4d34b5ece604f3ecdfd46cbe386fb58c217c78cca4589645f43c661ddb29638eea4103519ffeb4172282f10af75f9a8e7af43435ad88a778da7f111a5e398f98e1807c7bbf6c2c1c6988e24d08b989f5ac16dabcb5c1202a07c564afa906b9fed14fee1d5d5dcc9310e0bce1060c72db62b2798522a588c2047b1ce25ac625dcde0444fdab3a115e7fe373df7db4c33445c64d88eacda48887e304e76efd35be5cd79edd05a4c8c24ea0537320e4ce80e01d3eddb5f0d80418c4f79fee8522d1adac5d41cad396c7bf1e5dce3e2eaf2c28c382cb6e2b294aa15297f9b1ba4c0992f4f8677e7fc347be2b9bff4196779cfedcaa01d0ac369f254979daa05230e643d31d7d4ed29a4200438e475a6dd2a874723eb74ec06424067f3c1cc5e5e77164bd4f15722c2a4a6f5dff71931a44464c43de250412014a236cf8b56402e7028887f0bce6d1e5170db9abfaa8ac17582e32804198b2eecd62c7636127f5d90b2c84b85f206f914f13ac69eab0c4547cb54a853d03771ccab9995f3358a3e5e24b4aa7c1e6d69ba63af6050ae16db5762d4f09838b974058cce7755917cf7293027b9f430645a95cfb3b584b4fb6e6795460e97b60ec099d1534f1fdf9db0ed4123a1a23ada0d5905be1e878ee5f02b9018286bba32b875953c33fd1d3efe21cbc8b301409d466b6b8cfc2b1814c33cc2dba0010940408b34ca92f9e2e3156a446c75a67c453eb936d5d00a9f1690c456b0ea3136002c498580288c91c57adfa20862a94014afe096737d7e3fffdf73392645c4aed4944a78e8907d2fee159373e1dac05a29d279716fd68d5f4db4c00727c771812645c3a5bd7689853853b548ce41f76468c9fcea1cf85abc0dd81fa8795416ca7b6b5858b79ca350414433ecdc89c153bc78e4f4daa945692f33260d67f80555a8e5f76155c10534470f69706a9cac8efb7b3a9d1af347e1291c51eb9ed285514266fa1225feaf14209b5b7c9328e36d92d8f2a8dd21607fa6ca661868bcf3cd92662ea1b68d4434f043be0cd468031f5b48a073cd7a2ad86a72427e30a142ae1ae6ceea9bda721aeb6fa8093cc8705b55cc65763a02c5082fcb246b185a510589c67f45854fcff3f143ab9f1b8506df706ca83b6b5d0c6e7cb83d6bda34198cf2a959f6c0f3189ae3bf78a388adbcabab09102c31a785969668e5813d81f7ca1d92c4ce090c8092835b19fd39fe9b5fabcb66c8dda1eb306363dafd6cb9b6e46bab0a64dddec4b81a85ee6b7c6bac388c20124e37afb5d5f586a9f829beda0373d11a1ac466ff8597a05bae8d73c67273f955d2fc146b90f6bc924c996eb537bde85267145005c73ebace193723c58c4a575835d9c3a9bc5a6767b024e7f91bdf5f848b3dd157ebbe05ee1bc3e4da61364ccadd01073c5a0f48a592fc6da1bd9361d46feb220ba6d094a26a3824d2a708b0b582a01f8f6e895205ef17d37e7f1cef9eb8c659e262b81c0c480dbb942c12e3cb3e640ddeb4e41dd4c3c8873f3998e502e46e697b4b6d9e83061fdc75b6d35e15e6f2eb0b2d5e1f82534389b6fdec373ddbbf2b8a68ac01ac52f7e3fd3d09d6c89a9e14ac962348b1cae86b359c8cf451e7f16933b1ab4206e25f15facb934c417ee15c1dc4988ebe14b0401a80cdd698fadfb4dea4ea88f98ad2ea1904d6ed4289f051c54c3957a88376fef5ecb7379f1249859aa4e3ac05618e91d31e01bad26f5f6f0c139f5d62476e4ded41f8a3af10d27d14eb008e53433ae63ab593c3545e34823a861ee4125613c83983462eae1f9e063b836a78b90f2ea9fc9c39cdffee62330335c3227f403dbe76140d03c3da815034b00ae5ce9817fb4111580e977cda26d9892d1f35740401882692418481cba841cff7a22aa92ccba69b813859cf5f9942e5bdb01db3a8618a909ca249b0c16505f69d0728be1cb4e50cca51ad78de8433b934d16dc5ac49e88603881b4ee96d079edacfe7cc4fef4aa508342fbc44fed8b069e8ade01778a2ec74ed420271faf70083103147c16decc689dd03caa2644b750cd00a360bcab536969bbb4b9671e449a85255e181115ea0b81dff7cb435b6fd07bda9721a44753ec90b1eb04d242727988ec9dfb31a867a610af2e7bf87520a71aa867d0215eaad86aede18c43408d2267a939fcad93bad7c9c00aa340a97323ffdc5527ee4e0b9848b35143e68fa41ef913cb764024ac16c66399c9e2a0c8e177196f37f10162070dc99d54d3111978e1b3af859df62be735d1e8588070350179c342616cd8939fc55a744f26a401279601a55d87a0893405224e9d051d38f49a2f640929b3301fb680974d2c0e6ebd540197a804075fb6acec67f5bc822ebbbae93b0548f28e28a0b189e25bf49464fedefccbc8c2f754b89d434ed7c28551f066475d0786ad8fdc7b9c2f52ccdf876b92201190907be0c5f365a5f420708925a1d3d4cb7adea950904f1e6e8e7613f0d9f0988140f098b0b8a000c6ae8bfb557a37920ce9b5351fa05d19c9e2b3c926a3558671b19c09ac937ce6a8a814129cefd099ebfc6f2e41caf4a30ceae7ade455e53e35102e27357fa95834b7b999f52d9aa04524343641b770b19b3150d1c6bb4d1d9bac6a9e4c53ace5888b7307ca0724ec19262a9ec227dbd8cc48a6ec9d1ac63cf1269c207fc430a78f59f0334f9a157134e8f1697042ca5390401de74183b0e3bd3ac8b0f93e5e39aab49140b0ab51e7b0967083cee5092289d97198de558bf7bfa2baa1be4db773767a507f66ca0972e471ccc17943a959af373c55d48c48029b6843429ab3f974729e501c9e47ecf4b02900b4728ad20c767e0e2d77a276c2c965cb61ec5c549efbf99504aedeeb7812a0184f6cd0dfbfb046b6cd0e69e64e70c94243055c4a735e713380d9da041231d51b05c5614ce3f4fd429947fb07f1bfd607e10e399647fe7ccb63787b779975990ccee920748b9ab72142869318cc58acda54e570337926bbd87b7a3e9b6e6c3674d57c2deff03605adeaa0f403d27fc3fdf45edccb1c823f7ca6b8e232a47b0ccee4d3c10827272378e9470b0055a5e0ffb7dd0a0cbd04693194f0a0bbb1e51f41d67a9683315ab43d73046030efedec8db655b74d99a2cedaeb6c20c6e8c053427ffc328cde277791e6711c1791237da5d1e3b7e0ae66e82bd685389571b5db7809d331f11572e14ba42e35eff10c0fefad90ea709e8ea529c906a2a7bfc5579e7c23763ea093805e83e39baaa43b19f4d0ecb02fa78235a8b72345c6fdd51e592ece917bad402e08af1309fba4a2adb5e0f92b0741147576684b1bcfc37c9e7f58715d47f4c67490cc4d7903f8ea6621bd7789214b2a26a286bcbe2515b60de1e9f53289fd5bea850f1edfc51d2008402168f91488984a284ada819dffceeef24fcf438fc80769ed510cae1077c4992404548d293cded0cd7e06d1bb5579da27417f5dbba7ee653af8403dce575e5fbd9e2a277c0bbccdcc078a294c4a16087b5fde219019e259ab7806325dc81f6c73b2443cda1c3817aae170869d5c7a14d71614be1b80fe74cf7d5a461c42ac7e8c6148217b9bda04220c5f701da0977c93ae92aa1d0a67f04e081e92aa67527ff95cb9eaf9a51ae3ffc54dfd1e8f1607eb6e148609ceeebe9b7d437b4852562860f3d2c815fe3b904a96e70ffeabdda352386bdb278dbf1292fe0ab1ee993938006bb4c5ec43fe6b793fab28f1269902b59e9e5738d181e0e3b0f092fca5ef0850e7364fa5e87e9f6b6ed922e1f6e23b0e0582b5ed0975eae36035d2834dc5d6cff079559b8e44d2cd65dc74479610c1680d24c908b3e4002344012fae0402443f0cb1b2c6e263b6d0b536ebac2a9dd32539bc0a17a2116ab86d0b9dfbcc1e040cda3ca94e12595f00645a48d6c8c4de5157834c63f13fb100e1fc80dc334d79dcb410216b2fea2009b02e15f80161fe550707db52c6501787266c806ffb9d1532f965e043bfc942ebaa28e57b7abaa4fff58f46b9112cbcda60d1658e320ccbd9cf26053460a70a9510a5d8ecfe2dce323435d3dd88df874468dcd700fabbbd50f312ec79a622e8dba9a0a261b3e0d7a423e1f3768fc45cef5cdb45dd2c409dd3924ebe0ecb172a981706b780d1b438271f88b1ece616773e8e68c4c784a4981c07309a06f18efc432e8c05a5ffdc453f414dc15a61f2d59f1aeee07d220c428edf96560432da9686e00236355411e43e243f3ba022ccf8b5ff84fbf8cc22de049e32c092bffc39b592fe998dcaab0043cc2dbc71457c36b00d027ab0ab61f8e2a5e4ac8942d20d2f17b3a7d6561d64bb5c01dbc94995152859fdec6d56512f8c8f3e73e71f941c1f015fa8da76040865111af60a261974cae1dc76ad9ad72e6734225952f138c7ae5af77ec1f856d3e1fe8d418622e57687ef56c22b997cba3f7a65a16fb79cf183a3e8ea7798774f6bf3ad2fe6e19660e0fa3c4b09c423ea246e0edb989163c4223d59f9d4f3342bfbf828588ced89a2a7db824f09e6fa253c09d79ea02886511e258e67709537f6c087e25817b61421ea5dd07aaeef37dcb0e4073a1548cd7c053a33d0170624b1d11d36cf379623ce5777830edc146c62db7463e5241eb228579f1266e2db0730e397441fda189adfa9eb6581d753a16b00cd11b94ab618499c8c814a00d17cca06077efd606d430551304761bbe8aa4c616d0ec8be2d0065ca5f35aa06fb39865948895625f88a5c891a9f4b74f88a10d291ba5908538519d9152ab34f72793885fa80865a82a249b99adbd3b20f622397f21fe8616052ff26a6055ec38d87d1c13745c877cfdf1417f02448d604adaa48c1d3e0efb034721b19dfb7b5c46923dfb3a4c7ecc55e4e34f3a2d82bd1bf1dfb21fd5cc933f81eb35da46f4d37a52c6961ddb5278fbfc", 0x1000, 0x4008014, &(0x7f0000001140)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000080)={0x3, [0x80, 0x3, 0x68a]}, &(0x7f00000000c0)=0xa) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000001180)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000011c0)=0x24) setns(r1, 0x5a000000) [ 302.536619] device lo left promiscuous mode [ 303.330004] device lo entered promiscuous mode [ 303.335371] device lo entered promiscuous mode [ 303.340377] device lo entered promiscuous mode [ 303.345033] device lo entered promiscuous mode [ 303.353429] device lo left promiscuous mode [ 303.358002] device lo left promiscuous mode [ 303.362359] device lo left promiscuous mode [ 303.367347] IPVS: Creating netns size=2536 id=45 [ 303.529535] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 303.542392] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 303.595928] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 303.609511] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 303.660747] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 303.673687] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 303.686886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.701293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.282424] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 304.313963] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 304.320085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 304.327356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/30 15:51:55 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x40000) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00975fb5a549800000a85c4eab89074a9722aa00f56688e03f4e00e48ac48032617f47b2cf0c2ea3c4358286e12e9442755239af98d902717f39e8abd037ad0b254c458bbd6acb27e21b9e6785761b10e7204afd78151407f2176afd9bf442363a3325818a1350b2af5e526ec172b7e36132738877f6834158112cb2da28602065969800000000"], 0x4) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000ac0)={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x307, @random="17c542fd2cc4"}, 0x8, {0x2, 0x4e23, @loopback=0x7f000001}, 'rose0\x00'}) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000a80)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="580000ed", @ANYRES16=r1, @ANYBLOB="00052dbd7000fcdbdf2504000000080004000100008008000500ba000000080005000600000008000400a50e000008000500ff03000014000300080003000300000008000300030000000800040002000000"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x4) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x100) 2018/04/30 15:51:55 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) fcntl$setsig(r0, 0xa, 0x38) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0', "77f0ffd970734130025bb4d24a0b066f31914d7472171a0211cced8350c36935590a512a9219a2a202999558278d87a8fbb565d19ceeb7212d3a86ceb59f67d2623128eaeb94d762eb18889c0a9b44010aa555b602b6e6c67fc388181a75544cefa75faced88062a6bdccf80e3f528f646caf0fe4317ae2546"}, 0x7d) tkill(r1, 0x1000000000015) read(r0, &(0x7f00000000c0)=""/18, 0x12) 2018/04/30 15:51:55 executing program 0: getpgid(0xffffffffffffffff) r0 = gettid() r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x4e23, @broadcast=0xffffffff}, {0x2, 0x4e24}, {0x2, 0x1000000000004e22, @rand_addr=0x7ff}, 0x43, 0x3, 0x4, 0x19, 0xffc00000, &(0x7f0000000040)='veth0_to_team\x00', 0x100, 0x200000005, 0x800000000000000}) r2 = syz_open_procfs$namespace(r0, &(0x7f00000000c0)='ns/net\x00') setns(r2, 0x400000020000000) 2018/04/30 15:51:55 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x820000) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/30 15:51:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x213d) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5437, &(0x7f0000000000)) setitimer(0x1, &(0x7f0000000080)={{0x0, 0x2710}}, &(0x7f0000000100)) 2018/04/30 15:51:55 executing program 2: unshare(0x8000400) r0 = timerfd_create(0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x84080, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) timerfd_gettime(r0, &(0x7f00000000c0)) 2018/04/30 15:51:55 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:55 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) r1 = socket$l2tp(0x18, 0x1, 0x1) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020000b10000f57424a98bbe80000002da55043083a00d38f02010020000b10000f57424a98bbe80000002da55043083a00d38f020100202c766d6e6574312728766d6e6574312076626f786e6574315e207d20000b10000f57424a98bbe80000002da55043083a00d38f0201000aeb998e1c6de26c1a83590bccb7b61534d5807771c31e101a8cefe9ac41be59a8e428c16326c4fda8ece996deeab165cea55d12562686518a4b30df738faffa475bcd0319c030e148eaadfefcbc578bae888678a7b6f368774f0247432a64d932c60d4e3e29dd115f378e35d809ba31bec978b0d4bd8993392ebab88d573c4806087f30b7216b699c9df8bde6f8649aefed75b357d6bd2cb8cfb0636b35e8ec1fdd9418c0b22a4b63bc6ea609ff71ef"], 0x127) r2 = syz_open_procfs$namespace(r0, &(0x7f00000000c0)="000b10000f57424a98bbe80000002da55043083a00d38f0201000000000000000000") ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='yam0\x00') setns(r2, 0x85a000000) 2018/04/30 15:51:55 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) fallocate(r0, 0x2, 0x10000, 0x100) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fcntl$setsig(r1, 0xa, 0x1e) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) madvise(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x9) 2018/04/30 15:51:55 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x0) 2018/04/30 15:51:55 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x80, 0x8) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="666400000000000001000000372233b7808b8e6d6c023948017a741f405f63e48860da7e9d9be198fe834269f29e46357d214f58e611955e83b65b293e84600870c2d7b69c21d8ff97fe01000000b0bc42370c2c54d0f5c0") r1 = getpid() getpgid(r1) getdents(r0, &(0x7f0000000240)=""/179, 0x1bf) getdents(r0, &(0x7f0000000000)=""/48, 0x8239b210c30ab3f) 2018/04/30 15:51:55 executing program 6: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000ec6000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000358fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000a5dfe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) readv(r0, &(0x7f0000080000)=[{&(0x7f0000001fb2)=""/1, 0x1}], 0x1) getrlimit(0x8, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)}) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000d40)=""/88) 2018/04/30 15:51:55 executing program 2: r0 = socket$nl_generic(0xa, 0x3, 0x10) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000000280), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000290000003f4faf00000000000000000023a084a97b6cc7698b3a"], 0x18}, 0x0) truncate(&(0x7f0000000380)='./file0\x00', 0x4) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom$inet(r2, &(0x7f0000000240)=""/220, 0xdc, 0x42, &(0x7f0000000340)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x0, 0x70bd2d, 0x25dfdbfc, {0x7}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 2018/04/30 15:51:55 executing program 1: mkdir(&(0x7f0000000280)='./file1\x00', 0x0) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000240)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='ncpfs\x00', 0x20000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000000440)) 2018/04/30 15:51:55 executing program 0: r0 = getpid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/user\x00') setns(r1, 0x40000000) 2018/04/30 15:51:55 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}]}, 0xfffffd06) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 304.964760] PM: Image mismatch: architecture specific data [ 304.981779] PM: Image mismatch: architecture specific data [ 304.986539] device lo entered promiscuous mode [ 305.009511] PM: Image mismatch: architecture specific data [ 305.063782] device lo left promiscuous mode 2018/04/30 15:51:57 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r0, 0x2, 0x2, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) preadv(r2, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r3, &(0x7f00000001c0)='./file0/file0\x00', r5, &(0x7f0000000200)='./file0/file0\x00', 0x1) r7 = socket(0x800000000000011, 0x800000002, 0x0) bind(r7, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r5, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r7, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={r8, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:57 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') socketpair(0x5, 0x80000, 0xfffffffffffff000, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TIOCSBRK(r1, 0x5427) setns(r0, 0x5a000000) 2018/04/30 15:51:57 executing program 1: mkdir(&(0x7f0000000280)='./file1\x00', 0x0) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000240)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='ncpfs\x00', 0x20000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000000440)) 2018/04/30 15:51:57 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:57 executing program 6: socket$inet_tcp(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r0, 0x2, 0x2, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) preadv(r2, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r3, &(0x7f00000001c0)='./file0/file0\x00', r5, &(0x7f0000000200)='./file0/file0\x00', 0x1) r7 = socket(0x800000000000011, 0x800000002, 0x0) bind(r7, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r5, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r7, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={r8, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0x0, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:57 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {0x0, 0x2710}}) timer_settime(0x0, 0x4, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f00000000c0)) tkill(r1, 0x1000000000015) 2018/04/30 15:51:57 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000a80)=ANY=[@ANYBLOB="7f454c46000000000001000000000000000000000000000000000000380000000000000000ef8108ef7b6500000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000066f04fe60bf1ef8c65e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008ce6bd0c5918e9c2ca7d8f32e2498b3f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000186f04dc0f1e235153000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xffffffffffffff61) sendfile(r1, r0, 0x0, 0x1000) write$binfmt_misc(r1, &(0x7f0000000080)={'syz1', "096f17c6b1c9c1d983cc74cd0d357948816331d0d261034c9a028a7af6d763a0a154d0f5ec1bdb0b55755e049cc7731e13525b50a04c9af39bb774ff4e739ce2f6c6c2003be054a2d654717fa9c77998c6802c171681ae338206e74ea71d83df462f9b813be2fe687c5ed70ecc2fb09a45f6f0fea641c6e76ba79becdb8e49f639"}, 0x85) 2018/04/30 15:51:57 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x100) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x12b8, 0x8, &(0x7f0000002480)=[{&(0x7f0000000100)="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", 0x1000, 0x6ea}, {&(0x7f0000001100)="ab89aad3c7a7d3876921d97635eed1dd7018ef53d5f4dbabd8351a3afe659bfa34c3333d2aa0a70b897df171ed6ad5f9a06638ad6c07b44b016223fdbe885ac22f8460a3b2b49326758ad0bf451e692f24a6ab1e466c9ad48b008ba819de", 0x5e, 0x2767}, {&(0x7f0000001180)="b7e4064724ac58da837cb99e9dc2521e822fa94adbc16e17f242f02f7beb959e2eee8f6ecb68cbb3066cab39262634f0adec7b4d8de41ac1edcaacedec23a8883d32a8d7c95342a9795f162ef294fb676311e565270a32834755198809eb421830d24b094357054e6df0aa4e11", 0x6d, 0x7}, {&(0x7f0000001200)="ab66fad1b63287ec2ea20fa36b56af882a82e7f366dbcc2c08ad464ff5c2828b2524b15bc7614409166edba6bce41c7a1fe6c5216ba7ab81b4361fd522dcc3da25abdf3857a58857d5192bd309869079af5f6c83bddd529f26d6eb920ed2e2c8e9a5c5b9eac0790b19ee1d3863525616f0504a6ad1b11e08e57167d4d096ef00cdd9e80a0695e10a1305a6bd1e3d1cb94d630bd5", 0x94, 0x18fc}, {&(0x7f00000012c0)="e3487bdb0886d63feb3297fd6082b77d4633f04f0ddce042067a8cd9abd9200c5aee2ff5a422881e6bb2e1d701ac9595d3afbb7da0f9461dcd5f3dad20555dc2f438a388e26a6d44a04e832a12fe6703e13b61def1442cd628dbe66856c22cd44d0bc1642a4b153cf398ef5a663bba6f0e97390bce16d7", 0x77}, {&(0x7f0000001340)="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", 0x1000, 0x20}, {&(0x7f0000002340)="949e99a533b8464d1a8fc6ea89553ee4063388041161b76e55bc5056447d492a2133085fb63ac05620cfaa76c95ce4cb0619182936c759e9e693cfc48813d97f94acb5d0e13448d0fa5a95de6ab5c682694f4ed07209cf1cb90e4e7b66c9f93ccfc9b77c5eb2fa209a328860ddff8c8cfda6fd351827ea19c8d66f0d139892acc651c71b9cdbd53e01eca8d5182235aabf7a2649dab0340a244882e8cebbcfe0efa58a6e2ff4c0bf3444aa355736f3e64841e2de12955bec03b6f49c1360bba5541b2df5b2fd122f52f63082ca3ab7f64d401e1a45a3a96e9ce23fd6855fed23104358c0dc49fc729cb45cfc793ccc", 0xef, 0x101}, {&(0x7f0000002440)="39c2ab28acb6abda648f358c30b9c6bfef104ffc508830be3314d16064ef66a834359784e3c0", 0x26, 0x6}], 0x40000, &(0x7f0000002540)={[{@debug='debug', 0x2c}, {@codepage={'codepage', 0x3d, '855'}, 0x2c}, {@tz_utc='tz=UTC', 0x2c}, {@check_strict='check=strict', 0x2c}, {@allow_utime={'allow_utime', 0x3d, [0x32, 0x34, 0x30, 0x0]}, 0x2c}, {@errors_continue='errors=continue', 0x2c}, {@sys_immutable='sys_immutable', 0x2c}, {@usefree='usefree', 0x2c}]}) setns(r0, 0x0) 2018/04/30 15:51:57 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x401}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x3, 0x9, 0x8, 0x7, 0x100, 0x3f, 0x80000000, 0x80000000, r1}, &(0x7f0000000100)=0x20) r2 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000dbd000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x20000000000024e}, 0x90) 2018/04/30 15:51:57 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)=0xfffffffffffffffa) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:57 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='s9r1'], 0x4) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'vcan0\x00', {0x2, 0x4e20}}) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000080)={0x6, 0x10000}) 2018/04/30 15:51:57 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000a80)=ANY=[@ANYBLOB="7f454c46000000000001000000000000000000000000000000000000380000000000000000ef8108ef7b6500000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000066f04fe60bf1ef8c65e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008ce6bd0c5918e9c2ca7d8f32e2498b3f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000186f04dc0f1e235153000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xffffffffffffff61) sendfile(r1, r0, 0x0, 0x1000) write$binfmt_misc(r1, &(0x7f0000000080)={'syz1', "096f17c6b1c9c1d983cc74cd0d357948816331d0d261034c9a028a7af6d763a0a154d0f5ec1bdb0b55755e049cc7731e13525b50a04c9af39bb774ff4e739ce2f6c6c2003be054a2d654717fa9c77998c6802c171681ae338206e74ea71d83df462f9b813be2fe687c5ed70ecc2fb09a45f6f0fea641c6e76ba79becdb8e49f639"}, 0x85) [ 306.784345] IPVS: Creating netns size=2536 id=46 [ 307.036025] device lo left promiscuous mode [ 307.869628] device lo entered promiscuous mode [ 307.874360] device lo entered promiscuous mode [ 307.879080] device lo entered promiscuous mode [ 307.886191] device lo left promiscuous mode [ 307.894064] device lo left promiscuous mode [ 307.898526] device lo left promiscuous mode [ 308.013729] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 308.032079] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 308.112944] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 308.130761] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 308.211028] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 308.228747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 308.246821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 308.266256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 308.868514] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 308.901201] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 308.907482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 308.914073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/30 15:51:59 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000a80)=ANY=[@ANYBLOB="7f454c46000000000001000000000000000000000000000000000000380000000000000000ef8108ef7b6500000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000066f04fe60bf1ef8c65e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008ce6bd0c5918e9c2ca7d8f32e2498b3f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000186f04dc0f1e235153000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xffffffffffffff61) sendfile(r1, r0, 0x0, 0x1000) write$binfmt_misc(r1, &(0x7f0000000080)={'syz1', "096f17c6b1c9c1d983cc74cd0d357948816331d0d261034c9a028a7af6d763a0a154d0f5ec1bdb0b55755e049cc7731e13525b50a04c9af39bb774ff4e739ce2f6c6c2003be054a2d654717fa9c77998c6802c171681ae338206e74ea71d83df462f9b813be2fe687c5ed70ecc2fb09a45f6f0fea641c6e76ba79becdb8e49f639"}, 0x85) 2018/04/30 15:51:59 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) mknod(&(0x7f0000000040)='./file0\x00', 0x20, 0xffff) pipe2(&(0x7f00000000c0), 0x80000) 2018/04/30 15:51:59 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = open(&(0x7f0000000040)='./file0\x00', 0x800, 0x128) bind$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x1, 0x1, 0x0, 0x9, 0x0, "e2c19f551a1fc0dcba9a85a88b95914cc586d75ec806b87747a611ca52c1a28412a58b462f4741ee48a34b67bb9517c5c83401368e1e2369bded64f4aa36dd", 0x20}, 0x60) 2018/04/30 15:51:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:59 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0x0, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:59 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r0, 0x2, 0x2, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) preadv(r2, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r3, &(0x7f00000001c0)='./file0/file0\x00', r5, &(0x7f0000000200)='./file0/file0\x00', 0x1) r7 = socket(0x800000000000011, 0x800000002, 0x0) bind(r7, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r5, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r7, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000006c0)={r8, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:51:59 executing program 7: mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0xe01fcf4c3277df96) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f00000002c0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) signalfd(r0, &(0x7f0000000040)={0x8}, 0x8) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x3, 0x100) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r1, &(0x7f0000000840)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x7000040}, 0xc, &(0x7f0000000800)={&(0x7f0000000300)={0x500, 0xc, 0x6, 0x2, 0x70bd26, 0x25dfdbfb, {0x5, 0x0, 0xa}, [@typed={0x8, 0x2f, @fd=r0}, @nested={0x184, 0x4a, [@generic="114e166825c35f6d1ed4423567e19b57c0176766461d8fb723157fefe610be1e30f32b8e987c40e6e9100a35063746e4afc8ec71641c51c6e8461412f4ab5ea6970e0d74c5a6ae1a2a2a9807b59a3e0fc5d4657c7cdc57182ac82f6c60539c0c9436d41d418859c2c9cde77694cefbfc886eb46a49467990f137a5cfae8fd325f15bc5df97d0c06908c1ae111e243831ee82d809fcd16fac09157e2dc70390e9d2443aa87485b74c50b64bebc302f122823f6bda7889a5bb8e35a871fde0ff53", @generic="63e8742cf0af9b74a5d0144d998dc705d0fd7f88e12d24391ff1aeb135b2691d37f75d91aec545d16d6aea4094733ee9a8352e479254be4c673b38cb48247e80cab9ebc335550ba269a365dd76daca3f15a9393c7033ed54038915343feb1739d4e23dc761c8b00c03d8878d5fa86064eff5c02f3337e858a204091560fb84b388fd35f62f347c42a00dc27c323e21a5665809ea76765fbc757370367ff84e64ebb59bb5ab25d5cb85a58bb609b02f507196babd02", @typed={0x8, 0x96, @uid=r2}]}, @typed={0x4, 0x1a}, @typed={0x14, 0x6e, @ipv6=@dev={0xfe, 0x80, [], 0xc}}, @generic="ec32eff60dbf6e12eca2a230a92688ac212288588d2e7a5db7abe83377105b60fb87543cd4ffac12e621cfb22cd16f7df68ec95254934b0bac2606433fcd8a3769503aa518e39620add90f6101796e9f2b4036d1d9bb6e49a1d8e8d39f0330cb81c88f9dea058d5305dadfd392825ace524ce770a9bd08f7a2f62d22534b9ef4e61c526a5a740f5a8132cc81af4e784d957feb43091093a1936b52ecae002d82a8fdde650149259c18ed84ba35a1100eb38ae298ad08838d805489ca29b877084bb99423560ec7f6965fb4aa094453d8c1a5c5b29663a9e6fddcbde9edd6a1a6133d8696d7", @nested={0x3c, 0x7c, [@typed={0x8, 0x38, @uid=r3}, @typed={0x4, 0x77}, @typed={0x14, 0x3a, @ipv6=@loopback={0x0, 0x1}}, @typed={0xc, 0x8, @u64=0x9}, @typed={0xc, 0x16, @u64=0x3}]}, @generic="5603cca8259e6eab006683ed3a773ea4a0e8778cc53a8d852f0214af79934ce77e02a8a9cd6965e78183e6b8c5be55772bfad3cadef0880cb2605c44bebf012a398d7dea59dae3ba3ec848be72096ac6f2b784f65695bfa8c72aa1dc2ccc181f3b43180baac2c39f6ac3de40fd3e9267ec562d4aa507e07d14871af5938141f565199ecd92491b99b73ea6f9d6651955f385fe8b7e5e58c06a33036628aaf6a0bc", @typed={0xec, 0x7b, @binary="d0a51c89cda89d3a24c3524662cbb3a91c0ad88f6be08aa0ec1fa5da51651ed3858ff4a55f83a310954a4bcb6f1917d6d11a41c670af188aa410e244f81e620d9daaa6bb79a243db01b47d329932569e76061ca30aa912e2cd5e1bb206dd252cbac76dcff10e0f6ade64cae876ecf516bf77db15a377f3c3a84b936a8290d76bd09466c63cde8bc217bcb90b08182baa6f65e7e1decfb8284e28959c713f2970b7a5ba4655670e8d2afd3ffbb26d6b99b73c69973419474bd00203bcc5eb06f82c13961d53c55427af2c579bd3006b3c4ddf297ec839c5129b9346dfc850b38b4ac1154ad192501f"}, @generic="24fb6c4ac000c829b200c59c420783215486e2be7fa25b0ec6490a169247e4cfe5d951e2e5601d3b9b7510b2aecdc657bd994e7ab4d79fb2d66ed1e2d4c58937925f0c9bc0e493427e88f730ab9322cba0553a43d04dda66fa5b940526529aa742f9a227a760766b4b812c38a785e7b159f082202c401c195a29a080d18c23fcf8d3a56b85ece3e450653e262877882e7da743d399e127"]}, 0x500}, 0x1, 0x0, 0x0, 0x4}, 0x40010) r4 = getpid() sched_getparam(r4, &(0x7f0000000080)) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) socket$nl_xfrm(0x10, 0x3, 0x6) 2018/04/30 15:51:59 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x30, 0x4, @thr={&(0x7f0000000140)="e61d1fa69f8eca5ee146952f838024a9149a54c8a3f144b839e77b83cbd621e5586598021123921e09dd5a75e63c0181cb09fa71602fcab1e126f4f3d3b76b93960c9a8b87e36b14c6e6bb817b5dd000c77954b894f81e8e742b43ac118c5cdb0dffff043c593947b0b8f7417a368e735132a1d7e81575d02dce2a4bb3328b86e70d35a180d8b3eb9e0ed08ead8df943680e1b6d654f3aa55c0f04d2779691a481c3dbbc016a31bac7bdeddb24c0f86b73de39f98da321527c6832d2009011789c7e65e5f6a835d3625b14492afad06b264f1d37cc5b1dccf16d8fa969550d18e287a9694521a92bcadf1b950f8204fd6621a5e9d9", &(0x7f0000000240)="893665aebd9e2b54f5b7ff6515207ac12cd59a37fa120d48d8d8150a33835c607d258467d7b98e32f4a74f68b4ef918ddcc0b3991ac0e4b2b2601b20c11353b885de68e630be5fff93da2e48ffa047f6ff3eb2a0672f848f"}}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) [ 309.193140] device lo entered promiscuous mode [ 309.211167] device lo left promiscuous mode 2018/04/30 15:51:59 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) fadvise64(r0, 0x0, 0x0, 0x5) 2018/04/30 15:51:59 executing program 7: r0 = epoll_create1(0x0) r1 = socket(0xa, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000e47000)) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x7, 0x6, 0xc, 0x10, "ebc5c81a3c739ddf09a240bd4b48fcefe791173f503f33c59a89d124f5481ebcd7500807a919b4fb4a7f9591af47b2ec5fd7121170ae437d5074f5ed2c45aeb0", "01beb8293a0bc99b33ee641cb2847aeefe61f6e2e2dd2e0664d4dfb89c363f08", [0x9, 0x401]}) syz_mount_image$minix(&(0x7f0000000600)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x800, 0xaaaaaaaaaaaabba, &(0x7f0000000380), 0x80052, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)) 2018/04/30 15:51:59 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x4) accept4$inet(r0, &(0x7f0000000140)={0x0, 0x0, @local}, &(0x7f0000000180)=0x10, 0x800) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000080)="611e81f9d4ec60f3cf6db58fe4315e603efb8421cc4650eba92b7beea8576eec9133f36016014a513544b0e1bcd3a09c8b86403b8b3f3e978c98c09b88d8e3022f5687ce2da8d6c80d7b4f2476432cea384c4b8cfe61e4e0f8801268b272825157bf5063672207c335aa412c74a04cd3080070471276da1b45dae22814f805d90d16ffc784025f9e8c066f28c6062744fe217754271548d0c7984d108a4d45", 0x9f) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000000)=0x1) fcntl$setpipe(r0, 0x407, 0xffff) 2018/04/30 15:51:59 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000d4000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount(&(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x1, 0x20) mount(&(0x7f00000a9ff2)='./file0/file0\x00', &(0x7f0000459000)='./file0/file0\x00', &(0x7f00005aa000)='9p\x00', 0x1000, &(0x7f000035ffb5)) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x84000, &(0x7f0000000380)) 2018/04/30 15:51:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000005000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000140)={'bridge0\x00', 0x4}) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/30 15:51:59 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000080)={r1, 0x4}) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:51:59 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x200000, 0x0) setrlimit(0xd, &(0x7f0000000400)={0x7ff, 0x8}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) fgetxattr(r0, &(0x7f0000000080)=@random={'btrfs.', "2a766d6e6574307b27e200"}, &(0x7f00000000c0)=""/138, 0x8a) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0xfffffffffffffff8, 0xff3e}, &(0x7f0000000240)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000380)={r2, 0x7}, &(0x7f00000003c0)=0x8) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000540)=0x2ed) setns(r0, 0x5a000000) getsockopt$inet_tcp_int(r1, 0x6, 0x13, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) fcntl$getflags(r3, 0x0) r4 = getpgid(0x0) syz_open_procfs(r4, &(0x7f0000000280)='net/psched\x00') 2018/04/30 15:51:59 executing program 7: r0 = epoll_create1(0x0) r1 = socket(0xa, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000e47000)) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x7, 0x6, 0xc, 0x10, "ebc5c81a3c739ddf09a240bd4b48fcefe791173f503f33c59a89d124f5481ebcd7500807a919b4fb4a7f9591af47b2ec5fd7121170ae437d5074f5ed2c45aeb0", "01beb8293a0bc99b33ee641cb2847aeefe61f6e2e2dd2e0664d4dfb89c363f08", [0x9, 0x401]}) syz_mount_image$minix(&(0x7f0000000600)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x800, 0xaaaaaaaaaaaabba, &(0x7f0000000380), 0x80052, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)) 2018/04/30 15:51:59 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffffffffffffc, 0x0, 0x20}, [{0x1}]}, 0x58) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="73797a385a06b78d6d0fb1c9aef514d159b522d7532856ed73c0d2f1a45a43ffe87cbf6412f28b120077f847e619ecdd65f90000000000000000000000000054064f5189d48756b279f55a4c231be089b87d15fb1e2a05c620f2fd00cfb272337fb5578fee2e60bfa3abe64f56bd628693e333"], 0x34) 2018/04/30 15:51:59 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000948ba82b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 309.627877] device lo entered promiscuous mode [ 309.718515] device lo left promiscuous mode [ 309.754029] device lo entered promiscuous mode [ 309.765009] device lo entered promiscuous mode [ 309.821693] device lo left promiscuous mode [ 309.854961] device lo left promiscuous mode 2018/04/30 15:52:01 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="876a7c63fe5e975bc831dd615cd0c011a8e42f43f9c8cd75d8cd6edee5ed6274915847486dac0277e6e6a614c208b54753e11a9ab3fc2bd5b5828e847f514b714a925596e1ccebafd2ed6ed6a30d34535d151568ac68f321d9afd5e844c44e8d0336e872686373aac5685179cd0a20eceaf71fe46ffcdb117b051fedb2219d8f7985aa1fbda1", 0x238, 0x4345}], 0x0, &(0x7f0000000280)={'nouuid,', {[{@rtdev={'rtdev', 0x3d, './file0'}, 0x2c}, {@nodiscard='nodiscard', 0x2c}, {@inode32='inode32', 0x2c}]}}) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) r2 = open(&(0x7f0000000400)='./file0\x00', 0x1, 0x24) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000380)=0x44) 2018/04/30 15:52:01 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x200000) write(r0, &(0x7f0000000080)="5b745cadf6c31cdb26a74edf6461126202956958879bc0", 0x17) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r1, 0x5a000000) 2018/04/30 15:52:01 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000005000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000140)={'bridge0\x00', 0x4}) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/30 15:52:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000005000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000140)={'bridge0\x00', 0x4}) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/30 15:52:01 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x7ff, 0xab0c, 0x9, 0xffffffffffff09c8, 0x8}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1}, &(0x7f0000000100)=0x8) 2018/04/30 15:52:01 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:01 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x9, @multicast1=0xe0000001}}, 0x3, 0xffff, 0x3, 0x7, 0x4}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r2, 0x80000000}, 0x8) 2018/04/30 15:52:01 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="73797a3136e11a8bacdea8aadd5190ee866bee25c370557e01000000108f4b911770bbd4e52c775f6a13f7ad9c87ebf15f06e40471454970cc4cc28a03f8c3d7eed44f25e0525cfe74f285a7dc53d3985372775cf2db2054f72996cfff939be0daf5cc6c1e41b566e4d6ae5ffb5ad8d294044664deae0a3b2dff487cc629215a5eb3ea3c6dc3fd3625639aa62af3240313dd1fb981021f423706bf7e8368add8e1541112d1de803e4d939669efe6edb97c7f560904db1d8250f6c1fb7c95ece4a99d6a1340"], 0x4) 2018/04/30 15:52:01 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a800000) r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@nl=@proc, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x5, 0x30}, &(0x7f0000000280)=0xc) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f00000002c0)=""/233, &(0x7f00000003c0)=0xe9) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r3, 0x8, 0x96}, 0x8) 2018/04/30 15:52:01 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000080)={0x7fff, 0x6ad9, 0xfffffffffffffffc, {r1, r2+10000000}, 0x3f, 0x856}) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:01 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x40000000000000, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffc}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="01000000"], 0x4) 2018/04/30 15:52:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000005000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000140)={'bridge0\x00', 0x4}) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/30 15:52:01 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0xffffffff, 0x7, 0xffe7, 0x1, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x14}}, 0x10) 2018/04/30 15:52:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000005000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000140)={'bridge0\x00', 0x4}) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) [ 310.998397] device lo entered promiscuous mode [ 311.012554] device lo entered promiscuous mode [ 311.029716] device lo entered promiscuous mode [ 311.187265] device lo left promiscuous mode [ 311.199166] device lo left promiscuous mode [ 311.207115] device lo left promiscuous mode 2018/04/30 15:52:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00008f6ff9)='mounts\x00') r1 = epoll_create(0x800000000fff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x20002000}) mount(&(0x7f0000833000)='./file0\x00', &(0x7f0000972000)='.', &(0x7f0000e63000)='ramfs\x00', 0x0, &(0x7f0000caa000)) getgid() epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1651, 0x0, &(0x7f00000000c0), 0x8) epoll_wait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000300)=""/166) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000140)) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000040)={0x6, 0x8}) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000200)=0x5) 2018/04/30 15:52:02 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:02 executing program 6: futex(&(0x7f0000000040), 0xfffffffffffffffd, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000080), 0x0) 2018/04/30 15:52:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:02 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() getpriority(0x1, r1) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) 2018/04/30 15:52:02 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffff000}, [{0x0, 0x0, 0x0, 0x0, 0x8}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:02 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101000, 0x0) setsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000080)="ec4c08e0211d4297f94924c0fef681690ac0e8687e3b7f550923b24f8772263a30335dff231a8675f7c678afa5ee857d22f9c08cd252abc30b45c0b6a6cf567475e127a22d3008359e52448ccbc66f7d59d68bab40f47cd6afe6c1540934d00bb7f874c7ea771ced33d6d8b6cbcb2364bf1cff61c1cfccf2c6afe60f", 0x7c) 2018/04/30 15:52:02 executing program 6: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$setown(r1, 0x8, r2) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000080)) r4 = socket(0x11, 0x4, 0x9) setsockopt$sock_void(r4, 0x1, 0x2000000000000000, 0x0, 0x0) 2018/04/30 15:52:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000500), 0x80800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000540)={0x0, 0x1, 0x30}, &(0x7f0000000700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in=@multicast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0xfffffffffffffffe}, &(0x7f0000000880)=0xc) syz_fuseblk_mount(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000180)='./file1\x00', 0x1, 0x0, r2, 0x9, 0x20, 0x18) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net\x00', 0x200002, 0x0) r4 = creat(&(0x7f0000000040)='./file1\x00', 0x0) pwritev(r4, &(0x7f0000000100)=[{&(0x7f0000000200)="10", 0x1}], 0x1, 0x0) r5 = dup3(r4, r3, 0x0) fallocate(r5, 0x1, 0xd371, 0x400003) pwritev(r4, &(0x7f00000012c0)=[{&(0x7f0000000140)}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x34123610) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000800)={r1, 0xb4, &(0x7f0000000740)=[@in6={0xa, 0x4e22, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x7fff}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e22, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x100}, @in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, @in6={0xa, 0x4e22, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, @in={0x2, 0x4e24, @broadcast=0xffffffff}, @in={0x2, 0x4e24}]}, &(0x7f0000000840)=0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000900)) gettid() r6 = getpgrp(0xffffffffffffffff) r7 = syz_open_procfs(r6, &(0x7f0000000980)="65650000000014") ioctl$LOOP_SET_STATUS(r7, 0x4c02, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x19, 0x0, "e3f3c75f9a07760a67211fc2ca14eebdc83dd118b7bc869a7e8dc91f47d65dab93d18ab66c4dbb52872aab57c778126d3d95dfe534f86d824b155165f83db123", "287be36cb7866e099579031e8c8dc968b64ad919951f90315a1af93e7fda65de", [0x6, 0x9d1]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r8 = open(&(0x7f0000000940)='./file1/file0\x00', 0x28000, 0x10) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r8, 0x84, 0x21, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r9 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r9, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf", [0x0, 0x10000000]}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r7, 0x4010640d, &(0x7f00000008c0)={0x0, 0x2000}) 2018/04/30 15:52:02 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = fcntl$dupfd(r0, 0x0, r0) getsockname$llc(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000080)=0x10) setns(r0, 0x5a000000) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffd000/0x1000)=nil) eventfd2(0x7, 0x1) 2018/04/30 15:52:02 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) recvfrom$ax25(r3, &(0x7f0000000300)=""/4096, 0x1000, 0x100, &(0x7f0000000000)={0x3, {"b2d8d0a0aebeaa"}, 0x1}, 0x10) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000007600)={'ip6gretap0\x00', 0x3d}) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={&(0x7f000000aff4)={0x10}, 0xc, &(0x7f0000001000)={&(0x7f0000000100)={0x28, 0x2000005e, 0x443, 0x0, 0x0, {}, [@typed={0x14, 0x0, @binary="d13e24a272cdafe68e2d9c5b7d"}]}, 0x28}, 0x1}, 0x0) ioctl$TCSETSF(r3, 0x5404, &(0x7f00000075c0)={0x4, 0x100, 0xff, 0x8, 0xffff, 0x5, 0x8, 0x1, 0x9, 0x3, 0x4, 0xfff}) capset(&(0x7f0000000100)={0x20080522, r1}, &(0x7f0000000140)={0x400, 0x4, 0x5, 0x0, 0x3, 0x400}) connect$pppoe(r3, &(0x7f0000000180)={0x18, 0x0, {0x2, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'veth0\x00'}}, 0x1e) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000005b40)={0x0, 0x9}, &(0x7f0000005b80)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000005f80)={0x0, 0xc826, 0x3, 0x80, 0x80000000, 0xa5e}, &(0x7f0000005fc0)=0x14) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000007640)={r5, 0x3f}, &(0x7f0000007700)=0x8) sendmmsg$inet_sctp(r3, &(0x7f0000007400)=[{&(0x7f0000000240)=@in={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10, &(0x7f0000000280)=[{&(0x7f0000001300)="1d3e5f21192e496077594a931a8db895485f34b99c4950f447d747b10ffd7f6844f598917a556d1b3d4b15da9fa3c15e72612020a3201dd543e29d71ef4d4d37e84720cde375752f89e0bad219913209d595b90ab3597a750f777729599a4fcbedd18e7510274ea55f766a8c06cbeb4ede", 0x71}, {&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000002380)="20d5a7411902684a03dbf14001000401bdf011917fc5753f95a507170a51c8f408fa35e8ebd33acde69503de1f1784c6b796047e3dcc1b2bfe66c50b2f5e9326c4b076d86a67398b7080a063c591a43bfc0f", 0x52}], 0x3, 0x0, 0x0, 0x40000}, {&(0x7f0000002400)=@in6={0xa, 0x4e20, 0x78d88f5f, @mcast2={0xff, 0x2, [], 0x1}, 0x400}, 0x1c, &(0x7f00000025c0)=[{&(0x7f0000002440)="c043b60df2b54f591f25618991de3fe775bb400d9e3455488b2ea1b72ca7cd4086d4b3215324ffd5fa48190761da92f19deff78a5a9359a388b1ac055263752e791ca4b3ae80c05b2f72dc6ca8dc58d4f757b72429855afbf1404008a6ffd388a423d325d7d5e07372262255d4ef153e749ce5b296d5ada7bceb88c85443aa395d2283b10db8414fd78021ab12006617e2e0d4d3a3b8ee3dcc746aec705ba9cb2aff57d44193f2e48f4022de05b99013c1e54d61b4805351a47e457af45a960da04fd7d10f6b4ae2e9863f27d0f792f786329e26292c2c87", 0xd8}, {&(0x7f0000002540)="67202190ead13af88b8ae74e5278284432fd74c49b63a5505cbfd168a628016a0df3d4d6dd7a4230a19cff473731eafd02a20874983e7c464aaae4a39de01dba97d1dd81763923", 0x47}], 0x2, &(0x7f0000002600)=[@init={0x18, 0x84, 0x0, {0x2, 0x4, 0x10001, 0x10000}}, @init={0x18, 0x84, 0x0, {0x1000, 0x44, 0x9, 0xc286}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, @init={0x18, 0x84, 0x0, {0x0, 0x7b700000000000, 0xb8c6}}, @dstaddrv4={0x18, 0x84, 0x7, @local={0xac, 0x14, 0x14, 0xaa}}], 0x80, 0x40}, {&(0x7f0000002680)=@in={0x2, 0x4e20}, 0x10, &(0x7f00000057c0)=[{&(0x7f00000026c0)="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", 0x1000}, {&(0x7f00000036c0)="02b85cc37a12786c0e0b3d0169eddef3504ef7649f18d518872bf2e9fe26867dfbc516f666af71b4282f1c382291eaaf3e031e3a3988695ce2a1692081fbe5546c869ea3bd935cd0ccffcfb758bcf6ca700c7257a4007ecd2ee30c57a7cd0a", 0x5f}, {&(0x7f0000003740)="63a8a126d42de9a1bf712c9cebe90320912b7974dfe243c3c8cbaab33ad3906416cdcb0f432d7bdafc5bd92dea989fe4e99c20dfef146bcc48ef9b163e30e69bf3aaeab59c4a7cd441f1eb1b6e2468e4a203032f62a5225b508814548cff6c9573fbd2a582f703b0f58ca8bd5a328c2c14ee09675d199d9325bc021021077f952cf42b4ed10cab6cf2ea5b32d39cebd6ae64248478b6e92677b0ad6af547572753ee068992d3ef699dad25fe548ee259a030ed51a84e602b23b019cdc3dd03063bab2aaab9c0e28ff4e6589cb35dfc9dd6b84f9839373da1a55c8b979f5c1d247955b0a8945f2fa127c8610b7bbcfc192899af2b2c8fa1f285a9c036a4e8d30845c4b18af53d4bf71b8357b81a53fca9d884c57cf0fe770fe7c1dd9df26582127fc3c822e19a90e9d4609549565ad6ec0e7f88901d5e1bf6474e6c114ebc1ec7ec940152801b602f598b09e76954ee33bb36aea797d1eeaaa425b102d3a534ce940cd0c249f8c50ef65210db2e74c4a6e7089fa73f0d8eeb310f73661c582eff145d985a0b2ea69f2abb36e88469e154e8b7252e57dd2979e7810e881ec16eccd9c6b3bfc41b0c7ed003e7abf9147884a78260a3a68a30fa43d42e891a4ba64322864f0129c2a05da9b53dd76da165274141df4c1704dc6cf18e3f1686c85ec78b43ebc2747c30bb72e404094c4d6b516195a378cb2a73619b4b39d764dbbfb575ec14c2a4999dad2f8612ad1597382100aa63c95f0dc477ea05827d3f984ec1bfceeb74eea427a72c20e46e88a2a48531bafd508c3d7c3253f5e1912eabc65c8bb13d1bedee2a1ac5fea62908182c2b3a443902d14d49433cb033d6f2edc951db5d5d83d48173ae1bd0c29cebd6c6c5fa0e80b0a48cbb8dd9a0064aafbed9da73b318e3d5bbe88a460b3d5efebb3d179b353d876f77fbee8ec5d175196a05d4ffd36cc179d3b26b6bd39d7dac86a611d0dcf61665e6775c07e55874aa66a9eb7f7928e39aaa3a2686eb9189bca778bb312bedad1ac655c519abc65edeec36911c6d8fb059c371ce574cc012b3729e0d2bafc764795ea2a86c204efa51a474bf40671e354bbb94110ec1498e6646355fe6633ebd1004c4c05d4854d58b189e73cd2a551c8a429cb95d42a135da3b3525790f6724ab2b46cd03b7b783cba5c61edbe26391b0bbdea3fab4005d4d2bc4eff53adc69aa8ee0b0c386354a11db2172efebcf2e3f1d4565c793694e2aee96a1d5a0d94d814b905a70f96db4026de94689c231614a357590ed6fe95ca485abe75afc443542f0b12fd9b21c8b1a1d8229ac9d88bda3d0a7557a98ad3bc9079dc10bad7a0493687d56901cd57023e1553b1da09f3f0e2af46eae17c086e86e0d91f31f2168f029956b36fa51ade2eaa68d19c986f9dcc16680814f934ac7c0411f49419ce68d823c584f66d4dfd4223f78d4de6f8c8085dd72ac53cb470fca291b41a10bc5bf7cb6d7e53d4a64da0c8a57e53564677fb0616e769a20c276f040dfb5ac776d2166af8d479d5928fd3902c06865d2dba0dce7b9b108c104d036f627b37e5a2ebc241c7aef348c64380ce03adb09fd8103483c1037d5344be249fc211d52b52e3c04942f6a4911a9e679af5670c014c8f2a8f3bd7a5468f556a7f31a018713bd9fc767c985cf0018076be13698981731246c0b772e7fdb24a44748bd6ee59f590bed14e306ad6fa0289359791e68304e850616992652b9c147e9a750499e5043cbcab7cd0eb5627045c14980440b03f623d8b4db7773584f691f0242c35651f670d8aff44652c4acb4cd9540f3b50315ba3feea82bece381667b330f54caf4d472f7e2e45704c775aeb8b5a8946a84a66ffaa23dc276c6070c53c7bb83d2e37f2ed5767b1a3cf8ffafac825c4d445cd130933506d908b00c9b9c472e7030c94b3a438453d9ff0213a844f6378fd2b4a5ea50352a3b39c2f2ab6d6cc69d19c70d85c80899588babbf6480bdca4c726f4071d9bdf2710c7fece41b9e2965d7e5c0f33876f77532d7339a1dc5cffc6419c4787d6b617d852c4e43cc5ad7717502c2c0041dcffd64caec00c5b938a83d14df765052db776ffb998fbf352f19f8b6b29a166186929407bb2f303030137aff9b78405aa53df81106f5f0a9a47d894145e7d5078d8e93fe736cec49aedf4b14f5c7172d2a8cf38e8eb4528ea0ee6db9967e38957ec4015c0762bcb651b0f30903fe676591fb188bb0e4bb4aa9c8b6d274cf0565d8371424a8f1b3e0e18409cbbf409455f7caae86c0bff0cccb9ee92bea546deb846caee7842eda141b0ce0bc4ad117b630a7a44711ddd16038d89a977421a0281b67869d9dff35c551fc028146bde7367e34784d21afa4607276c4df91a72066048fcb347d25e7dc068f37b3859cdaf227ff3636a86a9144784d5693d5e894f85a950aea655b230736e16ef6050bfc1454a532afac36fde6d68b5e6c51e30b80bd258818e1123f15a6f02ec0a95b8ed3dcdafb895e63234a31b727389e63df09e0753d101972d727413c94ba65b2f24d350d69b8a2bab5a9b7947fa520e2dbfa33d7fb94b6210ecbad091fbc3f9c94d1bcd17dc3a3f0090c00ef0037d4cdb63574465e89d1722e3c8fb5ccadf64c83e0dd4b90648dc8f3f5a338d6003c97f0889b4a8e5b3b8e5531bf81a1ffe6294215177050304dff62e968e601b42f41b3fb0e356f19f5ca937af5a25c40076ec4ddeb922e8da9f0c7f04824df81af1b336251bb2d78fcce3201adb7d3951024dc27400c3fd8d0196d154c375982eec9202ecb270249dfed60c8d44a02fc7d261ebf339458fc96d3c7e9a450a87b7ccd13966de050f1142df4c73249fa9ede2aa0fef1c9a574fdfdb0687a7ed5eeb4e2d185480eb22e247b28f24695d0ebb01cce418766a18b53e5cdaf98b73f577b6acfc24b99d756b86774ed52f5a95e1b7035b771a3d2952375573de5a6c0d25755fe1b6450d939f2d4213a207bef9caf15275c726c57647ec11bd2b918f61294cc53106f714a03d17a11a2d5ef4ccbc753c41a158fd81d0f8e1df5202d3b377d1ebfc1da19cd57920ab6b3995cef05b396a744f727c11ffeb0153c43ab75d0100cd49c15ffb6d77e5cd0a87552f09ec143712b2dff42ee38ed9bfd9f97e3bde97e106094eff4c407ab2d89222df3a354057f51d5706e1426b04d98a16fe2761d1e4e3927b931f5fccc9819e6a7d1ef39640492cae62e72a1b88e673df6288c45ff91a58dbdfe229ae5d9b7f8b2315b8b8fd4f9857f455b98b6c0a0409d28a6d4441429d6925107e677ec039007ae4562787f24677d49848cb54e4b78b162fa4227f0f2dcfabcb4a7628bfd2d1467692de529daf65fda379c151e52f247b38dff8f1f08d1af7d71d756e95d0f4dd35cc58719891dd829ecbd8623c93655946cada34df8f111248f3f1d5acaff40ea7ad412f07b9258dc71489c16b6a39a94c4d26acb1b8b56b092912ceca4f10f586b1d93edb1e8a564449f725274e04c532c36b2cc0d75bc5a7e7c8d1f5a7f4096c9e62c9428d1e41f42c46994966f24e123e507018e87448964dfb92b423bfeb0e9e4e1fc3acb5646dbe5c3bde13ec528810b6dc7564ef85e2a41d4ba3c1e108c39b12226d2b2cd95ce3b07fb26ef51352024abbda02087c82448f97f95eb4299a6cdf20448bd2e8ee7dbae61915439822a12760eec04b76f5db1807d8094734f4124e325e2bb816eb9b258cb067b02031b4bff6a72e9a98efeb3c50765e7c33263aaced0a76e733bd157a40581144fa54fc795496423f52ee254317476bedfb4b0dde35abf9cc4a64705965b3f70bf1241d0d22d54cb6c92ce4569d73731923744d9fac73d88e3ba2f54adfea6bde821ed3770a45c2232a935beb11428632d171b80fbcce29d4dd96a0c99834088bb7814e8a6ed6e419e3cb24c7a1d2ef35f2995b98c4cf9b548648815f4f66eeeb0cec0f6b97e123a822dc538b66b32342f64eac57c98f45590e69618dcd259d302ce76b7c182bac1a6919c7969901d54e3f58926a4fd93108f9cefd596922004cdb9b7c51c2c2b01ef248bb373c747382529bc8f1709d9d2322a11163fe7bb77bd009540b588b39fbaa3089e8c10c3b8ad5d8eab20f8eff12f0427b574664703106a07a8bff8a739bf7b224844a79688c29407c746b9b0e16d79bb98a27ced2721d9f6d7ced536b958794da990948854d8294027faac24b4a5a32fe464bbc97ee42036d3f80299ed055491863d0a0ef49145e67451fac1354c1f67bce17a4a7df799c5becdf3bef4c1dc18886664828172354c26d82180c61d10844f6330c0c98723fc0085a7d84f65daf6b40299e87d461beb53e36a66b79ec6cd388b2b4c7f875c9a9c918a0db0b00e63233837519a6accb4a24be9549fe1e955050e0000423606da91273285d89af47ba900d8cd1eb4b79e99c156f88148cb0a4e7055060c61a7342a566d57d1315d6be5d07b06cb03f6b1b767883b803589df1099b3ff15edcd823a68c01977ba544d203409518a9db737faac07b5d5c8a756d1aad5fcd00beda67ed633bd6851ca2a3c152311617662fed9fdb091b828112ba675960f8b57f3753f926c96cd43a457f4eccaa38db148ca05a4a0710d29d6ab368bbe1f5d99e00c7bbdb51eb6632e73983057382a31a777a9188d8f839a08e1afe3a6d54293b4061f542dedec59ec56ee269a625200cbfdf6c7c330bb0a952ea3b2a857d09f33535cf83f8c9961d4847e4cb38e7996a2dc956974275b891b1afda779bf0c127eb45b90b92bf2dc9336d0233df35f6ccbc066de21e7cd3d22096fa06ec77ded75ad5718d3907baf0e04c0baa38935704c6cb1c24ac3e7b8c87647b72a4f09997aad723a2149e112d10349a1b707e20b77f32638fcd0a813a929e3b3550d1f43547c5326d809a5fa535aca99f10e21f9c87cbe87af06ef9362e16923d09bce610ca2b462b0504c5c30b0b7b6394ebde9e59e9638825dc5d16a59cb5a34cdb4f7b8f08afd4bd930884c1fefdd2247e1f1a1a853356e978b301fc716151e7e5a03287f457e4f47e8fce8b271436cfaad6cd4db00cc78e1939088d1baaaf0184672379ff5f961b1350f9c1b6cadc19ce81686a8a457ba74d9b8c89066f9973186135c60aa882768e837a2a3816129fa31425fa48c7c1180490361e29901e3077b8368cc450eb6714da833d60c0988ec0e98d9c990c17e8b2f417d468fec062310910ae9fe3bd0fb73f51bebae7e09c4b9d54e1df85c8ec12acb68d71249a1fa3de8e5081b58bdd56a9c8f532abc8074c2d6e2ee3eaa1f59527004a1cb1f9ffe70c82df2d32cde81374cfe47b2e52a9c9fc412c4093c9d3185d53b414a6bb54e3c8a6b1f075651f917191f8b8ed4abbe6a6b2eb29c91b321a1d7df1dcac5d9f353cf981f7e86f2d7e8565a5bdd3a267ff5bc02017cf610076ffa288e280852f752a1e1136d6d62452437e77cbd844d7dca8e3d3d44966a6eda0cbbd2a72acc1e36c9220266597671d8072c61c1be31c1622e8a05793718ab03f119518727366c8de5497ef9b96afeda35594f083463350747805e94093e717ce3d7d689b460598c42ec36c1d04e18ed03c6fc93437a7fbab36d9f5372622b848f101892283d15d7378aa9adb287819ebe0139fa4f3d016609a94ce73d408b128da6fef39983fd6237843906123a9a096075c45b6fa9d46fbd35dfb41defc539ffc246ffdc343436197285fe2b857f4457d885e20272985ab47e92570427f90dc142023ee4e2cb02bfe882d9749b581bf432a9b6bbd4fbec", 0x1000}, {&(0x7f0000004740)="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", 0x1000}, {&(0x7f0000005740)="7e8d9bfb07c163c6d6fda839d4ec0b5bcdc10ce2bf9a2a3c3cca7ab7b1455d64a4e22dbc577b564ee8a8c77f4d116f9d3f3d15fb1ef4981c56a2e60650cf75cd8104b98ac987a978999e5a337971cbf5e81e9ecfba1ccc7fe44c44e216eeb289e71076c3b436af1586", 0x69}], 0x5, &(0x7f0000005840)=[@prinfo={0x18, 0x84, 0x5, {0x20, 0x6}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, @authinfo={0x18, 0x84, 0x6, {0x4}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x9}}], 0x68, 0x4000}, {&(0x7f00000058c0)=@in6={0xa, 0x4e21, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, 0x1c, &(0x7f0000005b00)=[{&(0x7f0000005900)="f70c8900bf11738433613790ebe17b322eb78a3c6476f77e6814d2cffc6e1d369acb6253343e4ce81fe3f94b6f48d529b9ed7f883d1f5a279ebf4134d47022c90d0d27609f2d56fb704c9067112f2337d96b61d6262ea4a31463525aed130f83adca257e5fbaa80e904164a43c87c8c293294d8f949e4cdcf092a331fcf215feca63e455e5305737b902ae4dace34534d106d2573daf4c6649bd73aeaf95d9e51ef04014c093d803a6ad548fcae7e9368560ff50df973b9c43090479e2e399138ad3c2862b5727bffd4b6fd33e9bef293afa87f98d0f11cda3382d333b403967dd838604630969eb49", 0xe9}, {&(0x7f0000005a00)="dc8822d741964a2c93b843c59f150ea6358dfde739eabe1da75190e26a4b4fa98321113575229a4da70867186b335a59b1eedfeaccf66520d06d6143a7568ec8f843e67609172f35dd5b83a1cfc69cadc149730d4bec81de719d66626a5cedc6a6d42abf09b6611f9c40e42b875023a94303a424d103eebe8b31f09a19b1afa6433a9f188dd3a11445401077bc5c4243c8e4d743f16063f287bc230ee7dd9b7678acebb1c5af0949ee7a1e46a2380f12a06d6516255abf773d7b5922e922464e24a23fb6f2ee41212e77cf7d1ad925f58de9a55e9f76e9b3d6b95d24d6984bcb673fb9e1414c5fc0cde2f81933a2bde69a107a666ae0eb", 0xf7}], 0x2, &(0x7f0000005bc0)=[@authinfo={0x18, 0x84, 0x6, {0x128}}, @sndinfo={0x20, 0x84, 0x2, {0x3, 0x4, 0x401, 0x4c, r5}}, @init={0x18, 0x84, 0x0, {0x0, 0x7, 0x8001}}], 0x50, 0x4004054}, {&(0x7f0000005c40)=@in6={0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0xa}, 0x4e1}, 0x1c, &(0x7f0000005f00)=[{&(0x7f0000005c80)="163f61deaeb4695fe887b495257ed753888d2a2301286e032e847ea3b157d5b35835f549848cf8979f558eb311ba00fcdfe0eb2fa6174bada71fcf4be9cfb5bed3d66ae91bd01ab6eec97724d0919df091bc969d6b1ffc364c74a03c38b2c263bd13bf80e81fdd0d5c3ec93214b268f1c8c3784774063a15693b7dc85a54b7aba531b4a5fe3930d235510b937e56af3870b3437d94ab983afdfca963185b0907f2273f558a7aa6ee2c3af7ce77e2154a1d4837f9399c", 0xb6}, {&(0x7f0000005d40)="882e577834473a26152fea5b40c4f9accca9d9a911f12f9774df33160f42bc1bc75c1bcb4900dc49590f20ab3e4db4b06d8b89bbfd0c43f19f57727287fd88e630e3123c31a29e61a97a165ae4c4e2a41d4181b833e89f355164e76946c61f9cb94138a3740f4acdb8a95e988544cfc491f77cc2892761ede38e1351cc255bbf344c17d7261f05ec7ebd5289", 0x8c}, {&(0x7f0000005e00)="81a89b6dc6a475a9d8", 0x9}, {&(0x7f0000005e40)="f272aace47576ada970c7ac8f462a0df4f47c78e0639aee6f3b7dadb513f9605", 0x20}, {&(0x7f0000005e80)="009160dc3a50a007ae0957a4c855ba4b356b83ed18b0dfb429b30b1a66b4ee1f2ec444db68e248f178f8957c0af8e8f0bed7b694ba814b214ca2cf4ef7481356b6240795801321c8e173d6828c33d11ef1565e726ed8549696", 0x59}], 0x5, &(0x7f0000006000)=[@init={0x18, 0x84, 0x0, {0x5, 0x3, 0xb495, 0x8}}, @init={0x18, 0x84, 0x0, {0x5, 0x7f, 0xd9, 0xfffffffffffffff9}}, @sndinfo={0x20, 0x84, 0x2, {0x6, 0x200, 0x9, 0x3b, r6}}], 0x50, 0x4000000}, {&(0x7f0000006080)=@in6={0xa, 0x4e23, 0x9, @loopback={0x0, 0x1}, 0x4}, 0x1c, &(0x7f0000006100)=[{&(0x7f00000060c0)="a7319079cf885fefab81d1205f37a640f28e2c32f8a047eb2d0a", 0x1a}], 0x1, &(0x7f00000061c0)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast1=0xe0000001}, @authinfo={0x18, 0x84, 0x6}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x2}}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20, 0x84, 0x2, {0x1ff, 0x3, 0xd25, 0xa10, r7}}, @authinfo={0x18, 0x84, 0x6, {0x4}}], 0xb0, 0x20000005}, {&(0x7f0000006280)=@in6={0xa, 0x4e23, 0xff, @dev={0xfe, 0x80, [], 0x19}, 0x8000}, 0x1c, &(0x7f0000007380)=[{&(0x7f00000062c0)="3de13b7e42c0def8f9f83af3ebb343903df574f8d610409465b00ce7d40fb2336f825c05e11c3f67079ef3f93aaf35a4788d4011c68332c976ee29d7d7a1f0735a15da1bac9f1594fff3293fe30aad1c8f169d10eefb80cf", 0x58}, {&(0x7f0000006340)="d51de33e115949c3", 0x8}, {&(0x7f0000006380)="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", 0x1000}], 0x3, &(0x7f00000073c0)=[@dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x1f}}], 0x20, 0x10}], 0x7, 0x24000041) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000001c0)={0x0, 'bridge_slave_0\x00', 0x2}, 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x7, @ipv4={[], [0xff, 0xff], @rand_addr=0x5}, 0x1}], 0x1c) ptrace$getsig(0x4202, r1, 0x84f, &(0x7f0000000200)) setfsuid(r2) 2018/04/30 15:52:02 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xa0, r1, 0x400, 0x70bd25, 0x25dfdbfb, {0x10}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6fb}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x101}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffffffffffffffff}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x18, 0x10}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40}, 0x20040800) getpeername$llc(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000280)=0x10) 2018/04/30 15:52:02 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001d00)='/dev/snapshot\x00', 0x140, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) readv(r0, &(0x7f0000001c80)=[{&(0x7f0000000040)=""/87, 0x57}, {&(0x7f00000000c0)=""/178, 0xb2}, {&(0x7f0000000200)=""/254, 0xfe}, {&(0x7f0000000a80)=""/46, 0x2e}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/246, 0xf6}, {&(0x7f0000001bc0)=""/177, 0xb1}], 0x7) write$binfmt_misc(r0, &(0x7f0000000180)={"9a797a31", "68d221b979f9e9d43dcc895aad610b21573f61464a8909b347fbc44f55f37b6d9142993b18002be226db320ca40776b63092a8643e213107b77302274835db670aba160965e4f84eb162d794ab0c3b1a5de30cd31e675de2b38ca95e56f2528850cba8baf6fada13a312bf82f16bb2da526666"}, 0xfffffffffffffff8) 2018/04/30 15:52:02 executing program 6: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ff8000/0x2000)=nil, 0x2000}, 0x3}) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000ffa000/0x1000)=nil, 0x1000}, 0x1}) [ 312.269284] device lo entered promiscuous mode [ 312.385074] device lo entered promiscuous mode [ 312.414158] device lo entered promiscuous mode [ 312.421041] device lo left promiscuous mode [ 312.474226] device lo left promiscuous mode [ 312.505799] device lo left promiscuous mode 2018/04/30 15:52:03 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x400000000, 0xffffffffffffff80, 0x36d, 0x3, 0xfffffffffffffffc, 0x20, 0x40000000000, 0x1}, [{0xfffffffffffffffe, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffa}], "a924049cf74cf74e1127391dcd379fd96a2250663a131d51b433f3539bda0f936e14d52762e2c7c7915f7eda4edc848194f65edbc41c3c967a44d6eb6d7d4622948bfc5fe87a866fb9c61b94f3fc5662d9e751e7c3b568058a6109f97df1b6086aa7a47c61f4a99a2a7e60e177bd802dba342faa00c1796a2b90d96cbdd8cce1dcfca787c15e0b20b8395ddef9ca8837e3433b3564bc4f13902d661edeefe1fb964114f154f2c7052c402da775bffea5465a4a46111369477d263437a155786780d8004307f0948145d3d52804d6b73fbc100160c8925945353a278b8e401f209db17a71240a", [[], [], [], [], [], [], []]}, 0x83e) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:03 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:03 executing program 6: setrlimit(0x0, &(0x7f000018f000)={0xffffffffffffffff, 0xffffffffffffffff}) r0 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f00000000c0)=0x60) r1 = accept$nfc_llcp(r0, 0x0, &(0x7f0000000000)=0x242) fcntl$getflags(r1, 0x0) 2018/04/30 15:52:03 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') finit_module(r0, &(0x7f0000000040)='ns/uts\x00', 0x1) setns(r0, 0x5a000000) 2018/04/30 15:52:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:03 executing program 1: r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000a80)=ANY=[]) fallocate(r0, 0x1, 0x0, 0xf5) timer_create(0x4, &(0x7f0000000000)={0x0, 0x35, 0x2}, &(0x7f0000000040)=0x0) timer_delete(r1) 2018/04/30 15:52:03 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x100, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1e) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000001c0)={0x0, 0x6b, &(0x7f0000000140)="1ecb6c447b93d66f4a2d9da896cf8869852cffb300420f12716e897fd7cf9c03d45c786ab4c4a42a6d1786a30dc676b5f6a4e1f2bcd9ebaed72ac70febbded4b9e904bf71fba25c2b098ea5d14f21cb84eea1afeef4a81df66e9292cb9a82fbc79a5addeb264e92ce96a6e"}) 2018/04/30 15:52:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000500), 0x80800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000540)={0x0, 0x1, 0x30}, &(0x7f0000000700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in=@multicast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0xfffffffffffffffe}, &(0x7f0000000880)=0xc) syz_fuseblk_mount(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000180)='./file1\x00', 0x1, 0x0, r2, 0x9, 0x20, 0x18) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net\x00', 0x200002, 0x0) r4 = creat(&(0x7f0000000040)='./file1\x00', 0x0) pwritev(r4, &(0x7f0000000100)=[{&(0x7f0000000200)="10", 0x1}], 0x1, 0x0) r5 = dup3(r4, r3, 0x0) fallocate(r5, 0x1, 0xd371, 0x400003) pwritev(r4, &(0x7f00000012c0)=[{&(0x7f0000000140)}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x34123610) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000800)={r1, 0xb4, &(0x7f0000000740)=[@in6={0xa, 0x4e22, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x7fff}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e22, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x100}, @in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, @in6={0xa, 0x4e22, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, @in={0x2, 0x4e24, @broadcast=0xffffffff}, @in={0x2, 0x4e24}]}, &(0x7f0000000840)=0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000900)) gettid() r6 = getpgrp(0xffffffffffffffff) r7 = syz_open_procfs(r6, &(0x7f0000000980)="65650000000014") ioctl$LOOP_SET_STATUS(r7, 0x4c02, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x19, 0x0, "e3f3c75f9a07760a67211fc2ca14eebdc83dd118b7bc869a7e8dc91f47d65dab93d18ab66c4dbb52872aab57c778126d3d95dfe534f86d824b155165f83db123", "287be36cb7866e099579031e8c8dc968b64ad919951f90315a1af93e7fda65de", [0x6, 0x9d1]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r8 = open(&(0x7f0000000940)='./file1/file0\x00', 0x28000, 0x10) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r8, 0x84, 0x21, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r9 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r9, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf", [0x0, 0x10000000]}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r7, 0x4010640d, &(0x7f00000008c0)={0x0, 0x2000}) 2018/04/30 15:52:03 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000500), 0x80800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000540)={0x0, 0x1, 0x30}, &(0x7f0000000700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in=@multicast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0xfffffffffffffffe}, &(0x7f0000000880)=0xc) syz_fuseblk_mount(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000180)='./file1\x00', 0x1, 0x0, r2, 0x9, 0x20, 0x18) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net\x00', 0x200002, 0x0) r4 = creat(&(0x7f0000000040)='./file1\x00', 0x0) pwritev(r4, &(0x7f0000000100)=[{&(0x7f0000000200)="10", 0x1}], 0x1, 0x0) r5 = dup3(r4, r3, 0x0) fallocate(r5, 0x1, 0xd371, 0x400003) pwritev(r4, &(0x7f00000012c0)=[{&(0x7f0000000140)}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x34123610) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000800)={r1, 0xb4, &(0x7f0000000740)=[@in6={0xa, 0x4e22, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x7fff}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e22, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x100}, @in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, @in6={0xa, 0x4e22, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, @in={0x2, 0x4e24, @broadcast=0xffffffff}, @in={0x2, 0x4e24}]}, &(0x7f0000000840)=0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000900)) gettid() r6 = getpgrp(0xffffffffffffffff) r7 = syz_open_procfs(r6, &(0x7f0000000980)="65650000000014") ioctl$LOOP_SET_STATUS(r7, 0x4c02, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x19, 0x0, "e3f3c75f9a07760a67211fc2ca14eebdc83dd118b7bc869a7e8dc91f47d65dab93d18ab66c4dbb52872aab57c778126d3d95dfe534f86d824b155165f83db123", "287be36cb7866e099579031e8c8dc968b64ad919951f90315a1af93e7fda65de", [0x6, 0x9d1]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r8 = open(&(0x7f0000000940)='./file1/file0\x00', 0x28000, 0x10) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r8, 0x84, 0x21, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r9 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r9, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf", [0x0, 0x10000000]}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r7, 0x4010640d, &(0x7f00000008c0)={0x0, 0x2000}) 2018/04/30 15:52:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000500), 0x80800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000540)={0x0, 0x1, 0x30}, &(0x7f0000000700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in=@multicast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0xfffffffffffffffe}, &(0x7f0000000880)=0xc) syz_fuseblk_mount(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000180)='./file1\x00', 0x1, 0x0, r2, 0x9, 0x20, 0x18) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net\x00', 0x200002, 0x0) r4 = creat(&(0x7f0000000040)='./file1\x00', 0x0) pwritev(r4, &(0x7f0000000100)=[{&(0x7f0000000200)="10", 0x1}], 0x1, 0x0) r5 = dup3(r4, r3, 0x0) fallocate(r5, 0x1, 0xd371, 0x400003) pwritev(r4, &(0x7f00000012c0)=[{&(0x7f0000000140)}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x34123610) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000800)={r1, 0xb4, &(0x7f0000000740)=[@in6={0xa, 0x4e22, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x7fff}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e22, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x100}, @in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, @in6={0xa, 0x4e22, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, @in={0x2, 0x4e24, @broadcast=0xffffffff}, @in={0x2, 0x4e24}]}, &(0x7f0000000840)=0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000900)) gettid() r6 = getpgrp(0xffffffffffffffff) r7 = syz_open_procfs(r6, &(0x7f0000000980)="65650000000014") ioctl$LOOP_SET_STATUS(r7, 0x4c02, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x19, 0x0, "e3f3c75f9a07760a67211fc2ca14eebdc83dd118b7bc869a7e8dc91f47d65dab93d18ab66c4dbb52872aab57c778126d3d95dfe534f86d824b155165f83db123", "287be36cb7866e099579031e8c8dc968b64ad919951f90315a1af93e7fda65de", [0x6, 0x9d1]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r8 = open(&(0x7f0000000940)='./file1/file0\x00', 0x28000, 0x10) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r8, 0x84, 0x21, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r9 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r9, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf", [0x0, 0x10000000]}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r7, 0x4010640d, &(0x7f00000008c0)={0x0, 0x2000}) 2018/04/30 15:52:03 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x20000) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x10, r0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) epoll_wait(r1, &(0x7f0000000080)=[{}], 0x1, 0x1) 2018/04/30 15:52:03 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x410200, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000080)=[0x3, 0x6]) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:03 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000180)={0x35, &(0x7f0000000140)="07e648f56ab0f22d85143ca45f7ad3545de54ec3c7f64d2fd6e2e8559d3735e0e374095e8a403bc9b8c8167f22e08293b961d4424d"}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0xf, 0x4) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000080)) finit_module(r1, &(0x7f00000000c0)='syz1', 0x1) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:03 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) sync_file_range(r0, 0xff, 0x1, 0x1) 2018/04/30 15:52:03 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) getsockname$inet(r1, &(0x7f00000000c0)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) bind$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710, @hyper}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x3}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000001c0)={r2, 0x1000, "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"}, &(0x7f0000001200)=0x1008) 2018/04/30 15:52:03 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000038000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:04 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 313.633346] device lo entered promiscuous mode [ 313.648168] device lo entered promiscuous mode [ 313.736647] device lo left promiscuous mode [ 313.797426] device lo left promiscuous mode 2018/04/30 15:52:04 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffff9c, &(0x7f0000000380)=[{{&(0x7f00000000c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)=""/222, 0xde}], 0x1, &(0x7f0000000280)=""/243, 0xf3, 0x3}, 0x6}], 0x1, 0x100, &(0x7f00000003c0)) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000005c0)={{{@in, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000580)=0xe8) recvfrom$packet(r1, &(0x7f0000000040)=""/73, 0x49, 0x41, &(0x7f0000000400)={0x11, 0x15, r2, 0x1, 0x8, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) 2018/04/30 15:52:04 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) socket$key(0xf, 0x3, 0x2) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:04 executing program 6: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') finit_module(r0, &(0x7f0000000040)='ns/uts\x00', 0x1) setns(r0, 0x5a000000) 2018/04/30 15:52:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000500), 0x80800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000540)={0x0, 0x1, 0x30}, &(0x7f0000000700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in=@multicast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0xfffffffffffffffe}, &(0x7f0000000880)=0xc) syz_fuseblk_mount(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000180)='./file1\x00', 0x1, 0x0, r2, 0x9, 0x20, 0x18) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net\x00', 0x200002, 0x0) r4 = creat(&(0x7f0000000040)='./file1\x00', 0x0) pwritev(r4, &(0x7f0000000100)=[{&(0x7f0000000200)="10", 0x1}], 0x1, 0x0) r5 = dup3(r4, r3, 0x0) fallocate(r5, 0x1, 0xd371, 0x400003) pwritev(r4, &(0x7f00000012c0)=[{&(0x7f0000000140)}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x34123610) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000800)={r1, 0xb4, &(0x7f0000000740)=[@in6={0xa, 0x4e22, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x7fff}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e22, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x100}, @in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, @in6={0xa, 0x4e22, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, @in={0x2, 0x4e24, @broadcast=0xffffffff}, @in={0x2, 0x4e24}]}, &(0x7f0000000840)=0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000900)) gettid() r6 = getpgrp(0xffffffffffffffff) r7 = syz_open_procfs(r6, &(0x7f0000000980)="65650000000014") ioctl$LOOP_SET_STATUS(r7, 0x4c02, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x19, 0x0, "e3f3c75f9a07760a67211fc2ca14eebdc83dd118b7bc869a7e8dc91f47d65dab93d18ab66c4dbb52872aab57c778126d3d95dfe534f86d824b155165f83db123", "287be36cb7866e099579031e8c8dc968b64ad919951f90315a1af93e7fda65de", [0x6, 0x9d1]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r8 = open(&(0x7f0000000940)='./file1/file0\x00', 0x28000, 0x10) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r8, 0x84, 0x21, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r9 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r9, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf", [0x0, 0x10000000]}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r7, 0x4010640d, &(0x7f00000008c0)={0x0, 0x2000}) 2018/04/30 15:52:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000500), 0x80800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000540)={0x0, 0x1, 0x30}, &(0x7f0000000700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in=@multicast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0xfffffffffffffffe}, &(0x7f0000000880)=0xc) syz_fuseblk_mount(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000180)='./file1\x00', 0x1, 0x0, r2, 0x9, 0x20, 0x18) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net\x00', 0x200002, 0x0) r4 = creat(&(0x7f0000000040)='./file1\x00', 0x0) pwritev(r4, &(0x7f0000000100)=[{&(0x7f0000000200)="10", 0x1}], 0x1, 0x0) r5 = dup3(r4, r3, 0x0) fallocate(r5, 0x1, 0xd371, 0x400003) pwritev(r4, &(0x7f00000012c0)=[{&(0x7f0000000140)}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x34123610) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000800)={r1, 0xb4, &(0x7f0000000740)=[@in6={0xa, 0x4e22, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x7fff}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e22, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x100}, @in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, @in6={0xa, 0x4e22, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, @in={0x2, 0x4e24, @broadcast=0xffffffff}, @in={0x2, 0x4e24}]}, &(0x7f0000000840)=0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000900)) gettid() r6 = getpgrp(0xffffffffffffffff) r7 = syz_open_procfs(r6, &(0x7f0000000980)="65650000000014") ioctl$LOOP_SET_STATUS(r7, 0x4c02, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x19, 0x0, "e3f3c75f9a07760a67211fc2ca14eebdc83dd118b7bc869a7e8dc91f47d65dab93d18ab66c4dbb52872aab57c778126d3d95dfe534f86d824b155165f83db123", "287be36cb7866e099579031e8c8dc968b64ad919951f90315a1af93e7fda65de", [0x6, 0x9d1]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r8 = open(&(0x7f0000000940)='./file1/file0\x00', 0x28000, 0x10) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r8, 0x84, 0x21, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r9 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r9, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf", [0x0, 0x10000000]}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r7, 0x4010640d, &(0x7f00000008c0)={0x0, 0x2000}) 2018/04/30 15:52:04 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x10142, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) 2018/04/30 15:52:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:04 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:04 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:05 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = dup(r0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000080)=0xc) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f00000000c0)=r2) 2018/04/30 15:52:05 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x1f}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:05 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:05 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x1, 0x0, 0x1, 0x1, 0x6, "c426af469762f3fff2b3dee53878f11257ebf7e6fe8ea6ca854e8abea866f6e1db701e99303aed8b41d3f4bc25cb776af1e78b1828e6de18bb2ffd9c4aa0ae", 0x37}, 0x60) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r1, 0x5a000000) [ 314.592509] device lo entered promiscuous mode [ 314.604989] device lo entered promiscuous mode [ 314.619960] device lo entered promiscuous mode 2018/04/30 15:52:05 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) getgid() timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) 2018/04/30 15:52:05 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000040)={'syz1', "7117c7e0192059d4c286ec9ed4d47210363da39e68792e20b8b5e03f817b185965afe6275306d60ac139865187f1c9bc54fa3de9cff8e4725cce663b7dd95eb6d04bd3f89b5eeee9eec48050f3101779b70a3fd754104cdbcd03dd542230e167e2b925d1114c1378629a7323bb5d2a969de987a023433f37cf453d75759010c3ad2a13f51e5a640f226a4a082db66dabe6c171f8d0d0d20f6c0fdd7bd42bcafe7dac51069a90e20ce06cd677b55e83dcfc098be701d0e69eafd0000000000000"}, 0xc4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x14) [ 314.676463] device lo left promiscuous mode 2018/04/30 15:52:05 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) sendto$ipx(r0, &(0x7f0000000040), 0x0, 0x20040000, &(0x7f0000000080)={0x4, 0xffffffff, 0x10001, "663d94f8c9de", 0x7}, 0x10) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:05 executing program 6: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffff9c, &(0x7f0000000380)=[{{&(0x7f00000000c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)=""/222, 0xde}], 0x1, &(0x7f0000000280)=""/243, 0xf3, 0x3}, 0x6}], 0x1, 0x100, &(0x7f00000003c0)) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000005c0)={{{@in, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000580)=0xe8) recvfrom$packet(r1, &(0x7f0000000040)=""/73, 0x49, 0x41, &(0x7f0000000400)={0x11, 0x15, r2, 0x1, 0x8, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) 2018/04/30 15:52:05 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r0 = getpid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/uVs\x00') 2018/04/30 15:52:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000500), 0x80800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000540)={0x0, 0x1, 0x30}, &(0x7f0000000700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in=@multicast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0xfffffffffffffffe}, &(0x7f0000000880)=0xc) syz_fuseblk_mount(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000180)='./file1\x00', 0x1, 0x0, r2, 0x9, 0x20, 0x18) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net\x00', 0x200002, 0x0) r4 = creat(&(0x7f0000000040)='./file1\x00', 0x0) pwritev(r4, &(0x7f0000000100)=[{&(0x7f0000000200)="10", 0x1}], 0x1, 0x0) r5 = dup3(r4, r3, 0x0) fallocate(r5, 0x1, 0xd371, 0x400003) pwritev(r4, &(0x7f00000012c0)=[{&(0x7f0000000140)}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x34123610) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000800)={r1, 0xb4, &(0x7f0000000740)=[@in6={0xa, 0x4e22, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x7fff}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e22, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x100}, @in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, @in6={0xa, 0x4e22, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, @in={0x2, 0x4e24, @broadcast=0xffffffff}, @in={0x2, 0x4e24}]}, &(0x7f0000000840)=0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000900)) gettid() r6 = getpgrp(0xffffffffffffffff) r7 = syz_open_procfs(r6, &(0x7f0000000980)="65650000000014") ioctl$LOOP_SET_STATUS(r7, 0x4c02, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x19, 0x0, "e3f3c75f9a07760a67211fc2ca14eebdc83dd118b7bc869a7e8dc91f47d65dab93d18ab66c4dbb52872aab57c778126d3d95dfe534f86d824b155165f83db123", "287be36cb7866e099579031e8c8dc968b64ad919951f90315a1af93e7fda65de", [0x6, 0x9d1]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r8 = open(&(0x7f0000000940)='./file1/file0\x00', 0x28000, 0x10) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r8, 0x84, 0x21, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r9 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r9, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf", [0x0, 0x10000000]}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r7, 0x4010640d, &(0x7f00000008c0)={0x0, 0x2000}) 2018/04/30 15:52:05 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x5a000000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000100)=0x14) recvmmsg(r1, &(0x7f0000007280)=[{{&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000001600)=[{&(0x7f0000000380)=""/47, 0x2f}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/208, 0xd0}, {&(0x7f00000014c0)=""/159, 0x9f}, {&(0x7f0000001580)=""/114, 0x72}], 0x5, &(0x7f0000001680)=""/4096, 0x1000, 0x9}, 0x8000}, {{&(0x7f0000002680)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000002700)=""/210, 0xd2}, {&(0x7f0000002800)=""/144, 0x90}, {&(0x7f00000028c0)=""/111, 0x6f}, {&(0x7f0000002940)=""/5, 0x5}, {&(0x7f0000002980)=""/119, 0x77}, {&(0x7f0000002a00)=""/150, 0x96}], 0x6, 0x0, 0x0, 0x3b93}, 0x10001}, {{&(0x7f0000002b40)=@pppoe={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000002bc0), 0x0, &(0x7f0000002c00)=""/2, 0x2, 0x4}, 0x20}, {{&(0x7f0000002c40)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003cc0)=[{&(0x7f0000002cc0)=""/4096, 0x1000}], 0x1, &(0x7f0000003d00)=""/252, 0xfc, 0x4}, 0x7fa70f4a}, {{&(0x7f0000003e00)=@hci, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003e80)=""/127, 0x7f}, {&(0x7f0000003f00)=""/232, 0xe8}, {&(0x7f0000004000)=""/73, 0x49}, {&(0x7f0000004080)=""/44, 0x2c}, {&(0x7f00000040c0)=""/135, 0x87}, {&(0x7f0000004180)=""/157, 0x9d}, {&(0x7f0000004240)=""/209, 0xd1}, {&(0x7f0000004340)=""/95, 0x5f}, {&(0x7f00000043c0)=""/97, 0x61}, {&(0x7f0000004440)=""/123, 0x7b}], 0xa, &(0x7f0000004580)=""/4096, 0x1000}, 0x5d}, {{&(0x7f0000005580)=@llc, 0x80, &(0x7f0000005840)=[{&(0x7f0000005600)=""/29, 0x1d}, {&(0x7f0000005640)=""/237, 0xed}, {&(0x7f0000005740)=""/233, 0xe9}], 0x3, &(0x7f0000005880)=""/213, 0xd5, 0x2}, 0x2}, {{&(0x7f0000005980), 0x80, &(0x7f0000006b80)=[{&(0x7f0000005a00)=""/15, 0xf}, {&(0x7f0000005a40)=""/42, 0x2a}, {&(0x7f0000005a80)=""/4096, 0x1000}, {&(0x7f0000006a80)=""/77, 0x4d}, {&(0x7f0000006b00)=""/102, 0x66}], 0x5, 0x0, 0x0, 0x4}, 0x6}, {{&(0x7f0000006c00)=@ethernet, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006c80)=""/24, 0x18}, {&(0x7f0000006cc0)=""/8, 0x8}, {&(0x7f0000006d00)=""/50, 0x32}, {&(0x7f0000006d40)=""/168, 0xa8}, {&(0x7f0000006e00)=""/64, 0x40}, {&(0x7f0000006e40)=""/67, 0x43}], 0x6, &(0x7f0000006f40)=""/138, 0x8a, 0x7f}, 0x7}, {{&(0x7f0000007000)=@in={0x0, 0x0, @broadcast}, 0x80, &(0x7f0000007240)=[{&(0x7f0000007080)=""/195, 0xc3}, {&(0x7f0000007180)=""/155, 0x9b}], 0x2, 0x0, 0x0, 0x3f}, 0x74}], 0x9, 0x10000, &(0x7f00000074c0)={0x77359400}) getpid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xa}}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x4e22, 0x7, 0x4e20, 0x40, 0x2, 0xa0, 0xa0, 0xbf, r2, r3}, {0x7, 0x938d, 0x0, 0x100, 0xf729, 0x7, 0x2, 0x400}, {0x6, 0x2, 0x4, 0x100}, 0x5, 0x6e6bb1, 0x2, 0x0, 0x2}, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4d4}, 0xa, @in=@multicast1=0xe0000001, 0x3505, 0x4, 0x1, 0x2, 0x9e2, 0x3, 0x6}}, 0xe8) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x80000, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000002bc0)) 2018/04/30 15:52:05 executing program 6: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000004000)={0x4, 0x0, &(0x7f0000000040)=[@enter_looper={0x630c}], 0x0, 0x0, &(0x7f00004c1000)}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0), 0x0, 0xc7d8}], 0x0, &(0x7f0000000800)=ANY=[]) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, "5568001510198d93ddffbf0cf07400"}, 0x2c) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007fd0)={0x0, 0x0, &(0x7f0000004000), 0x1, 0x0, &(0x7f000000d000)='b'}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000600)={0x80000002}) ftruncate(r0, 0x94a) mmap$binder(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000260000)}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000940)) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000005c0), &(0x7f00000007c0)=0xc) openat$cgroup_procs(r1, &(0x7f0000000680)='cgroup.procs\x00', 0x2, 0x0) [ 314.814126] device lo left promiscuous mode [ 314.844666] device lo left promiscuous mode 2018/04/30 15:52:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x0, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:05 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:05 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000b80)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) socket$inet(0x2, 0x80807, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = getuid() setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4e22, 0x81, 0x4e21, 0xfff, 0xa, 0xa0, 0x20, 0x32, r1, r2}, {0x80000001, 0x7fffffff, 0x2, 0x9, 0x1, 0x2, 0x0, 0x1}, {0x80000000, 0x15d5, 0xe3e, 0x80000000}, 0x200, 0x6e6bb6, 0x1, 0x1, 0x3, 0x1}, {{@in=@multicast1=0xe0000001, 0x4d4, 0x32}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x34ff, 0x3, 0x2, 0x20, 0x4, 0x7, 0x1f}}, 0xe8) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x3, 0x30, 0x5, 0x3}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000dc0)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000240)=0x107) signalfd(r0, &(0x7f0000000280)={0x401}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000000c0)=ANY=[@ANYRES32=r4, @ANYBLOB="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"], &(0x7f0000000a80)=0x33) write$binfmt_misc(r0, &(0x7f0000000f40)=ANY=[@ANYBLOB="d53f9ce83bfd126b66f8a5b926a78729ec9d519de458c0f1e15812bf4b2b9ceeff68ae5cda47594cb83286b76a5cfa961d0e717ed056bde5f4f616f36e854a1097b54b15e90fab584b259c717910aaf4"], 0x4) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000002c0), &(0x7f0000000b00)=0xc) 2018/04/30 15:52:05 executing program 0: r0 = memfd_create(&(0x7f00000005c0)="6465762046a80d01bed3c1e1c85fe2dbef94a677a99248217280a42d688043cc913ddb112187ee23355083fc8a1eed8f3d1a468b405da49550403420a5685e12afb758b1bfcf91d09bfe61b023e1b04f2f8e23a38e1ef575997d875079d8275500cf932de25ff116808e0097e9a30f89ffec73d758337ba4ecfe26e0709dceb3bc100af911f29826293f7e6d4cbbb7fa03189e2fd5b9461150c1f6c46be2eddd2f84ce8136164ee052fdf7c5919654885d693f6c70f42b0eef3f33160056b93855cb84bf62730fd9afe77c1b8d7b0b9dcc2a7566f6067be13c15bbbc440e796acc56b204c7f48fcdfa2e84e52a95", 0x3) write(r0, &(0x7f0000000240)='v', 0x1) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)={0x303, 0x33}, 0x4) fcntl$addseals(r0, 0x409, 0xa) sendfile(r0, r0, &(0x7f0000000000), 0x3) 2018/04/30 15:52:05 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xc0000, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)={'syz1'}, 0x4) 2018/04/30 15:52:05 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), 0x4) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) [ 315.242426] device lo entered promiscuous mode [ 315.343435] device lo left promiscuous mode [ 315.482307] device lo entered promiscuous mode [ 315.500218] device lo entered promiscuous mode [ 315.515256] device lo entered promiscuous mode [ 315.664994] device lo left promiscuous mode [ 315.688086] device lo left promiscuous mode [ 315.698678] device lo left promiscuous mode [ 315.768734] binder: 27735:27771 ioctl c0306201 20004000 returned -14 2018/04/30 15:52:06 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) socketpair(0x5, 0x6, 0x6, &(0x7f0000000340)) r2 = request_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0)='/dev/hwrng\x00', 0x0) keyctl$clear(0x7, r2) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x92000, 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x200, 0x100) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x440401, 0x0) r4 = openat(r3, &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x100) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000200)) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x3, 0xfffffffffffffffb, 0x100000000, 0xf2, 0x0, 0xfffffffffffffff7, 0x20200, 0x0, 0x4, 0x3f000000000000, 0x745c, 0x2, 0x0, 0x1, 0xfffffffefffffff7, 0x5, 0x2, 0x400, 0x3f, 0x3, 0xffffffff, 0xffffffff, 0xffffffff00000001, 0x20, 0x1ff, 0x200, 0x10000, 0x200, 0x120b5b81, 0x401, 0x2, 0x2, 0x86, 0x4, 0x7f, 0xfffffffffffffff8, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000280), 0x6}, 0x10000, 0xe88, 0x4, 0x2, 0x1488dbce, 0x100000000, 0x2}, r1, 0x2, r4, 0x3) syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x401, 0x2000) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x10000, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) capget(&(0x7f00000000c0)={0x399f1336, r1}, &(0x7f0000000180)={0x80000000, 0x0, 0x2, 0x10001, 0x3, 0x10001}) 2018/04/30 15:52:06 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x200000000, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:06 executing program 2: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000100)={0x0, @remote}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x44, r1}) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r2, &(0x7f0000000700)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000500)=@getlink={0x58, 0x12, 0x331, 0x0, 0x0, {}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f}, @IFLA_IF_NETNSID={0x8, 0x2e}, @IFLA_LINK_NETNSID={0x8, 0x25}, @IFLA_PROMISCUITY={0x8, 0x1e}, @IFLA_WEIGHT={0x8, 0xf}, @IFLA_VF_PORTS={0x10, 0x18, [{0xc, 0x1, [@typed={0x8, 0x0, @u32}]}]}]}, 0x58}, 0x1}, 0x0) 2018/04/30 15:52:06 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000134000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) socket(0x11, 0x4000000000080003, 0x0) epoll_create(0x81) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) pselect6(0x40, &(0x7f0000000000)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f0000a65ff8), 0x8}) 2018/04/30 15:52:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x0, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:06 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x0, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:06 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x0, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x0, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:06 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007d76e235bca597611052df0000000000000000000000000000f4ffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x758) times(&(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="27000000a6b2f55e555e34f5f1ad63003cc8d3ef52c5203b24944803cbcc282e823a000000000000000000"], &(0x7f0000000080)=0x2f) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0x5}, 0x8) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000180)={0x4, 0x1bd1, 0x3, 0x5, 0x0, 0x401}) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r1, 0x6}, 0x8) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000200)='/dev/pktcdvd/control\x00', 0x8200, 0x0) 2018/04/30 15:52:06 executing program 3: r0 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000040)='/dev/pktcdvd/control\x00', 0x60000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x8001}}, 0x6, 0x1, 0x7fffffff, 0x3}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r1, 0x81}, 0x8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r2, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r2, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:06 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:06 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000100)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a80)={'team0\x00', r1}) r4 = getuid() getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000b80)={@empty, 0x0}, &(0x7f0000000bc0)=0x14) fstat(r0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) seccomp(0x1, 0x1, &(0x7f0000000b00)={0x4, &(0x7f0000000ac0)=[{0x8, 0x1bee, 0x6, 0x20}, {0x71f, 0x6, 0x3f}, {0x10001, 0xc811, 0x20, 0x9}, {0x3ec, 0xb7c3, 0x67, 0xff}]}) sendmsg$nl_xfrm(r0, &(0x7f0000002100)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000020c0)={&(0x7f0000000c80)=@migrate={0x1404, 0x21, 0x300, 0x70bd2b, 0x25dfdbfd, {{@in=@broadcast=0xffffffff, @in6=@loopback={0x0, 0x1}, 0x4e21, 0x9, 0x4e22, 0x0, 0x0, 0xa0, 0xa0, 0x88, r1, r2}, 0x6e6bb8}, [@sa={0xe4, 0x6, {{@in=@multicast1=0xe0000001, @in=@multicast1=0xe0000001, 0x4e20, 0x1f, 0x4e21, 0x9, 0xa, 0x20, 0x20, 0x2, r3, r4}, {@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x4d5, 0x6f}, @in6=@mcast1={0xff, 0x1, [], 0x1}, {0x8001, 0x0, 0x100000001, 0x1, 0xffff, 0x6fabb0b5, 0x10001, 0x2}, {0xfe10, 0x2c8, 0x4, 0x1}, {0x3, 0x10001, 0x3}, 0x70bd2d, 0x0, 0xa, 0x3, 0x0, 0x1}}, @algo_auth_trunc={0xec, 0x14, {{'sm4\x00'}, 0x4f8, 0x0, "4d1a30ef91b254fa4d3ec72d0a2bb184912005a51f38ab578b2228cc2f2c012b8d9a773fda1ac195abef344e7fd4ee9c5a2cf63a781446580a5ba6fcbee72f56e5c273d7f5d95862bc76808f7577b7d126a84cbb4022e1d3278515c4602c75add34b6edc5134a51c3b7b2a918c8c9c00764c27fb5c4626d37b511e19d14fe31b99bad051bf1fed47215ea2f07acb670fa42b232e13bcc8292b33cc140108d7"}}, @address_filter={0x28, 0x1a, {@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0xa, 0x0, 0xfffffffffffffffe}}, @lastused={0xc, 0xf, 0xe2c}, @tfcpad={0x8, 0x16}, @algo_comp={0xb0, 0x3, {{'lzs\x00'}, 0x338, "5b6915758b5d9f0d784d4a807ac2dd0adde4b5828b70361882d411b5f859ff98ef0817a073c73ce20ca5f6879c3d2c50fdea29e1f7b5dbf2f38e13faead5f5aa7dfbe36347aebb964dab6df6ae5626d6aadd69e11e5ad727dfafb335870d9fe67a9beb9ba737c6"}}, @sec_ctx={0x100c, 0x8, {0x1008, 0x8, 0x1, 0xf36, 0x1000, "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"}}, @replay_thresh={0x8, 0xb, 0x3f}, @sa={0xe4, 0x6, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@multicast2=0xe0000002, 0x4e21, 0x0, 0x4e24, 0x19a, 0xa, 0x20, 0x0, 0x97, r5, r6}, {@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4d2, 0x32}, @in6, {0x9a3, 0xffffffffffffff01, 0x401, 0x5, 0x6, 0x80000000, 0x0, 0xfffffffffffffff8}, {0x9, 0x6, 0x67a, 0x10001}, {0xfb55, 0xdbc, 0x400}, 0x70bd2d, 0x3501, 0x0, 0x0, 0x3, 0x74}}]}, 0x1404}, 0x1}, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000f0288d972778573176988a63621e8bd2718c3118a2de0d6705907dfa8e03c716fcce9c0d01a3dce8515773224aebeffbbe9056613cf6e7182b14e6d01b0ffad58401b0f6"], 0x4) 2018/04/30 15:52:06 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000dffffff0000000000000000000020000000000008000000000000000000000000000000000000000000000000000000feffffff500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a4ec7c272b9a9f8893330000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 316.340450] device lo entered promiscuous mode 2018/04/30 15:52:06 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x1) sched_setscheduler(r1, 0x7, &(0x7f0000000040)=0x9) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[], 0xfffffffffffffd82) socket$nl_netfilter(0x10, 0x3, 0xc) 2018/04/30 15:52:06 executing program 0: mmap(&(0x7f0000048000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = getpid() sched_getattr(r0, &(0x7f0000000000), 0x30, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, &(0x7f000000b000)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x40041) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000080)="3bae2afb92fcd66a2aeb208032c9918b38badb5e446eca06444c5db8249b06af8eaed628164bfebe741a524a374312f4b427bb04e94777eb080b1b04c581e59b7048268e4e3cc57cf913ad5051c2511f5efec6406fa3c792b810cf30604c35f215e5947a648ef02171a8cefbaed7b9f3dfe331b10a5d0428beee509f600a9593255daa181ba8e5721d94b8a684f6ed28b2781f", 0x93) [ 316.421971] device lo left promiscuous mode [ 316.480001] device lo entered promiscuous mode [ 316.485643] device lo entered promiscuous mode [ 316.497250] device lo entered promiscuous mode [ 316.503741] device lo entered promiscuous mode [ 316.611560] device lo left promiscuous mode [ 316.627196] device lo left promiscuous mode [ 316.634625] device lo left promiscuous mode [ 316.647892] device lo left promiscuous mode 2018/04/30 15:52:07 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x40000) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='/dev/input/event#\x00', 0x10002) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@loopback=0x7f000001, @multicast1=0xe0000001, 0x0, 0x1, [@dev={0xac, 0x14, 0x14, 0xa}]}, 0x14) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) write$sndseq(r3, &(0x7f0000000400)=[{0x4, 0x800, 0x3, 0x101, @time, {0x9c3b, 0x53}, {0x2, 0xffff}, @raw32={[0x1, 0x9, 0x8001]}}, {0x0, 0x7, 0x3f, 0x5, @time={0x0, 0x989680}, {0x10000, 0x3}, {0x0, 0x1}, @raw32={[0x10001, 0x1, 0x4]}}, {0x7, 0x7f, 0xfffffffffffff30b, 0x1, @time={r4, r5+10000000}, {0x8001}, {0x7, 0x28}, @quote={{0x9, 0x1}, 0x7, &(0x7f00000001c0)={0x5, 0x1ff, 0x8, 0x8, @tick, {0x7, 0x8}, {0x80, 0x80}, @raw32={[0x2, 0x4, 0xfffffffffffffff9]}}}}, {0x200, 0xfffffffffffffffd, 0x9, 0x5, @time, {0x100000000, 0x7}, {0x80000000, 0x4}, @queue={0x3e, {0x3, 0x7de}}}, {0xfffffffffffff3e2, 0x6f7, 0x9, 0x7, @time={0x77359400}, {0x5, 0x7f}, {0xb48a, 0x19ea}, @queue={0x101, {0x0, 0x8}}}, {0x0, 0x8, 0x0, 0x1ff, @time={r6, r7+30000000}, {0x4, 0x6}, {0x40, 0x6d}, @quote={{0x5, 0xff}}}, {0x0, 0x7ff, 0x1, 0x26, @time={r8, r9+10000000}, {0x0, 0x80}, {0x8}, @control={0xc18d, 0x5, 0x101}}, {0x7, 0xffffffffffffbe04, 0x74874061, 0x9, @time={0x0, 0x1c9c380}, {0x5, 0x10001}, {0x0, 0x10000}, @note={0x9, 0x6, 0x9, 0x3ff, 0x5}}, {0x54e0, 0xffffffffffffac3f, 0x7, 0x100000000, @tick=0x1, {0x9}, {0x8000, 0xa900000000000000}, @result={0x7, 0x4}}, {0x1ff, 0x9, 0x7, 0x7fffffff, @tick, {0x5, 0x40}, {0x3, 0x3}, @addr={0x4, 0x1}}], 0x1e0) tkill(r1, 0x1000000000015) 2018/04/30 15:52:07 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x100, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[], 0x1fd) 2018/04/30 15:52:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x0, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:07 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x80, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000002000)=""/4096) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000040)='/dev/pktcdvd/control\x00', 0x200100, 0x0) getdents64(r2, &(0x7f0000000080)=""/141, 0x8d) sendmsg$nl_xfrm(r1, &(0x7f0000001000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000001ff0)={&(0x7f0000006e58)=@newpolicy={0xc4, 0x13, 0x421, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@sec_ctx={0xc, 0x8, {0x8, 0x8}}]}, 0xc4}, 0x1}, 0x0) 2018/04/30 15:52:07 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000180)='stat\x00') setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) preadv(r0, &(0x7f0000000100), 0x0, 0x103fffff) 2018/04/30 15:52:07 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:07 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x0, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x0, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x0, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:07 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) fallocate(r0, 0x57377194fde23f13, 0x4, 0x9) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:07 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x81, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x0, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:07 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009f0000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:07 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005facb73e9703000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e6280d0c13801ca985c9ea000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003b3f3267c5f36daeeb228ae531d4c95708815e58e33d6a3b8dd69023e93b6f5d8944b4386b000d117debea617eb97cbe5d164b1914d176de1e543c9e994c5070000000000000000000000000000"], 0x758) ioctl$int_in(r1, 0x5473, &(0x7f0000000080)=0x6) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)=0xffff) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x2040, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00', 0x1400) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='-@{2'], 0x4) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)="65612300b83d0fc57586d39b8add055d9ce51162c047d9319e8e06e7f93b7b0eecb5cc6506bfd25937761a3b678aadfe80d769f8906b7e9f837bb9bc661a289a8277c05e5b9dcfcb67e4607e08de16b5d1052823523fc54cdaceb7668a56336b550fc072ed4e117aa63e674058f5cc97e556db540bfeb947482f6ccfb45b35ce4c65ae81a029", 0x86}], 0x1, 0x0) 2018/04/30 15:52:07 executing program 3: syz_mount_image$vfat(&(0x7f0000001780)='vfat\x00', &(0x7f00000017c0)='./file0\x00', 0x7e, 0x3, &(0x7f0000001940)=[{&(0x7f0000001800)="1824256c14e4d698dbbdca02f98206b1dd80334c018944a127536017741deea636a5cd0ba0dc69abb5cf9f96f8020d8d4c0633bb97", 0x35, 0x80000001}, {&(0x7f0000001840)="4b22a57764e4af1a35566c2e9b3549841ae5f6e81878cd437667c1bcb404c4bc533aec96b7520b69c119a95ffdf8a058f9db875bfe94b4bfb9f744e60fa5ba3a139386a0a3f2b01f3cea5af9582f6528f384d0b9fa543a541b3c0ad8b6f45e3f8e212e7ac1e490c064224fd6cfc4083fcf5ed62628c6de27b43b458527efcf0ea917c6b94e78a242d6b3841d41f425dd82216498f34ac8b6fed0dad108bfad350747ab70a98cf48d7573266f6ab5e78fae57e971309daa230cfa354f5119c9", 0xbf, 0x9}, {&(0x7f0000001900)="ab01fff7bf700aeaccbe2d4121662c", 0xf, 0x1}], 0x1000, &(0x7f00000019c0)={[{@allow_utime={'allow_utime', 0x3d, [0x36, 0x36, 0x31, 0x33]}, 0x2c}, {@errors_continue='errors=continue', 0x2c}, {@dmask={'dmask', 0x3d, [0x30]}, 0x2c}, {@umask={'umask', 0x3d, [0x31]}, 0x2c}]}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000038000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffec0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f9ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) accept4(r0, &(0x7f0000001040)=@ax25, &(0x7f00000010c0)=0xfffffffffffffeaa, 0x80000) r1 = fcntl$getown(r0, 0x9) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() r4 = getpgrp(0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000001740)=0x10000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000001280)='jfs\x00', &(0x7f00000012c0)='./file0\x00', 0xfff, 0x6, &(0x7f0000001600)=[{&(0x7f0000001300)="65c939257d5958a027d2b3cc32e82d8657eeb0c2bd8e248e0aad2b4244f927cf48c61fdc7402386dc05aeab598510e8dc30f54debf0251aa8a5f71699a8a92935fb372cecbc854909907cc381a7e9b7a1341e222629b4c4c14918d98da8110970b53a05a81c180835c7963f73f5cbd75cf04d20a0c5a66009bf2d4997c5a240cb6a87dd2263b38f6832ae655cc10aea8c894a5a5ec4c6c5f251a0f83c7746c32c98d0714f76323f9df11", 0xaa, 0xfe}, {&(0x7f00000013c0)="1ea80dbf2214194bb40a3c4bf5fcfb96cecfff7cc133ec3f498bfa89c0d34a9baa8b89fa5b43402e66634ea7a0eff630", 0x30, 0x562}, {&(0x7f0000001400)="71ffc22e3546d9dd1e480437e26705e9d9a22555710877c17ec40862e4934973067bbb2b495ad359158cca8c4d4cac7fb4e19b1619a382c10e844b52a6a47846bebf768d32eb46b3b1c41b63849102f1e01c5bc26e7fbd40417e911ef4c8b8f61f4a21efa38f756c569f98549d6760db18808f74c9e3fbcdd3b8eabeff3cdbc79a0add64d0f7156e6b1cd34573e26313332e63273d5e302452dffc28", 0x9c, 0x1}, {&(0x7f00000014c0)="4e5b7de1b5a7de43565737e4a58f93eb1e009c4b25aa652381fa73968a893a849e0cd18412932256147f44660ab926493c0e7c6042f52fdea18b608c7df8c2ca9a80fd50387aa131b531a4b8412bf15fe584728e15ab2759b4f99bddb9f7d6b672aed7dc9b22d233734e8a8667e187616af5e75a2535b645ada3694fb9800844f09a21833c6a45577672beaf145e701bb41162e92935bf9b01a5e13f57ec6bf296a972453ddeb9b5a3d76593f42930569a722076", 0xb4, 0x81}, {&(0x7f0000001580)="859d68ccbd714a2212fc5b", 0xb, 0x7}, {&(0x7f00000015c0)="c3", 0x1, 0x6}], 0x4, &(0x7f00000016c0)={[{@discard_size={'discard', 0x3d, [0x35, 0x7d, 0x36, 0x37, 0x3f, 0x0]}, 0x2c}, {@uid={'uid', 0x3d, [0x33, 0x34]}, 0x2c}, {@resize='resize', 0x2c}, {@umask={'umask', 0x3d, [0x35, 0x39]}, 0x2c}, {@errors_remount='errors=remount-ro', 0x2c}, {@discard='discard', 0x2c}]}) r7 = accept(0xffffffffffffffff, &(0x7f0000000c00)=@ethernet={0x0, @local}, &(0x7f00000002c0)=0x80) fcntl$getownex(r0, 0x10, &(0x7f0000000c80)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000dc0)=0xe8) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)=0x0) execve(&(0x7f0000001100)='./file0\x00', &(0x7f0000001180)=[&(0x7f0000001140)='trusted,[*\x00'], &(0x7f0000001240)=[&(0x7f00000011c0)="4073656375726974793af8766d6e65743100", &(0x7f0000001200)='vboxnet0\x00']) sendmsg$unix(r0, &(0x7f0000001000)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f00000000c0)="f9c8b1e6fbaf7a1948b8c12b8aaf87c9bc9b0cf7e88082e47e09e48cac9af4650abb2894d5ce65d874580ebb623ae8d480d9e48a8e9794e0b0224ed8975a49459aed84a0e47f11b762e407af69d0f2ef0dea85ece3f6e2e116cd709d1807b06e90dc674d32f5ab84ac0115692eeb1d2ad35dc28dc38116", 0x77}], 0x1, &(0x7f0000000ec0)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r7, r0, r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0x130, 0x4084}, 0x10) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 2018/04/30 15:52:08 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) timerfd_create(0x5, 0x80000) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) getsockname$packet(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x14) connect$packet(r0, &(0x7f00000000c0)={0x11, 0x6, r1, 0x1, 0x6, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xf}}, 0x14) [ 317.696165] device lo entered promiscuous mode [ 317.701790] device lo entered promiscuous mode [ 317.709010] device lo entered promiscuous mode [ 317.714963] device lo entered promiscuous mode [ 317.720789] device lo entered promiscuous mode [ 317.752652] device lo left promiscuous mode [ 317.799493] device lo entered promiscuous mode [ 317.848785] device lo left promiscuous mode [ 317.861121] device lo left promiscuous mode [ 317.867089] device lo left promiscuous mode [ 317.872167] device lo left promiscuous mode [ 317.879630] device lo left promiscuous mode 2018/04/30 15:52:08 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet6_dccp_int(r3, 0x21, 0xe, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) fchmod(r2, 0x140) tkill(r1, 0x1000000000015) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000140)={0x3, 0xd8, 0x101, 0x3f, 0xf7b7, 0x2}) 2018/04/30 15:52:08 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ddc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000001600)=[{&(0x7f00000013c0)}], 0x0, &(0x7f0000000180)) 2018/04/30 15:52:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x0, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) accept(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) acct(0x0) prctl$setendian(0x14, 0x2) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20a000, 0x1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000100)={0x0, 0x40000, 0xfffffffffffffc6d, {0x0, 0x1c9c380}, 0x8, 0x101}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f00000001c0)={0x6, 0xffffffff, 0x3bc7, {r2, r3+10000000}, 0x6, 0x7}) 2018/04/30 15:52:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x0, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:08 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000237fee)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000480), 0x252) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x51, 0x800) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000040)=0x2, 0x4) 2018/04/30 15:52:08 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x0, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:08 executing program 0: prlimit64(0x0, 0x8, &(0x7f00000000c0)={0xfffffffffffffffd, 0xffffffffffffffff}, 0x0) mlockall(0x1) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000040)=0xffffffff) 2018/04/30 15:52:08 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x2c, &(0x7f0000000040)=[@in={0x2, 0x4e20, @loopback=0x7f000001}, @in6={0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x401}]}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000100)={r1, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x84) 2018/04/30 15:52:08 executing program 1: mkdir(&(0x7f0000000980)='./file0/file0\x00', 0x10) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000cde000)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/1679, 0x68f) getdents(r0, &(0x7f0000000880)=""/232, 0xe8) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') getdents(r0, &(0x7f00000000c0)=""/171, 0xab) 2018/04/30 15:52:08 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0xb510, &(0x7f0000000080)=0x4) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:08 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r1, 0x7}, &(0x7f0000000100)=0x8) 2018/04/30 15:52:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x44000, 0x2) r2 = fcntl$getown(r1, 0x9) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000240)=r2) lseek(r0, 0x44, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000340)=0x9e0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000780)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f00000007c0), &(0x7f0000000800)=0xb) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) restart_syscall() sendmmsg(r4, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3f}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYBLOB="1f00b20013be147ff9737959706d8aad160baa267a0f39f3a7e1b899b8f1adde23293bd2a1260fb04ce4d3a3acdc85f27f0001558667c4ce9fe15a84cf67f146df6c6ccbdadd9df95cfc7c5863974ac32967038497a0471f039b84a17b9eb0e7c1e4d4914ea517a5f5fbcd58c28cb700a5e6c4f1db39f4fda3d93a7a564c7de85c6e04f321b3886c76d6d300b613707befcff0c81ca7068450cccad28e6d8d3a359c277f157c6943f5815cc9813e7f0f2b99ef4701c5e1"], 0xba) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/245) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bond0\x00') socketpair$ax25(0x3, 0x3, 0xcc, &(0x7f0000000280)) 2018/04/30 15:52:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000140)={0x5, 0x6, 0x3}) prlimit64(r1, 0x6, &(0x7f0000000040)={0x200000000, 0x9145}, 0x0) listen(r0, 0x7fffffffffffc) getegid() r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x400000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f00000000c0)) 2018/04/30 15:52:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) r1 = accept$ax25(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)=0x10) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000100)={0x80000005}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r2, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) [ 318.257062] device lo entered promiscuous mode [ 318.274175] device lo entered promiscuous mode [ 318.284797] device lo entered promiscuous mode [ 318.411448] device lo left promiscuous mode [ 318.424339] device lo left promiscuous mode [ 318.435808] device lo left promiscuous mode 2018/04/30 15:52:09 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [], "", [[], [], [], [], [], [], []]}, 0x738) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:09 executing program 0: prlimit64(0x0, 0x8, &(0x7f00000000c0)={0xfffffffffffffffd, 0xffffffffffffffff}, 0x0) mlockall(0x1) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000040)=0xffffffff) 2018/04/30 15:52:09 executing program 1: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000340)={[{@cruft='cruft', 0x2c}]}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x246000, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 2018/04/30 15:52:09 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) mlockall(0x2) getpgid(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) 2018/04/30 15:52:09 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x44000, 0x2) r2 = fcntl$getown(r1, 0x9) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000240)=r2) lseek(r0, 0x44, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000340)=0x9e0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000780)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f00000007c0), &(0x7f0000000800)=0xb) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) restart_syscall() sendmmsg(r4, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3f}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYBLOB="1f00b20013be147ff9737959706d8aad160baa267a0f39f3a7e1b899b8f1adde23293bd2a1260fb04ce4d3a3acdc85f27f0001558667c4ce9fe15a84cf67f146df6c6ccbdadd9df95cfc7c5863974ac32967038497a0471f039b84a17b9eb0e7c1e4d4914ea517a5f5fbcd58c28cb700a5e6c4f1db39f4fda3d93a7a564c7de85c6e04f321b3886c76d6d300b613707befcff0c81ca7068450cccad28e6d8d3a359c277f157c6943f5815cc9813e7f0f2b99ef4701c5e1"], 0xba) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/245) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bond0\x00') socketpair$ax25(0x3, 0x3, 0xcc, &(0x7f0000000280)) 2018/04/30 15:52:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x0, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:09 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x0, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x0, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x44000, 0x2) r2 = fcntl$getown(r1, 0x9) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000240)=r2) lseek(r0, 0x44, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000340)=0x9e0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000780)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f00000007c0), &(0x7f0000000800)=0xb) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) restart_syscall() sendmmsg(r4, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3f}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYBLOB="1f00b20013be147ff9737959706d8aad160baa267a0f39f3a7e1b899b8f1adde23293bd2a1260fb04ce4d3a3acdc85f27f0001558667c4ce9fe15a84cf67f146df6c6ccbdadd9df95cfc7c5863974ac32967038497a0471f039b84a17b9eb0e7c1e4d4914ea517a5f5fbcd58c28cb700a5e6c4f1db39f4fda3d93a7a564c7de85c6e04f321b3886c76d6d300b613707befcff0c81ca7068450cccad28e6d8d3a359c277f157c6943f5815cc9813e7f0f2b99ef4701c5e1"], 0xba) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/245) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bond0\x00') socketpair$ax25(0x3, 0x3, 0xcc, &(0x7f0000000280)) [ 319.934481] device lo entered promiscuous mode [ 319.946694] device lo entered promiscuous mode [ 319.963308] device lo entered promiscuous mode [ 320.085338] device lo left promiscuous mode [ 320.099492] device lo left promiscuous mode [ 320.105465] device lo left promiscuous mode 2018/04/30 15:52:11 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xffffffffffffffff, 0x0) r1 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) getgroups(0x7, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={r1, r2, r3}, 0xc) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) getsockopt$ax25_buf(r0, 0x101, 0x19, &(0x7f0000000280)=""/72, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r4, 0x9, 0x551f, 0x1}, &(0x7f0000000100)=0x10) readahead(r0, 0x6, 0x800000000) connect$inet(r0, &(0x7f0000000240)={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/04/30 15:52:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x0, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:11 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x4000000) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0xc0105303, &(0x7f0000c9dfb0)={{0x0, 0x80}, {}, 0xfffffffffffffffd}) r1 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080)='/dev/snd/seq\x00', 0xfffffffffffffffc) keyctl$describe(0x6, r1, &(0x7f00000001c0)=""/215, 0xfffffffffffffde1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x100, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000100)=0x1) 2018/04/30 15:52:11 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x238280, 0x0) fstat(r1, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) fcntl$getflags(r2, 0x408) sendmsg$nl_netfilter(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1100010}, 0xc, &(0x7f0000000300)={&(0x7f0000001880)=ANY=[@ANYBLOB="c81200000006000426bd7000fcdbdf250300000664008e0008000a00"], 0x1c}, 0x1}, 0x8000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockname$netlink(r2, &(0x7f0000001800), &(0x7f0000001840)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000380)) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f00000003c0)=""/27) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000500)={{0x0, 0x10001}, {0x17d, 0x81}, 0x8, 0x2, 0x4}) 2018/04/30 15:52:11 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x0, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x0, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x4d) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x2, @in=@broadcast=0xffffffff, 0x0, 0xfffffffffffffffe, 0x0, 0x9}}, 0xe8) ioctl$int_in(r1, 0x5421, &(0x7f0000000140)=0x171a) tee(r2, r0, 0x100000000000, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f00000004c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) dup(r0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763892c38ac6568b3e891941f02f1265047502f6c2dd9f65572005da7147991090bef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c379723f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a4503c1c147cc5172df09c10eea22b1fcfb05ab850fb1fa7d86e5d217d4a59a70ba6ccaa8343014d5cbdf9cec8b13073ffe66b7490e5dc8a2ff8d0bc42cf8a84fdee6") execve(&(0x7f0000000600)='./file0\x00', &(0x7f0000000840), &(0x7f0000000900)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) setsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f0000000480)=0x8000, 0x4) mount(&(0x7f0000000500)='./file0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='aufs\x00', 0x8000, 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)="00000000cb19", 0x80000, 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000640)="7c78a4601812ec111f92686bd00e0d5d7400", 0x4000000003080, &(0x7f00000006c0)="862d6ca7cd67ea80ab0ef0d15b491757da95b337abf262ffe271cd0cc17269fb00fdaebcbb55e72926d8238c8b36beb3a9ea1d28cc000000000000000000") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/04/30 15:52:11 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7ff, 0x58, 0x4, 0x20, 0xffffffff, 0x3, 0x6, 0x1, 0x9b, 0x40, 0x2ca, 0xfffffffffffffffa, 0x3, 0x38, 0x2, 0x1, 0x9, 0x7}, [{0x60000007, 0x0, 0x3, 0x5, 0x6, 0x1, 0x6, 0x9}], "8e393f682009a03fbbde08715a", [[], [], [], [], [], []]}, 0x685) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000200)=[{{0x77359400}, 0x0, 0x8, 0x8d1}, {{r1, r2/1000+10000}, 0x3, 0xac63, 0x7}, {{r3, r4/1000+30000}, 0x0, 0x401, 0x8}, {{r5, r6/1000+30000}, 0xe8f, 0x3, 0x3626}, {{r7, r8/1000+30000}, 0xc4, 0x8001}, {{0x77359400}, 0x4e36, 0xfffffffffffffff7, 0x1ff}], 0x90) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r9 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r10, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x80000001, 0x0, 0x8, 0x9}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r10, 0x84, 0x13, &(0x7f0000000340)={r11, 0xff}, &(0x7f0000000380)=0x8) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r9, 0x1000000000015) getsockopt$inet_sctp6_SCTP_MAX_BURST(r10, 0x84, 0x14, &(0x7f0000000ac0)=@assoc_value, &(0x7f0000000b00)=0x8) 2018/04/30 15:52:11 executing program 0: r0 = inotify_init1(0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) ptrace$getenv(0x4201, r2, 0x0, &(0x7f00000001c0)) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000004c0)={0x0, 0x0}) keyctl$join(0x1, &(0x7f0000000040)={0x73, 0x79, 0x7a}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4205, r3) ptrace$setopts(0x4200, r3, 0x8000, 0x34) add_key(&(0x7f0000000080)="d65bb4ad000000000000000000000000000000000000000000", &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x3b0, 0xffffffffffffffff) ptrace(0x11, r3) 2018/04/30 15:52:11 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000100)={r1, 0x97e}, 0x8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x28100, 0x0) write$binfmt_elf32(r2, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r2, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:11 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x400, 0x0) restart_syscall() write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 321.199710] device lo entered promiscuous mode 2018/04/30 15:52:11 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x402000, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000020000000000000000000000000200000000000000380000000000000000000000000020000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f1ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1) fallocate(r0, 0x1, 0x0, 0x1) 2018/04/30 15:52:11 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2000000088) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="315afe2b2b5707784eaf84463749f086a25501de16cd06550da241fe751913c32b5dbf12bddc447a841578ff349739aa83fdc5c9e1cf", 0x158, 0x8084, &(0x7f0000000100)={0x2, 0x104e20}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x2, 0xfffffffffffffe16) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000b32fff)}}, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x1000000000000002, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r2, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = getpgid(r1) fcntl$setown(r2, 0x8, r4) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20}, 0xfffffffffffffea5) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x82000, 0x0) getsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, &(0x7f0000000040), 0x2) setsockopt$inet_tcp_int(r3, 0x6, 0xa, &(0x7f0000df1000)=0x6, 0x4) r6 = dup(r3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xffffffffffffff6b) ioctl$EVIOCGPROP(r6, 0x80404509, &(0x7f0000000200)) sendto$inet(r3, &(0x7f0000000080)="b276dd17d99d6075bcf5f2410d661bd95966", 0x12, 0x20008045, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) accept4(0xffffffffffffffff, 0x0, &(0x7f0000213ffc), 0x0) getpeername$unix(r6, &(0x7f000062efeb), &(0x7f0000d0a000)=0x6e) read(0xffffffffffffffff, &(0x7f0000002740)=""/4096, 0xfffffffffffffff7) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket(0x4000, 0x400004, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000504000)={&(0x7f0000078ff4)={0x10}, 0xc, &(0x7f000009b000)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername$unix(r6, &(0x7f00000001c0), &(0x7f0000000280)=0xfffffd5a) mmap(&(0x7f0000aa7000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000aa7000)='coredump_filter\x00') sendfile(r6, r7, 0x0, 0xef5d) 2018/04/30 15:52:11 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000038000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x758) madvise(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x2) madvise(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x2) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 321.280670] device lo left promiscuous mode 2018/04/30 15:52:11 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r1, 0x820, 0x70bd2c, 0x25dfdbfe, {0x11}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6}]}, 0x30}, 0x1}, 0x40000) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000c00)={'syz1', "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"}, 0xffffffffffffffbd) 2018/04/30 15:52:11 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000038000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x758) madvise(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x2) madvise(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x2) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:11 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x238280, 0x0) fstat(r1, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) fcntl$getflags(r2, 0x408) sendmsg$nl_netfilter(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1100010}, 0xc, &(0x7f0000000300)={&(0x7f0000001880)=ANY=[@ANYBLOB="c81200000006000426bd7000fcdbdf250300000664008e0008000a00"], 0x1c}, 0x1}, 0x8000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockname$netlink(r2, &(0x7f0000001800), &(0x7f0000001840)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000380)) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f00000003c0)=""/27) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000500)={{0x0, 0x10001}, {0x17d, 0x81}, 0x8, 0x2, 0x4}) [ 321.448744] device lo entered promiscuous mode [ 321.498104] device lo left promiscuous mode 2018/04/30 15:52:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x0, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:12 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000c7fdffff00000000000000000000200000000000fdff000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001d1a8ec9ccebd88e377bc961bc5132b2a6bce600def44b43d5d6591d8d23ca3057220be26e98b1a22aa9efe7cbf88fce846492383f042c6d12c618af504c8b2906d16ac9a7bcc4339c1f8f414be86e625e1608dfd30416b614b548fc9112ea468ea232f9"], 0x738) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000040)={0x1d9, 0x70fb, 0x2, 0xd387, 0x6, 0xffffffffffffffff}) socket$packet(0x11, 0x3, 0x300) 2018/04/30 15:52:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6(0xa, 0x6, 0x80000000, &(0x7f0000000000)) fcntl$lock(r1, 0x7, &(0x7f0000002000)) unshare(0x400) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80000, 0x0) openat(r2, &(0x7f0000000080)='./file0\x00', 0x101001, 0x20) r3 = gettid() fcntl$lock(r1, 0x7, &(0x7f0000010000)={0xfffffffffffffffd, 0x0, 0x3, 0x0, r3}) dup3(r0, r1, 0x0) [ 322.468603] device lo entered promiscuous mode [ 322.473348] device lo entered promiscuous mode [ 322.478030] device lo entered promiscuous mode [ 322.482694] device lo entered promiscuous mode [ 322.492868] device lo left promiscuous mode [ 322.507453] device lo left promiscuous mode 2018/04/30 15:52:13 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x88) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x8, 0x80000001, 0xc4, 0x3f, 0x101, 0x100000001, 0x1000, {0x0, @in={{0x2, 0x4e22, @loopback=0x7f000001}}, 0x8000, 0x3, 0x1a3c, 0x9, 0x3f}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e23, 0x81, @empty, 0xd599}}, 0x3, 0x7ff, 0x8001, 0x7}, &(0x7f00000001c0)=0x98) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x490802, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000340)=0x0) syz_open_procfs$namespace(r3, &(0x7f0000000380)='ns/mnt\x00') sendmsg$inet_sctp(r0, &(0x7f00000045c0)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000004500)=[{&(0x7f0000002200)="6cce85", 0x3}, {&(0x7f0000004300)="9f", 0x1}, {&(0x7f0000004440)='\'', 0x1}], 0x3}, 0x8004) flistxattr(r2, &(0x7f00000002c0)=""/126, 0x7e) getsockopt$inet6_dccp_int(r0, 0x21, 0x5, &(0x7f0000000240), &(0x7f0000000280)=0x4) sendto$inet6(r0, &(0x7f0000b0cf6e), 0x3dc, 0x0, &(0x7f000001b000)={0xa}, 0x1c) 2018/04/30 15:52:13 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r1, 0x400, 0x70bd2d, 0x25dfdbff, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x181}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8a3}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x10) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0x2}, [@RTA_DST={0x8, 0x1, @local={0xac, 0x14, 0x14, 0xaa}}]}, 0x24}, 0x1}, 0x0) 2018/04/30 15:52:13 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x238280, 0x0) fstat(r1, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) fcntl$getflags(r2, 0x408) sendmsg$nl_netfilter(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1100010}, 0xc, &(0x7f0000000300)={&(0x7f0000001880)=ANY=[@ANYBLOB="c81200000006000426bd7000fcdbdf250300000664008e0008000a00"], 0x1c}, 0x1}, 0x8000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockname$netlink(r2, &(0x7f0000001800), &(0x7f0000001840)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000380)) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f00000003c0)=""/27) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000500)={{0x0, 0x10001}, {0x17d, 0x81}, 0x8, 0x2, 0x4}) [ 322.518475] device lo left promiscuous mode [ 322.544440] device lo left promiscuous mode [ 323.032287] device lo entered promiscuous mode [ 323.054676] device lo entered promiscuous mode [ 323.074140] device lo left promiscuous mode 2018/04/30 15:52:13 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) recvfrom$ax25(r2, &(0x7f0000000140)=""/156, 0x9c, 0x2000, 0x0, 0x0) tkill(r1, 0x1000000000015) 2018/04/30 15:52:13 executing program 7: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='sessionid\x00') ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000080)=0x2) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000140)=0xfff, 0x4) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f00000001c0)={0x7, 0x5}) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000200)={0x64, 0x9}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000002c0)=0xb7, 0x4) mkdirat(r1, &(0x7f0000000300)='./file0\x00', 0x80) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000380)={0x10000, {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x200, 0x80, 0x6, 0x8, 0x85, &(0x7f0000000340)='vcan0\x00', 0xf39, 0x2000400000, 0x2}) linkat(r1, &(0x7f0000000400)='./file0/file0\x00', r1, &(0x7f0000000440)='./file0\x00', 0x1400) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000480)={'team_slave_1\x00', 0x9}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000004c0)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x1000}) setsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000540)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000600)={0x0, 0xf5, "50da039d361ba8e60c395a5cb66b0925ae26c58bf1e5e36285e545be00e5171d1cbc415014d35a88c9f519eacc1b29a0148ef6668963e2e4caa028a07a697164f3ab7ef4fa9738ea55b7959c175a5522396354b45d211493b077d592e42f7f5337e914fdd6568595b08a0312fe2ede6fe73c12f0b59cf3157885099b1659b6106b4bb8a12afd25c561afde0a8f02e5971d3168fd7f0324d03d5a90dcf11fd560b592c87e69e590fca00d26f545a97d4d559096dd2b01fa9a6691b9dc2533b4fd8fc03c086035f3f775ead5ffb340002d186b46a882ad5ab17f08889c9ebad196c0c50779a4e7bb87929b9c00b526c08813aa7666ba"}, &(0x7f0000000700)=0xfd) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000740)=@sack_info={r3, 0x4, 0x100000001}, &(0x7f0000000780)=0xc) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f00000007c0)="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", 0xff) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000008c0)={0xff, 0x5f, 0x1}) mkdirat(r1, &(0x7f0000000900)='./file0/file0\x00', 0x0) r4 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000980)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r4) ptrace$pokeuser(0x6, r0, 0xc54, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000009c0)={{0x2, 0x4e22, @loopback=0x7f000001}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x72, {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 'veth1_to_bridge\x00'}) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000a40)) prctl$seccomp(0x16, 0x1, &(0x7f0000000ac0)={0x7, &(0x7f0000000a80)=[{0xfffffffffffffffc, 0x19, 0x71b, 0x3}, {0xfff, 0x2, 0x0, 0x6}, {0x7, 0x3f, 0x7, 0x7}, {0x200, 0x6, 0x9, 0x42}, {0x0, 0x100, 0x7}, {0x7f, 0x3, 0x1, 0x3f}, {0x80, 0x7fffffff, 0xfffffffffffffffa, 0x6b}]}) close(r1) keyctl$invalidate(0x15, r4) 2018/04/30 15:52:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x0, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x0, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:13 executing program 6: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) r1 = socket(0xb, 0xf, 0x1) sendto$ax25(r1, &(0x7f0000000140), 0x0, 0x20000000, &(0x7f0000000040)={0x3, {"65a21c61a839d6"}, 0x6}, 0x10) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x2, 0x0) preadv(r1, &(0x7f00000014c0)=[{&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000002c0)=""/73, 0x49}, {&(0x7f00000001c0)=""/39, 0x27}, {&(0x7f0000000340)=""/106, 0x6a}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x5, 0x0) ioctl$TIOCSBRK(r2, 0x5427) fcntl$getownex(r1, 0x10, &(0x7f00000015c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x40000, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x1, 0x3, 0xfffffffffffffffd, 0x6, 0x9, 0x5, 0x8, 0x4, 0x7, 0x99, 0x8000, 0x6, 0xae, 0xb5, 0x8000, 0x0, 0x7, 0x7, 0x2, 0xfffffffffffffff8, 0xf7a, 0xfffffffffffffff7, 0x8, 0x1, 0x2639, 0x24ce732f, 0xff, 0x22, 0x9, 0xe35, 0x0, 0xfff, 0x2, @perf_config_ext={0x0, 0x1000}, 0x11001, 0x7, 0x3, 0x7, 0x1, 0xe5, 0x3edf}, r3, 0x6, r0, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0004000000100000cc000000490b0000ec03000001000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000011a00)="0000000000000000000000000000000000000000000000000000000074800000ed41000000040000e95dbe5ae95dbe5ae95dbe5a00000000000005000200000000000800000000000af301000400000000000000000000000100000023", 0x5d, 0x10860}], 0x0, &(0x7f0000012f00)) truncate(&(0x7f0000000440)='./file0//ile0\x00', 0xffff) rename(&(0x7f0000000080)='./file0//ile0\x00', &(0x7f00000003c0)='./file0\x00') 2018/04/30 15:52:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6(0xa, 0x6, 0x80000000, &(0x7f0000000000)) fcntl$lock(r1, 0x7, &(0x7f0000002000)) unshare(0x400) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80000, 0x0) openat(r2, &(0x7f0000000080)='./file0\x00', 0x101001, 0x20) r3 = gettid() fcntl$lock(r1, 0x7, &(0x7f0000010000)={0xfffffffffffffffd, 0x0, 0x3, 0x0, r3}) dup3(r0, r1, 0x0) 2018/04/30 15:52:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x80002, 0x0) r1 = gettid() ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x1ff, 0x80, 0x5, 0xc9f, 0x1000, r1}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000000001, 0x0) write$binfmt_elf32(r2, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r2, &(0x7f0000000200)={'syz1'}, 0x4) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) 2018/04/30 15:52:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) openat$cgroup_int(r0, &(0x7f00000001c0)='cpuacct.usage\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = socket(0xa, 0x2, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r1, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) fallocate(r2, 0x0, 0xffff, 0x1f) connect$inet(r1, &(0x7f0000000180)={0x2, 0x2000000004e22, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) sendfile(r1, r2, &(0x7f0000000080), 0xfffb) getsockname$netlink(0xffffffffffffffff, &(0x7f0000001800), &(0x7f0000001840)=0xc) 2018/04/30 15:52:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x0, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:13 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) ioctl(r0, 0xffffffffffffffff, &(0x7f0000000a80)="545e3d5698f6d62f9009219d71f61274cd2cf58b47c193dda86937423ffa3f4b8e03f24fd41cc296ec2c5cdab8afc522cfdcfac6d9cde8fb4126e3db15edceed763cd17cf7813eef8f06990f4731080a43c5ec28cfc289483c0556f0f89950b5710f23e44bfea2be606262f6d8cac68f1db48d3f9a237332c83fc6ed841b9e7e395c7e980a30c45007453d4d69d38d70c2874839a8ab68a380") getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x380000000, @mcast1={0xff, 0x1, [], 0x1}}}, 0x80000001, 0x8001}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r1, 0x5, 0x30}, &(0x7f0000000280)=0xc) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 323.192915] IPVS: Creating netns size=2536 id=47 2018/04/30 15:52:13 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000a80)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b30b49464e59a0590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020ef2a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e67fa713c98139e99a168ac375c94896311ba4623da757eb099056e10c5e6f7e94d8d517"], 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 323.282041] IPVS: Creating netns size=2536 id=48 2018/04/30 15:52:13 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000a80)=ANY=[], 0x0) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:13 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) ioctl$TIOCNOTTY(r0, 0x5422) 2018/04/30 15:52:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) openat$cgroup_int(r0, &(0x7f00000001c0)='cpuacct.usage\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = socket(0xa, 0x2, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r1, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) fallocate(r2, 0x0, 0xffff, 0x1f) connect$inet(r1, &(0x7f0000000180)={0x2, 0x2000000004e22, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) sendfile(r1, r2, &(0x7f0000000080), 0xfffb) getsockname$netlink(0xffffffffffffffff, &(0x7f0000001800), &(0x7f0000001840)=0xc) 2018/04/30 15:52:13 executing program 6: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) r1 = socket(0xb, 0xf, 0x1) sendto$ax25(r1, &(0x7f0000000140), 0x0, 0x20000000, &(0x7f0000000040)={0x3, {"65a21c61a839d6"}, 0x6}, 0x10) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x2, 0x0) preadv(r1, &(0x7f00000014c0)=[{&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000002c0)=""/73, 0x49}, {&(0x7f00000001c0)=""/39, 0x27}, {&(0x7f0000000340)=""/106, 0x6a}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x5, 0x0) ioctl$TIOCSBRK(r2, 0x5427) fcntl$getownex(r1, 0x10, &(0x7f00000015c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x40000, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x1, 0x3, 0xfffffffffffffffd, 0x6, 0x9, 0x5, 0x8, 0x4, 0x7, 0x99, 0x8000, 0x6, 0xae, 0xb5, 0x8000, 0x0, 0x7, 0x7, 0x2, 0xfffffffffffffff8, 0xf7a, 0xfffffffffffffff7, 0x8, 0x1, 0x2639, 0x24ce732f, 0xff, 0x22, 0x9, 0xe35, 0x0, 0xfff, 0x2, @perf_config_ext={0x0, 0x1000}, 0x11001, 0x7, 0x3, 0x7, 0x1, 0xe5, 0x3edf}, r3, 0x6, r0, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0004000000100000cc000000490b0000ec03000001000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000011a00)="0000000000000000000000000000000000000000000000000000000074800000ed41000000040000e95dbe5ae95dbe5ae95dbe5a00000000000005000200000000000800000000000af301000400000000000000000000000100000023", 0x5d, 0x10860}], 0x0, &(0x7f0000012f00)) truncate(&(0x7f0000000440)='./file0//ile0\x00', 0xffff) rename(&(0x7f0000000080)='./file0//ile0\x00', &(0x7f00000003c0)='./file0\x00') [ 323.440687] PM: Image mismatch: architecture specific data [ 323.456313] PM: Image mismatch: architecture specific data [ 323.461981] PM: Image mismatch: architecture specific data 2018/04/30 15:52:14 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) unlinkat(r0, &(0x7f0000000180)='./file0\x00', 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000140)={0x2, 0x20, 0x97, 0xb}) write$binfmt_misc(r0, &(0x7f00000001c0)={'syz0', "d4b2376a7c9808191f517af92ae816a8eb985f445b54fd3be5dc066e0290aaa3bf6c25ebe33031108828ac24f60fbb72585bed4a3c8974a9fa9b3534d7741f773d61a8694c23a2d804e482ba599dbd109951fa3d9f1dbda0e18c300c02724eb4532a22cb1661c1d9c55d4907220fadeb824aa91ee93d02fcf940a2cf0e8dcc84d628434ed4cc233f8cbd46ff394597e94aae7b0576e3525291e7436b419e2648c1567b890e63ba7589c46aa1741d173b0cc528a18589f2"}, 0xbb) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="215c7a31082e072a8f52c99422160dc6ba89dcc4fed82320b50f0f3a35f97450d573a3ce4189019cecba90c5a27522599957d7395fbcab7f87d5f760e652b726e89d795ca39fc6a163eb4d6452cfd75efc507a1d69f3291a8c51aa9e3f0d98fe0ac380dae42470bf79366c6d6d632428555840069b3e21a9582a1f77dcd926f0c3fdff2a0922df32918bb7b72a71981e2aa425a108eaae997ec2570172cd4277000b73c2327acdc2e03f0570f81958db90ce9c082ee6e37038f48f0a1d57d7f2e32ea1f53a652bbc415c0d938d6c7b986e6a0ddf1d99"], 0x4) [ 323.836166] device lo entered promiscuous mode [ 323.844037] device lo entered promiscuous mode [ 323.851413] device lo entered promiscuous mode [ 323.919874] device lo left promiscuous mode [ 323.975862] device lo left promiscuous mode [ 323.984416] device lo left promiscuous mode [ 324.224976] IPVS: Creating netns size=2536 id=49 2018/04/30 15:52:15 executing program 4: socketpair(0x8, 0x805, 0xbcf6, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$KDENABIO(r0, 0x4b36) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000000)) tkill(r2, 0x1000000000015) 2018/04/30 15:52:15 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x4000, 0x0) sendto$inet6(r0, &(0x7f0000000140)="868f0179e975a1d2187382a7a79e997a5e57c41e83f9d684f4894eb343c6860162f8507a102eba7c9e58f8a9dc9b9607eb28771fd34780b2d2200849834c1b548a97f36c684e3d5b0c1097a241c438fc06a84188bc22851b810fb3ef44903fb79f307377abaf093584889a97ae192f2586219df8e9e2c2dc86af9fc6af8be8d6a2bd16643f67d51c0150fc3b6b27c03ee05e4ccac7e521698ff342576f47cee015ef80cab9cd08f80d12f983324ce7af120b1337f9eca9ad16357407a0f498b8d83d4c5fc96a070ae1f72f39395e53175d882ae93d86436ce1c52d5a43dccca9f387377a59f8cfc27ce27a6ece1fcd9f", 0xf0, 0x20000800, &(0x7f0000000240)={0xa, 0x4e20, 0x100000000, @remote={0xfe, 0x80, [], 0xbb}, 0x2a7}, 0x1c) write$binfmt_elf32(r0, &(0x7f00000011c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd90, 0xffffffffffffffff, 0x7, 0x3ffffffffffd, 0x20, 0x3, 0x0, 0x0, 0x3ff}, [], "12e8f40b82b7f1c06e6c91664918e70205791f0c13bd1a5ecdd298e8fb668a7d291dafdb9891219f876516d230a8b147bc1878ea98146518811d2dbc163de4af9673aaf63c956adb36abead178a2673589d4ea90293fce5cd64451a04613c92559479b2fcd927368bbc444673c44b011ae613dc9130b603090a768981d6bada7b3881566c4ff03333a24712e666445dcc0ba6f8db4bf3f6c0644445400000000", [[], [], [], [], [], [], []]}, 0x7d8) ioctl$VT_RELDISP(r0, 0x5605) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="a507084ec3097e9f8df5c1efffbcba379b384e9ac9fc7f9007a1227d76d653be581725f49acbdc646dd2455e173b751a5f5c89f87167d2993ff709f90606f9522decd23054db0f3f461065370cddae8038e8d65399ea75c4317b0af511385b9fdaf240470d1d822ce237b24814ac945f09ab6f69d0e86f4db10576aad5253fc5be74475d20a616a9f028349d5cc93d28b78491f3552a759df1a37f6eb627623cb1abad5af1e70ce7d2c4c68892718b8a0a09e92d52898478ff43cf9f7e6a624c25bb51c2ba1f7c0dbb6ef53be251bfb6a20f99c482a5c287e2ffd4b32eda964fb0b52e9e7347205eebf8b92d3d401db048"], 0x4) 2018/04/30 15:52:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) openat$cgroup_int(r0, &(0x7f00000001c0)='cpuacct.usage\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = socket(0xa, 0x2, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r1, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) fallocate(r2, 0x0, 0xffff, 0x1f) connect$inet(r1, &(0x7f0000000180)={0x2, 0x2000000004e22, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) sendfile(r1, r2, &(0x7f0000000080), 0xfffb) getsockname$netlink(0xffffffffffffffff, &(0x7f0000001800), &(0x7f0000001840)=0xc) 2018/04/30 15:52:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x0, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:15 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f00000003c0)='net/ipx\x00') ioctl$DRM_IOCTL_RES_CTX(r1, 0x6612, &(0x7f0000000000)={0x2000000000000521, &(0x7f0000000300)}) readv(r1, &(0x7f0000000200)=[{&(0x7f0000000040)=""/171, 0xab}, {&(0x7f0000000100)=""/219, 0xdb}], 0x2) 2018/04/30 15:52:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x0, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:15 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x1c, 0x13, 0x1000000311, 0x0, 0x0, {0x1}, [@typed={0x8, 0x3, @uid}]}, 0x1c}, 0x1}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = getpid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r1, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8008100}, 0xc, &(0x7f0000000700)={&(0x7f0000000300)={0x3d4, 0x1, 0xf, 0x1, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x7}, [@typed={0x8, 0x78, @pid=r2}, @typed={0x4, 0x5a}, @typed={0x4, 0x31}, @nested={0x198, 0x1, [@typed={0x8, 0x3f, @u32=0x6}, @typed={0x8, 0x2d, @uid=r3}, @typed={0x8, 0x8f, @ipv4}, @generic="86995878a44ac991b1081c3c167626da6db5b7f0f5184bc7cd6ac8bdc264e9b6fb0e0a966c6c31bb9117ccca463f5eb866445c9c0f62829bcdb829c2020738bece845df375492af2d5acd01184cc92da2e79a3875979f59204c4e4deeb20b0ac369e0cf89946bec4dfba34017a94b13a4c79c80693ba79f9513241188228afa6e6d8f8270a6ec4ea0fffbba08d215b9c9fe8faedd36b8b05699f785a7a3df2e036", @generic="1fe31cc3556764d9f3773dfd1714199d3623ad690b9039d88e500163e6bd2bf81a4580dd3d693951bae00f4949c3b251add2c57c943d9f8731a0a5fdd81b2a78f3d411d6318e51b634bd81", @generic="77457117ebf2ca53575a8450fa98e0dadfc78a4f69d0ac3298757d60cef0040f0b51f59f16f86b4e34574575918aad784f86e250e8ef3a6cfe3b73953953df14ff6a5beea8b453a8820e1ed38641e0798e91caf8387f212b3ba45856e9c505cb34e4a9aa722a4df6820e363854134e59fd1f800912e1e9df8569d437d1461f01de27baa7e9", @typed={0x8, 0x40, @u32=0x401}]}, @typed={0x14, 0x83, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}, @generic="f23a84ed5006169f8095ddb0101b1b7dc4adb2d140de5b6f6adeabe433f8ec2b0c41e42d63c63680f417f453aefa657debbbbddb18581d26e690541bb752e7c64f1f2288f1fbf36c85aaa4147d8412fc0c9fd2e3d7b19a89c023e41e0e61f3741b9afc5aa981a5446dcc2a7820a8ea44f3f8a0c0c38d737516aa1a22186ba0d76e9c19348a12caa2ceba6662794d589b55", @generic="75c9a4efd6bd7d4711dda872cb50e3249e5cb2ae8a1d592cfa0e32f7e0c2ce4c87a313eab69dcd72b8426b4a9f91b7325c0a6b66f86f5f5d43d82f733b2433693298845d12c2c8064af338cbd0e04cb29d48cebdedcc552a984a94ec627acae52f6e0705a98477c95a0413ba3a1dba1785d59309f159a6896afa7d4a83c8e755fed5d2a87aaf0e80386a95110fc97297af2bff0c1ca1", @generic="cd3faaf0ecfb192edd5be7ba4090bd5a41b5de763dedfff39b80cdcccc694c43c1c0acb15f1edd297e1d4e0825939f0250ef9d02763e4a3e51ef8c6af643e1692e451037710261349df9e34185e1441656cc98aefe89da9952de74d8fd68461b33b120b4ac06528544f2daec177d18b327201e18ea814c1da76949edaed9a8c004b1b949fddf35dad31a3357e3a3d1726b251deaaa1526a70cf40d839777ad394291d51a4bc350a7da6a3a57fc7f6baf3878456ba77268c0780e16e7c03a178d2c4321ba0a4c4bed10dd0811cce15595f3393ca1b6234df34d428d46"]}, 0x3d4}, 0x1, 0x0, 0x0, 0x4000000}, 0x8044) r4 = add_key(&(0x7f0000000780)='trusted\x00', &(0x7f00000007c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000800)="27bcc8080ca0b873a7f2f9a8f701", 0xe, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r4, 0x8000) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2200, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e24, 0x4, @empty, 0x101}, @in6={0xa, 0x4e21, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x6}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x7}], 0x54) 2018/04/30 15:52:15 executing program 6: open(&(0x7f0000000100)='./file0\x00', 0x10000, 0x2) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fremovexattr(r0, &(0x7f00000000c0)=@random={'os2.', '\x00'}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0), 0x10) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f0000000180)="240000b3b21e06f0071c0136d88f3e7bd4b8536cd9a232b67965ff0ffc0e020000ffff10000002e1000c08000b000000", 0x30) sendto$inet(r0, &(0x7f0000000400)="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", 0x1000, 0x1, &(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x10000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'ip6tnl0\x00', 0x1}, 0x18) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000000300)=""/197) 2018/04/30 15:52:15 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='syz0'], 0x4) 2018/04/30 15:52:15 executing program 7: r0 = socket$inet6(0xa, 0x2000000802, 0x1) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000180), 0x1) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'raw\x00', 0x59, "051b6839103026dcf7be89bfbd8ffe2067eaf5f00b2f07288786ee519094e8d2c436477ca2ca5c205e5f885ca6f4de90d9554652b0e5991de6e512624868b05d3b856186e88f9a6c7fe9364820d00cf28c1d328e50a3037075"}, &(0x7f0000000080)=0x7d) [ 324.760036] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7858 sclass=netlink_route_socket pig=28166 comm=syz-executor6 2018/04/30 15:52:15 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="73797a3e21ba525a1c413dcbf4ab561b7f1abb96932857979bfd5f7a3773c872df0a396e1bb1726e5fc6653a43e5aeefee2df03fdf5b3dcd30eddae16b4781df08c1110943e70000000000000000000000"], 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x1, 0x2, 0x2}) 2018/04/30 15:52:15 executing program 6: r0 = open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000100)=0x1) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x1800, &(0x7f00000001c0)=ANY=[]) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9d3}, &(0x7f00000001c0)=0x1de) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000200)={r2, 0x69, "8be036e2a036be2ab623e5394bdc9f6d24fe685e10e10e317cbaed51a4c31baf6574552ec6fe2f3b05dd9fb0caba91c7676768471e7844627f54095b8d52a6dca9ffe47a8d488eec046cd1e7687dd89081d34874e6e23b742d98a06cefd48efdc1a52d0db995d14708"}, &(0x7f0000000280)=0x71) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000000540), 0x0, 0x540a}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]) fallocate(r1, 0x3, 0x0, 0x100000001) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) write$selinux_user(r0, &(0x7f0000000000)={'system_u:object_r:audit_spool_t:s0', 0x20, 'staff_u\x00'}, 0x2b) [ 324.810176] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7858 sclass=netlink_route_socket pig=28166 comm=syz-executor6 2018/04/30 15:52:15 executing program 7: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x3, &(0x7f0000000280)=[{&(0x7f00000000c0)="49abb3cf93dd06e01a0fb81d6db5b4df5a980882b5fc136b3ad14f54a5679315f4d536185e3e820c0918c09496c3a1353ba732dbe39999a1ba82a981e52502e5a82fa776c08917439d2eb5383cd28bb0f09ccd5fffcb20e8e81f47fb9c5a219699a4944dcad9fe1fc9ed16f5b103e4e48d229168304ba9a567e20b9d2e1a3a6ef15d31938d4eabcc5954d828f0445a1b81e3a1aa1b1fa53e494bec050b8154037aa0324b4c9e3293b52aed964201114a", 0xb0, 0x1}, {&(0x7f0000000180)="93881fffdd351e539e7a14343c6a9486004f1601786e04768941d8e75a36ba8decbedea7c8fae9c61e1ffd074ca6adf625c6cb0bdf0a031cba69d128aa1827e5afc7d1f2332e5ff6d618f6b983", 0x4d, 0x9}, {&(0x7f0000000200)="cb84c0bf902caa07a23c0ec82639a0f7832eacb4a560dab7f8467908a5707584ad923ed3c28d49b8448ad0d6a274b025d4c833d86d20fc2949df3af49259aca879b8ba34", 0x44, 0x4143}], 0x1000000, &(0x7f0000000300)={[{@session={'session', 0x3d, [0x33]}, 0x2c}]}) r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x80da14, 0x8001, 0x20000000}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/30 15:52:15 executing program 6: capset(&(0x7f0000000000)={0x20071026}, &(0x7f0000000040)={0xfffffffffffffffd, 0x0, 0x0, 0x1, 0xffffffffffffffff}) sched_setparam(0x0, &(0x7f0000000340)) 2018/04/30 15:52:15 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000d00)=0x0) r2 = getuid() getresgid(&(0x7f0000000d40), &(0x7f0000000d80)=0x0, &(0x7f0000000dc0)) sendmsg$unix(r0, &(0x7f0000000e40)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000c80)=[{&(0x7f00000000c0)="b8301e8fafd4e28483489b917bd99483a658074db89fd77649ad0cec", 0x1c}, {&(0x7f0000000100)="80900e74d6f6e266870b204172777dd6ad641da3ea34410cfadcfc2ce99cd5491edcc0d5bebac0e7edcd1942137a7ef1c75c734bae220cc61c8d6196ab03a313b2bf8d48f96223cc1f14622d9e646d7fc815a9a7e3a2de3b8d42a00728f3553e", 0x60}, {&(0x7f0000000a80)="c9e83993840cefad34fc36b36288a8355c3e071678d9dd8c83b32a8958a45a24b71bcfe020c9414258c2050d0888b9d4eedafdda181cbbb99391a351e7efba44e0fc78e436e947abc2282d24e1ed18095138d0e50a75e076966951e8fc5b00f82ca8f3bd7496ce906ece4f5234144c06eb4c0c2b7a1a7152e08977a5541d39c96499afc1b8fa97de5645f1dfc1bf8660a41e461b204a4ab5b42cf9e24d93527f1bbbbe1fcfd5cd938c8691bb82eb0a76cca4deb22d8e505883c3a8a80051c13d8d3a70470a865e9a230ff60ef51ce54eaa52482775842c550a5ef32529e02f91707eabdfb3b42fb4ab", 0xe9}, {&(0x7f0000000180)="52b62b2918838ba72d9d483d4e7bc6727b2427ef56c969e24fa92280e1edf07ca9a72bf44bb0546fe623ff0ed4388491eaf57b8f121e51ef8b56399281af50dce443496f", 0x44}, {&(0x7f0000000240)="9fd1cde1688baba9befcf7473c25542621c4a5c8dd0cc0a9f36f17acc25b591102b7cb3e522b14959273cd712660c04347759bd9b6cbfcf6b024e77c", 0x3c}, {&(0x7f0000000280)="8107440b2e16e75f41707907be6ee586ba65b2b1476e60c861400d79b785af5b07f95273912cff7c76e617560d23a98e030c3c1cff5a761dbc8f8c1534e62c30e6ebc382127ce132b2efd337ee16c868eaf291d5", 0x54}, {&(0x7f0000000b80)="7d6860b01d0409c76ce8885566f704546cb386dc27392473b6399e7fc8e1f7fc5808b09da5f06effbe63d6ea77cc647f8a2a7861b7b9bbb337bb378d5a", 0x3d}, {&(0x7f0000000bc0)="9324545e8fed3ef051d18c0cfab49d245ca3ff7c0dd78c51f2c607b4216e0e2fce11cc27174bff10dcbdd8025dcd74fc5272c7f4175b537ff7f508fc6f3502f49a017dedd8472369761051cffb09c4a3e0551fadc8d2e7c45604ab24414a963cd82dff6011cc45d6561a5bbcfe4b5eed75b7434fb020397d8cd72e0b9cd6252cf85829b80475860f4727", 0x8a}], 0x8, &(0x7f0000000e00)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}], 0x40, 0xc0}, 0x8000) write$binfmt_misc(r0, &(0x7f0000000e80)=ANY=[@ANYBLOB="73797a3125e075128fe6"], 0x4) syz_mount_image$gfs2(&(0x7f0000000200)='gfs2\x00', &(0x7f0000000ec0)='./file0\x00', 0x6, 0x1, &(0x7f0000000f40)=[{&(0x7f0000000f00)="febd4ffbafcf49ea28c3582601354c220427affeeb4b09cbce07fbe4f917ddbdc5e40242460ebcdc97883d01513d7f91a8979b394c1e", 0x36, 0x6}], 0x40, &(0x7f0000000f80)={[{@discard='discard', 0x2c}, {@lockproto_dlm='lockproto=dlm', 0x2c}, {@discard='discard', 0x2c}, {@nobarrier='nobarrier', 0x2c}, {@data_writeback='data=writeback', 0x2c}, {@nobarrier='nobarrier', 0x2c}, {@nodiscard='nodiscard', 0x2c}]}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000001000)={0x0, 0x10001, 0x30, 0x9, 0x4}, &(0x7f0000001040)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000001080)={r4, 0x6}, 0x8) [ 325.282087] device lo entered promiscuous mode [ 325.294478] device lo entered promiscuous mode [ 325.300034] device lo entered promiscuous mode [ 325.350594] device lo left promiscuous mode [ 325.383583] device lo left promiscuous mode [ 325.390679] device lo left promiscuous mode 2018/04/30 15:52:16 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000526000)={0xffffffffffffffff}) getsockopt$nfc_llcp(r0, 0x118, 0x7, &(0x7f0000000040)=""/4096, 0x1000) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000a96fff)=""/1, &(0x7f00002a1000)=0x1) 2018/04/30 15:52:16 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="73797a3e21ba525a1c413dcbf4ab561b7f1abb96932857979bfd5f7a3773c872df0a396e1bb1726e5fc6653a43e5aeefee2df03fdf5b3dcd30eddae16b4781df08c1110943e70000000000000000000000"], 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x1, 0x2, 0x2}) 2018/04/30 15:52:16 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80040, 0x0) connect$ax25(r0, &(0x7f0000000040)={0x3, {"f4354fe6372759"}, 0x8}, 0x10) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x2, 0x1, 0x2, {0xa, 0x4e22, 0x3ff, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x19}}, 0x101}}}, 0x32) syz_emit_ethernet(0x32, &(0x7f0000000080)={@random="0352ba8e8227", @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x8906, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1=0xe0000001}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "2099e9", 0x0, "5d0010"}}}}}}, &(0x7f00000e7fec)={0x0, 0x0, [0xa99]}) 2018/04/30 15:52:16 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) prlimit64(r1, 0xa, &(0x7f0000000200)={0x8, 0x2}, &(0x7f00000002c0)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000240)={0x5, 0xffffffffffffff81, 0x1}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) recvfrom$ipx(r3, &(0x7f0000000400)=""/4096, 0x1000, 0x20, &(0x7f00000001c0)={0x4, 0x2, 0x8, "c3ac8d48dbea", 0x8}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x38200, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0xf, &(0x7f0000000140)=""/74, &(0x7f00000000c0)=0x4a) tkill(r1, 0x29) 2018/04/30 15:52:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x0, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:16 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x0, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:16 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:16 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="73798fdb"], 0x4) 2018/04/30 15:52:16 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003be600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 326.429074] device lo entered promiscuous mode [ 326.444140] device lo entered promiscuous mode [ 326.451199] device lo entered promiscuous mode [ 326.461673] device lo entered promiscuous mode [ 326.496238] device lo entered promiscuous mode [ 326.602767] device lo left promiscuous mode [ 326.616167] device lo left promiscuous mode [ 326.621304] device lo left promiscuous mode [ 326.632410] device lo left promiscuous mode [ 326.639925] device lo left promiscuous mode 2018/04/30 15:52:17 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:17 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000200)='blacklist\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="5ae6c99c3ec3b54ff5cf1c3cfd433551b0c700a077d25a85d9825c4a07b3986dd848d38180016cfae2490540fb9351182f7856a6736cb0343276c458afc955d717ba449d4546d14e323813ebbe7a3eac8b334ce2a95ae66d5e06dfdbfd5726b1b1b89582722e88925f53c7661cbec06b878988efb3853e79af0213e03c016c0a", 0x80, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate(0xc, r1, &(0x7f0000000300)="30f614e91aa69bdbbf5cdf983be7c765a72f87db69c0c08b2aef", 0x1a, r2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{}, {}, {0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f00000000c0)={r4, 0x2}) sendmsg$nl_xfrm(r3, &(0x7f0000306000)={&(0x7f00003d7ff4)={0x10}, 0xc, &(0x7f00003b3000)={&(0x7f0000000440)=ANY=[@ANYBLOB="040100001a001108000000ff0000000000000000000000f9ffffff068bd2240053aeb6c1bd32df51953839199b86ee8cfcfcbc9818d02e3a9fe7de3c0c94f8c220d2ba7304d14cc4f149f39f904ff630c607b8513c9848ccf77ca898e6e476752c7abc219390981084099006fec9818e58fbac8cb68efa9ce93d53dbc153f9611eb90a2a49c3", @ANYBLOB="ed6ec258666127d917cab4db9aa2328f7dd1f4b615a65879f8df7f410351d90c1295f2cd1203d7e30429eb1efd7012a2529d8adae128b26e53202ebffc018db2970f1aeb0a667f38d1d1b7bf05e5ed28886c4f4724819231234dd2b809e5b22e9f144cbc1f52fb155d92085b25c7c894726bec3899f8a2e8ca6d2ddd054533d671d3d3c8b5fadb941e", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000002b000000e000000100000000000000000000000000000000000000000000000000000000003e59a93b000000000000000000000000000000000000010000000000000000006b339e64549044d900000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000e00ac14ff00000001000000000000000000000000000000000000000000000000000000000000"], 0x4}, 0x1}, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x4, 0xffffffff, 0x100000000}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f00000001c0)={0x9, 0xdb4c2db584d7075c, 0xffffffff, 0x2, r7}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000640)={r7, 0x48, &(0x7f00000003c0)=[@in6={0xa, 0x4e23, 0x7ff, @local={0xfe, 0x80, [], 0xaa}, 0x8}, @in6={0xa, 0x4e21, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x6408}, @in={0x2, 0x4e20, @multicast1=0xe0000001}]}, &(0x7f0000000680)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f0000000780)=ANY=[@ANYRES32=r8, @ANYBLOB="4b0000002a97be62db958c64b02345e517705472b09299e3353a5a0fc9d67140e9b07ce296adde4f688732f540c40a763e26c09c19d802f43b7e8893c104a3b3a6abd92858ee0b06e203aef44feef603d21c4cc289bf8220e8449f70082cd40796520000000000000000000000000000000000"], &(0x7f0000000740)=0x53) 2018/04/30 15:52:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:17 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:17 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) fdatasync(r0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x8000}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) 2018/04/30 15:52:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x0, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:17 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x4) 2018/04/30 15:52:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:17 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="84aa75b2ec9312c5f7a19dd8e67379caa2cf8972dd0d5a18ca170307837bc2c8ae3bc158d99103ca5721f82aced441158f35a72fdfe59b39e2054fc418fcc439be1e7ff860e5a858f46fbe5586f17b743233f05785dae0cdd5cc2ad261bf17271cccf16389a3a6982c099e512bf2847d310aa8223542e0d5"], 0x4) 2018/04/30 15:52:17 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xe}}, {0x306, @random="e2ade095f493"}, 0x40, {0x2, 0x4e20, @rand_addr=0x8}, 'syzkaller0\x00'}) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:17 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0xdd}, 0x4) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000080)={0x4, 0x19, 0x8, 0x7fffffff}, 0x10) 2018/04/30 15:52:17 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000040)=0x80000001, 0x4) 2018/04/30 15:52:18 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:18 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010d3dc9c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000af0b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) ioctl$TIOCSBRK(r0, 0x5427) [ 327.721798] device lo entered promiscuous mode [ 327.735615] device lo entered promiscuous mode [ 327.741213] device lo entered promiscuous mode [ 327.747711] device lo entered promiscuous mode [ 327.756830] device lo left promiscuous mode [ 328.796919] device lo left promiscuous mode [ 328.801510] device lo left promiscuous mode [ 328.806664] device lo left promiscuous mode [ 328.811617] device lo left promiscuous mode [ 328.819676] device lo entered promiscuous mode [ 328.824342] device lo entered promiscuous mode [ 328.833129] device lo left promiscuous mode [ 328.851288] device lo left promiscuous mode 2018/04/30 15:52:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12, 0xffffffffffffffff, @thr={&(0x7f0000000140)="c69d3c98d1971395ae250b3f5ca0900ec3bfcf60ef5236da1b2291eb1b9749ea586346ddbcf6d96ee77bbc607d52e825340eafd1edc5f41010729828e628671cb2031a8ea8702d636ebcf2c470a4101215cccbfae5804f1489fb87b57730e82e4fe5594f4ccd20b85068bec55cc8b7b4035bf7ab6816172ab0f440483c17ebcc03521033d32d99ab906d74194fee0df9686339154dc9", &(0x7f0000000200)="5e27761ede94e06aa40bde46c04c687f36eadba9f9572649f45bf4e1b29338c7e344a6759c355d174d4f68f5f1cbeb15bf3d1ff21bd5e2c61cb2dff01648899c8ec7cb38ff76f2120c6d945eff14d3cef65270ffb7bc6f2f520d2a286b1b136cab61e71365bcc7d9a4909d6ef230247c1b7dc5ee2a0ef4bf5dd969afe1ee0320a3e747f0e3fe7459c6a73f04fbae3cda653b8ac752424275700e24b00476ea456f5bdd0c59eff2adcbdc5258f2fd1d38ef240dbf3e8e4808b115"}}, &(0x7f0000000300)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x8000000200000, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r1, 0x1000000000015) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000340)=0x40) 2018/04/30 15:52:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:19 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:19 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:19 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) pread64(r0, &(0x7f0000000140)=""/104, 0xc0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e23, @multicast1=0xe0000001}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)}}, {{&(0x7f00000035c0)=@in={0x2, 0x4e21}, 0x80, &(0x7f0000005700), 0x0, &(0x7f0000000140), 0x0, 0xc0}}], 0x2, 0x0) 2018/04/30 15:52:19 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) execve(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000840)=[&(0x7f0000000480)='/selinux/status\x00', &(0x7f00000006c0)='{\x00', &(0x7f0000000740)='][cpusetcgroup\x00', &(0x7f0000000780)='\\\x00', &(0x7f00000007c0)='keyringGPL\x00', &(0x7f0000000800)='vfat\x00'], &(0x7f0000000980)=[&(0x7f0000000880)='H\x00', &(0x7f00000008c0)='vmnet0trustedvmnet1\'\x00', &(0x7f0000000900)="73656c696e7578707070302d766d6e6574308273797374656d00", &(0x7f0000000940)='teql0\x00']) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/102) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r1, 0x2, 0x2, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000a40)={0xffff, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x400000080, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r4, &(0x7f00000001c0)='./file0/file0\x00', r6, &(0x7f0000000200)='./file0/file0\x00', 0x1) r8 = socket(0x800000000000011, 0x800000002, 0x0) bind(r8, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TCSBRK(r6, 0x5409, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$packet(r8, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000006c0)={r9, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/30 15:52:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=ANY=[@ANYBLOB="0002020100480fac80010000000000000000000000000001"], 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/30 15:52:19 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) fallocate(r0, 0x1, 0x6, 0x8) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:19 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:19 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x202002, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, @local}, &(0x7f0000000280)=0x10, 0x800) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000002c0)={0x20000002}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$selinux_load(r2, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "86f7ec1b0356f9c4a4d4fc76233ee3a95e90a239d4dec4216ce27801f50ab90f0927cfae54ae5445c1128d7674281cf5c3f824ac462689dbb4096dab73610c1b94a9c1dea572428385dd90e94d1e551ec278ab7f13d78e74140b2c0f91afe89283a6eaadbb6353982af950e155aba64d6468385fc8b211ae38c8b35d14945af7a0aad57ab88cae7507dc7af757bb31fe52277f1cc43d9f8946251b1fec96064d127562905dbf23357977150c5097f3a114c43e0c98880b31eac4f4d4c080f0da8b2e44fd2b70fbf7acdc7bfe89250b8c053ecbae62c6b51aa69c44fe5101e9e46662a6aeebb00631492b624d8c826ca3365414a303"}, 0x105) write$binfmt_elf32(r2, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, 0x3, 0x5, 0x44, &(0x7f0000ffd000/0x3000)=nil, 0x7}) write$binfmt_misc(r2, &(0x7f0000000200)={'syz1'}, 0x4) 2018/04/30 15:52:19 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="f335f6c123d59cc5e0a0f93016d50c4dbb53dfad3778dce0fb0abf7a3fd031d0836e1669f9dfcc34f5402f86c993824f12b876a26510fafa904b6217d2fbb521f922c1d23981f4b2b82d9379607115225ba40f29b53e11da2e2ad4ac80777191b689d5c6ae17c36f88f1247c4d5c202be1a3e5bcec59f667c843ebd70bf0bb98b4cb6dd0efb6148ad75b3e47896ba9a1b47e5f6c572e95f0712517f61aa5f3e861d172f65a709832ad2b33137847c900dfffa5e1686a39e58b13c5ac97fa575e5660eb880c3a09572df770359bbf5a54c1d1ada167cef766526ba9be", 0xdc, 0x1}]) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000400)={0x8, 0x1, "636c69656e7431000000000000000000000000000000000000000500", 0x2, "79262f649110921a", "00d67fea811b0000000000ab77b517440002523785446a0c565f127296ac918c", 0xab9, 0x4}) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r2 = request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="636c69656e7431000000000000000000000000000000000000000500", 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)='procsecurity\x00', 0xfffffffffffffff8) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) keyctl$unlink(0x9, r2, r3) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'ipddp0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000280)={{0x0, 0x1}, {0xe}}) timer_create(0x6, &(0x7f0000000340)={0x0, 0x27, 0x5, @tid=0xffffffffffffffff}, &(0x7f0000000380)=0x0) timer_delete(r4) 2018/04/30 15:52:19 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="73797a317080e5a75bad695253cb557bd9e930b25a19a57673dc626ac91bf4214895d96b973af45b657895d0b529dbf230d4d1dc3139945e404d2e93c22bff40f4b5d58141e1d86223a91f80607dbdd0880f2d65107f136617b335aff9d1474e9e35d560b1b9d077fd56966e90d9441ffefbd384c780cedbfc34d2ae8250c46b"], 0x4) 2018/04/30 15:52:19 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], [], []]}, 0x758) writev(r0, &(0x7f0000001b40)=[{&(0x7f0000000040)="90f9e2cb7666b39e06a5e04935b2dcf37cb97a3a30abbee7e38f5d8cf0467a4eadd7fc2275bad875d8f427fc809425d232c43a0e47444e2b4552b81da66d8bb944d11a6ec5d89c7efd55900354135837d73a0e5e435fd1b7882e1f10c103c7f5a7071c8a23b449bafd23f96c0633f18577778c2409a80b6d9f89d52b5d04d309b8f2f84928822ca52022b3dc2ea6c6d5e4c0dc73c504340954de494a705386a8acc552b2", 0xa4}, {&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000000100)="538f304f5ca3ccc3631a27dd9d8b060287e22e42039aebd325c496c64de64f697e3f6b91a9a95b4d401bc121c9cbab441126a63a63925208b4da8b777008e764ef207b5502b520c1d86d31e9b0c86e769940d22d15897b115e029aa36880edf291fa62941621d5cb42a3fab4ed80a30dc7be960a7dff49f15f646d8b4823d8650eafb612842130fc08c3396f8768245b0da1e7ef629d114f860ef984d726c2f54e32b8eea79ca1804e8535a0e2d3e36ff115bc8d9e4ac0d44b633e942404a26b88", 0xc1}, {&(0x7f0000000240)="166fc2c6d3dda7193e0beedd64e8ebfa005d7485080b25be17342325521ce4d204a7a6e54c4757310281965fa5befd3fa63ebdbd06324b8d3dba40ac9edcd8b071e15ddb65e53d61b5add3f33a2cb96374e76db165c73642441a04c7940975", 0x5f}, {&(0x7f0000001a80)="63ba967dfb156ecd38fc3f050f80dead2714627ed6d22a689f2913d83d23cc4d6be18d18e41ec599888b32ee8e153729c48649aaed897e6c3d39dc12abe145a6f53aa9fa5e2f4337d9a443478cbfc648fc5cf52b1c32bf2353ad7de9b122435348a4f781bdc4bf054d497c56f1a29da3c9291ee11e9c0f4a1a9df5056657be8fcdc01feadb9515fc45157e24fa9c", 0x8e}, {&(0x7f00000002c0)="ac4af35e833e6e5b7cafbfee05c87e75bb", 0x11}], 0x6) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 329.227873] device lo entered promiscuous mode 2018/04/30 15:52:19 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="eb6acf38457d78bb6fd8476d23b0a17391320fc4222eaf85b5fc9c14f795d0d78167bdc4aa52abf74a04bc8ab207c4eb7ab8cc32ca9893781977234ee4141070f2e72035a55609df5e0c5f7508e5d374cdb841e56b5bed97ac5297708ed68270577b7f68fe8446fec71076782a6ee0484c867dbe6494cc914aadc515671bf7443b64f5da244840e10ecebff4f6911d280ec287f7506ff257a93647dd5488eefff28e0f585da6e59badac5c493c300d35ae6c776d"], 0xb4) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) [ 329.381979] device lo left promiscuous mode [ 329.436792] device lo entered promiscuous mode [ 329.442612] device lo entered promiscuous mode [ 329.456738] device lo entered promiscuous mode [ 329.580104] device lo left promiscuous mode [ 329.590793] device lo left promiscuous mode [ 329.600685] device lo left promiscuous mode [ 329.810299] device lo entered promiscuous mode [ 490.695960] INFO: task syz-executor1:28310 blocked for more than 120 seconds. [ 490.703252] Not tainted 4.9.97-g2bcbbd5 #11 [ 490.708095] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 490.716042] syz-executor1 D27640 28310 3884 0x00000004 [ 490.721761] ffff8801cfb79800 ffff8801bdb3af40 ffff880196d01f80 ffff8801cd930000 [ 490.729753] ffff8801db321b98 ffff8801cba07b48 ffffffff839e375d ffff8801cfb7a0c8 [ 490.737740] ffffed0039f6f418 ffff8801cfb79800 00fffc0000000000 ffff8801db322468 [ 490.745710] Call Trace: [ 490.748415] [] ? __schedule+0x64d/0x1bd0 [ 490.754096] [] schedule+0x7f/0x1b0 [ 490.759591] [] schedule_preempt_disabled+0x13/0x20 [ 490.766153] [] mutex_lock_nested+0x326/0x870 [ 490.772181] [] ? loop_control_ioctl+0x186/0x300 [ 490.778513] [] ? mutex_trylock+0x3e0/0x3e0 [ 490.784371] [] ? exit_robust_list+0x220/0x220 [ 490.790521] [] loop_control_ioctl+0x186/0x300 [ 490.796643] [] ? loop_lookup+0x160/0x160 [ 490.802343] [] ? __might_sleep+0x95/0x1a0 [ 490.808132] [] ? loop_lookup+0x160/0x160 [ 490.813812] [] do_vfs_ioctl+0x1ac/0x11a0 [ 490.819505] [] ? ioctl_preallocate+0x220/0x220 [ 490.825708] [] ? selinux_capable+0x40/0x40 [ 490.831578] [] ? __fget+0x20a/0x3b0 [ 490.836831] [] ? __fget+0x231/0x3b0 [ 490.842073] [] ? __fget+0x47/0x3b0 [ 490.847247] [] ? security_file_ioctl+0x8f/0xc0 [ 490.853445] [] SyS_ioctl+0x8f/0xc0 [ 490.858751] [] ? do_vfs_ioctl+0x11a0/0x11a0 [ 490.864691] [] do_syscall_64+0x1a6/0x490 [ 490.870387] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 490.877286] [ 490.877286] Showing all locks held in the system: [ 490.883592] 2 locks held by khungtaskd/518: [ 490.887906] #0: (rcu_read_lock){......}, at: [] watchdog+0x11c/0xa20 [ 490.896591] #1: (tasklist_lock){.+.+..}, at: [] debug_show_all_locks+0x79/0x218 [ 490.906249] 2 locks held by getty/3770: [ 490.910191] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 490.919498] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 490.929419] 2 locks held by syz-executor1/28310: [ 490.934146] #0: (loop_index_mutex){+.+.+.}, at: [] loop_control_ioctl+0x7a/0x300 [ 490.943891] #1: (&lo->lo_ctl_mutex#2){+.+.+.}, at: [] loop_control_ioctl+0x186/0x300 [ 490.954083] 1 lock held by syz-executor1/28349: [ 490.958741] #0: (loop_index_mutex){+.+.+.}, at: [] loop_control_ioctl+0x7a/0x300 [ 490.968489] 2 locks held by syz-executor0/28341: [ 490.973209] #0: (&lo->lo_ctl_mutex/1){+.+.+.}, at: [] lo_ioctl+0x8b/0x1aa0 [ 490.982531] #1: (&bdev->bd_mutex){+.+.+.}, at: [] blkdev_reread_part+0x1e/0x40 [ 490.992086] 2 locks held by blkid/28345: [ 490.996131] #0: (&bdev->bd_mutex){+.+.+.}, at: [] __blkdev_get+0x10c/0xd60 [ 491.005322] #1: (loop_index_mutex){+.+.+.}, at: [] lo_open+0x1b/0xa0 [ 491.014008] [ 491.015604] ============================================= [ 491.015604] [ 491.022748] NMI backtrace for cpu 0 [ 491.026412] CPU: 0 PID: 518 Comm: khungtaskd Not tainted 4.9.97-g2bcbbd5 #11 [ 491.033568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.042892] ffff8801d84efd08 ffffffff81eb0b69 0000000000000000 0000000000000000 [ 491.050877] 0000000000000000 0000000000000001 ffffffff810b7d60 ffff8801d84efd40 [ 491.058847] ffffffff81ebbe97 0000000000000000 0000000000000000 0000000000000003 [ 491.066823] Call Trace: [ 491.069384] [] dump_stack+0xc1/0x128 [ 491.074717] [] ? irq_force_complete_move+0x320/0x320 [ 491.081439] [] nmi_cpu_backtrace.cold.2+0x48/0x87 [ 491.087901] [] ? irq_force_complete_move+0x320/0x320 [ 491.094622] [] nmi_trigger_cpumask_backtrace+0x12a/0x14f [ 491.101691] [] arch_trigger_cpumask_backtrace+0x14/0x20 [ 491.108762] [] watchdog+0x6b4/0xa20 [ 491.114009] [] ? watchdog+0x11c/0xa20 [ 491.119429] [] kthread+0x26d/0x300 [ 491.124587] [] ? reset_hung_task_detector+0x20/0x20 [ 491.131220] [] ? kthread_park+0xa0/0xa0 [ 491.136814] [] ? kthread_park+0xa0/0xa0 [ 491.142408] [] ? kthread_park+0xa0/0xa0 [ 491.148000] [] ret_from_fork+0x5c/0x70 [ 491.153559] Sending NMI from CPU 0 to CPUs 1: [ 491.158057] NMI backtrace for cpu 1 skipped: idling at pc 0xffffffff839f3266 [ 491.165382] Kernel panic - not syncing: hung_task: blocked tasks [ 491.171503] CPU: 0 PID: 518 Comm: khungtaskd Not tainted 4.9.97-g2bcbbd5 #11 [ 491.178656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.187979] ffff8801d84efcc8 ffffffff81eb0b69 ffffffff83c8b4e0 00000000ffffffff [ 491.195962] 0000000000000000 0000000000000000 dffffc0000000000 ffff8801d84efd88 [ 491.203940] ffffffff8141f975 0000000041b58ab3 ffffffff843b8408 ffffffff8141f7b6 [ 491.211910] Call Trace: [ 491.214468] [] dump_stack+0xc1/0x128 [ 491.219813] [] panic+0x1bf/0x3bc [ 491.224798] [] ? add_taint.cold.6+0x16/0x16 [ 491.230739] [] ? ___preempt_schedule+0x16/0x18 [ 491.236939] [] ? nmi_trigger_cpumask_backtrace+0x100/0x14f [ 491.244180] [] watchdog+0x6c5/0xa20 [ 491.249429] [] ? watchdog+0x11c/0xa20 [ 491.254854] [] kthread+0x26d/0x300 [ 491.260014] [] ? reset_hung_task_detector+0x20/0x20 [ 491.266649] [] ? kthread_park+0xa0/0xa0 [ 491.272239] [] ? kthread_park+0xa0/0xa0 [ 491.277829] [] ? kthread_park+0xa0/0xa0 [ 491.283422] [] ret_from_fork+0x5c/0x70 [ 491.289303] Dumping ftrace buffer: [ 491.292932] (ftrace buffer empty) [ 491.296611] Kernel Offset: disabled [ 491.300217] Rebooting in 86400 seconds..