81}, {0x3f, 0x3, 0xee5, [], 0x1}, {0x7, 0x2, 0x9, [], 0x9}, {0x31a2, 0x1, 0xf23, [], 0xff9c}, {0x4, 0x279, 0x5, [], 0x20}, {0x3, 0x6, 0x69, [], 0x4}, {0x9, 0x80, 0x3, [], 0x7}, {0x3, 0x1, 0x3, [], 0x80000000}, {0x6, 0x1, 0x81, [], 0x5}, {0x3a0f, 0x7cad3789, 0x3, [], 0x3}, {0x177, 0x7fe000000000000, 0x40, [], 0x9}, {0x81, 0x1, 0x7, [], 0x3f}, {0x2, 0x1ff, 0x8, [], 0x4}, {0x5, 0x1, 0x3ff, [], 0xfff}, {0x5, 0x5, 0x4, [], 0x422}, {0x8, 0xe771, 0x8000, [], 0xdff}, {0x7f, 0xfffffffeffffffff, 0x3, [], 0xb0f}, {0x1fe, 0x2, 0x0, [], 0x800}]}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r4, 0x111, 0x1, 0x9, 0x4) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000040)) 2018/03/29 16:07:22 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:22 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00"], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:22 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x0, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:22 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:22 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x2000, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:22 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) read(0xffffffffffffffff, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:22 executing program 5: timer_create(0x8, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x1, &(0x7f000004a000)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000040)) r1 = socket$inet(0x15, 0x5, 0x0) socketpair$inet6(0xa, 0x80006, 0x3, &(0x7f0000000200)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xdd, 0x200}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[@ANYRES32=r3, @ANYBLOB="bd0000008e459fa9b00cd0d27f56ef4edcf80a2f7923c9192896da251c26f328a99870fa9a50aded5c1f1e7053a16c1160a7340dfb83457534ae94fe0f1d3b21de3ca409a9b529aeab501662d40b7650e9d537698ef316b272154e7bef56ac1714c9c64803877a366f4dcdb2d0453563a220275cf6bae6e2efe32dc681fcd381ffd42ab3ff5c3e3a976aae3acf22e307aeea1a3d5909cd4ea9cb13ab8aacc11ad906fe86a51da1c9e0453c4458c3d8c590775998eb654ce6b2fd8d971ef330c8b4"], &(0x7f00000003c0)=0xc5) bind$inet(r1, &(0x7f000001bff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r1, &(0x7f0000024ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r3, @in6={{0xa, 0x4e24, 0x3f, @empty, 0xfffffffffffffffc}}, 0x8, 0x9}, &(0x7f0000000180)=0x90) sendmsg(r1, &(0x7f0000001480)={0x0, 0x11, &(0x7f0000000040)=[{&(0x7f0000000000), 0xffbf}], 0x1, &(0x7f0000000180)}, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x6000, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r4, 0xc0106403, &(0x7f0000000080)={0x1, 0x4, 0x0, 0x1}) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, &(0x7f0000000100)={0x200, 0x7, 0x9, 0x3ff, "3eeb0e12a76d39d9c8442cfe5e887f587d1e553a9debd2b9aeddd63fced1a931bc2cf584991636af9bb18ec5", 0x8}) 2018/03/29 16:07:22 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00"], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000000700)={0x0, 0x0}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x200, 0x100, 0x0, "48c1a49f242b40323ceb09d99d7ca76ce7995a9a6f9fc42ae3ce9e92b80b4889b58694ef0065eb27c0d98d3637083160c5f2b275e9e90322d554cf063d4e9e61504ccd72accaa8ea7536b618d0119bfd"}, 0xd8) inotify_add_watch(r3, &(0x7f0000000540)='./file0\x00', 0xc) epoll_wait(r3, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000440)={0x8001, 0x1, 0x4, 0x1ff, 0x22966cb9}, 0xc) shmget(0x3, 0x11000, 0x200, &(0x7f0000000000/0x11000)=nil) r4 = shmget(0x2, 0x4000, 0x98, &(0x7f0000003000/0x4000)=nil) shmctl$IPC_RMID(r4, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000100)={r6, 0x1}) r7 = dup3(r5, r3, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000680)={0x101ff, 0x0, 0x1, 0x2000, &(0x7f000075c000/0x2000)=nil}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0}, &(0x7f0000000380)=0xc) ioctl$DRM_IOCTL_AGP_INFO(r7, 0x80386433, &(0x7f0000000400)=""/45) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000980)) sendmsg$netlink(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000880)={0x10, 0x2d, 0x600, 0x70bd2d, 0x25dfdbff}, 0x10}], 0x1}, 0x4000801) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f00000003c0)={r8, 0x8}, &(0x7f0000000480)=0x8) accept(r2, &(0x7f00000004c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000340)=0x116) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f00000005c0)=@assoc_id=r9, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000800)={r8, 0x80000000}, &(0x7f0000000840)=0x8) clock_gettime(0x0, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000740)={0x0, 0x3, 'client1\x00', 0x4, "78edf51a8c7ed49b", "085366460e2c350fb8cf4f4f79d07d63c48cd3b00f1544d4ee13df3acd64508e", 0x7}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f00000006c0)={r6, 0x3}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000460fe4)={0x0, 0x0, 0x2, 0x0, 0x4, 0x8, 0x2000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x805}) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000753000/0x18000)=nil, &(0x7f0000000300)=[@text32={0x20, &(0x7f00000000c0)="0fc7280f080f20030f01727166ba4200b834000000ef66bad10466edb81da1fb500f23d00f21f835300000050f23f8c4c3194bfc360f20030fc76d08", 0x3c}], 0x1, 0x7, &(0x7f0000000380), 0x10000181) ioctl$KVM_RUN(r5, 0xae80, 0x0) 2018/03/29 16:07:22 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x0, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:22 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:22 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) 2018/03/29 16:07:22 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpgid(0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) sync() socket$packet(0x11, 0x0, 0x300) r3 = memfd_create(&(0x7f0000000100)=']\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r5, &(0x7f0000000100)=ANY=[], 0x1023c) fadvise64(r4, 0x0, 0x0, 0x0) r6 = inotify_init1(0x0) r7 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r6, r7) clone(0x0, &(0x7f0000000200)="17dd6280de3693223b6fdbc70650db5722605e7d4cfec7dee9e7ca3a83bd750a10fca3bdd2c2fde305012a95b619af30af684bba6e9e2031b1eec7e667e9c22c674d6eb942b78258369909dc14f2f5bd60202d6a38d497b47baf3e89fbca89a91e4706f3efdb55b9e9857fa2e05fdd62de157a7f60228f2c", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000300)="f74dda") epoll_wait(r3, &(0x7f00000003c0)=[{}, {}, {}, {}], 0x4, 0x0) getsockname$inet6(r3, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r3, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000640)=ANY=[@ANYBLOB="a01675bc"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000580), &(0x7f00000005c0)=0x4) r8 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x6, 0x1) ioctl$SIOCSIFMTU(r8, 0x8922, &(0x7f0000000340)={'ipddp0\x00\x00\b\x00'}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendto$inet(r1, &(0x7f0000de1fff), 0x0, 0x20008045, &(0x7f000057f000)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000001080)="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", 0x1026, 0x3fff, 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr, @in6=@remote}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) 2018/03/29 16:07:22 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x0, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:22 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x0, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:22 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) read(0xffffffffffffffff, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x0, @mcast2={0xff, 0x2, [], 0x1}}], 0x1c) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r4, 0xaeb7) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0xf9, "501382ae20709b31de4e6cb8eb9cff0cc19e45b05177968e70129db85a35e1dc82bd41ff5c9685c89e78a929049c677859ee28ad34accb91d694e227b1799dba380dbcc1c1b38a78e58656d65143d2fbb2e62742693132a6d3694a2d48425825a6f5566bbc7576f4c7b9d1be652b48f7368f228370c1c28fe80130ebb80bacd08d76832a69734e05d3b1a0e8aacdb8dce3df3a7c0e3c4cf833edeebc78b8a2a30af65b14b3acd55c21dd797ce616ed2098c37fab9deaa88b4fb7c73481476d03efbc4d7ba10d88d9055f8ac7db319516c833547884cb1cc35582d0f09efe7d263b47ff538093c76c95e1dee08ea0c798c7b619e5209bcb5d5b"}, &(0x7f0000000080)=0x101) getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000240)={r6, 0x5, 0x0, 0x800}, &(0x7f0000000280)=0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x0, &(0x7f0000000040), 0xffffe1e) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2018/03/29 16:07:22 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) 2018/03/29 16:07:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x0, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x0, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x28042, 0xfffffffffffffffc) fallocate(r0, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) 2018/03/29 16:07:23 executing program 5: socket$bt_cmtp(0x1f, 0x3, 0x5) r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000002c0)) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="e00000027f00000100007e5c1d54f3000400000000000000016cd18c178d938c4a82c50894dcb7e0f10f07f9a8b06aa9f4067f62ee26968524bbd7ccfb5b3a0edce1d98d59d9575b600d51cefc4971e654ec94229baf0481a15934cfbd5c782b3e699c34c780fc9f5d91d414fca16e7f853cbff84fcc072db2f8fbc77cc5862591e81f85a3e713db9c3973528a4905293e9d01042fefda80157bf2ac05c3412af9568a513cbb3c6544cc4e2eb7b876edbaab5c023f7e435c2b5332785c9c443c14434177b503aee67fd50521e3ed1530bdb42b80cd1bff41cc0762a8d708b7fd38d20c53897b311524b23ae46429f27affde"], 0x14) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x25, &(0x7f0000231000)={@multicast2=0xe0000002, @loopback=0x7f000001, @loopback=0x7f000001}, 0xc) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x173382, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000380)={0x5, r0, 0x1}) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000300)={0xff, @broadcast=0xffffffff, 0x4e23, 0x1, 'none\x00', 0x25, 0x8, 0x17}, 0x2c) setsockopt$inet_tcp_int(r1, 0x6, 0x1f, &(0x7f00000001c0)=0x493, 0x4) setsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f0000c26000)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}, @broadcast=0xffffffff}, 0xc) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x77359400}}) r3 = socket$inet(0x2, 0x2, 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) r5 = gettid() sched_getparam(r5, &(0x7f00000000c0)) r6 = socket$inet(0xa, 0x801, 0x0) setsockopt$sock_linger(r6, 0x1, 0x33, &(0x7f0000000280), 0x6) r7 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x8, 0x100) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r7, 0x28, 0x6, &(0x7f0000000240)={0x0, 0x2710}, 0x10) connect$l2tp(r4, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2, 0x0, 0x4}}, 0x2e) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x80000000, 0x482200) close(r3) connect$l2tp(r0, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e22, @rand_addr}, 0x2, 0x0, 0x4, 0x1}}, 0x2e) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) 2018/03/29 16:07:23 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d}, 0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x1000, &(0x7f0000000040)=0x0) sendmsg$can_bcm(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x1d}, 0x10, &(0x7f0000000580)={&(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000be8ac2688e3f1b1b"], 0x48}, 0x1}, 0x0) syz_open_dev$urandom(&(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x80082) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x9) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000080)="070000008cf46cfde19a4e3bcfbdbedee32e68b3a251fd2cfd09684d9c7afae320bbf22a2ce3cb58fa63c42a238cb85f1023fa813c9a0e46", 0x38}]) 2018/03/29 16:07:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:23 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) read(r2, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(0xffffffffffffffff, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(r2, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x0, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:23 executing program 2: sendmsg$alg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="60c49f1c23119633f124fbb7f003732f3e8e39c9f701aa7f7239aa37343e8ec331714b77c196ef0a89293b50b94a2fe15c9cf5b67927a12239e522c699612a2573e4a54fc64e2d069f1aa7a089bd7f4f2e4a68a681d3400731653ad46d93140ba2", 0x61}], 0x1, &(0x7f0000001480)}, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000000)={'rose0\x00', @ifru_addrs=@ethernet={0x1, @random="04a114643c95"}}) 2018/03/29 16:07:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) bind(r0, &(0x7f0000000040)=@in6={0xa, 0x4e23, 0x4a69, @dev={0xfe, 0x80, [], 0x15}, 0x6}, 0x80) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) [ 62.488282] IPVS: set_ctl: invalid protocol: 255 255.255.255.255:20003 none 2018/03/29 16:07:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) read(r2, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(0xffffffffffffffff, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(r2, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:23 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, 0x0, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x80, 0x9, 0x96, 0x400}, &(0x7f0000000100)=0x14) 2018/03/29 16:07:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000), 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:23 executing program 2: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000001, 0x0, 0x100000001}, 0x1c) bind$packet(r0, &(0x7f00004a9000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}}, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f00000000c0)={0x3, 'vcan0\x00', 0x2}, 0x18) close(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000080)={0x7fffffff, 0x5, 0xffff, 0x0, 0x3, 0x4}) 2018/03/29 16:07:23 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0xfdc8) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000100)={0x9, 0x1, 0x1000, 0x80, 0x1}, 0xc) writev(0xffffffffffffffff, &(0x7f00000013c0)=[{&(0x7f0000000380)}], 0x1) perf_event_open(&(0x7f0000223000)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002880)={&(0x7f0000001380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000025c0)=[{&(0x7f00000024c0)}], 0x1, &(0x7f0000002600)=[{0x10}], 0x10, 0x800}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000001240)={'teql0\x00', 0x0}) recvfrom$packet(r1, &(0x7f0000000240)=""/4096, 0x1000, 0x102, &(0x7f0000001280)={0x11, 0xc, r3, 0x1, 0xdce0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') mlock2(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x7fffffff, 0x7, 0x5, 0x3, 0x0, 0x200, 0x300, 0xe, 0x8, 0x1, 0xffffffffffff0001, 0x4, 0x38, 0xfffffffffffffbea, 0x8, 0x4, 0x7fffffff, 0x4, 0x2, 0x3ff, 0x4, 0x3ff, 0x5, 0x8, 0x1f, 0x1, 0x200000000, 0x1f, 0x7, 0x8000, 0x3, 0x80000000000000, 0x1, 0x9, 0x27d4, 0x7f, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x3, 0x7fff}, 0x800, 0x5, 0xb2ce9d1, 0x3, 0x7d, 0x8001, 0x3}, r4, 0x6, r0, 0xa) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4003, &(0x7f0000000000)=0x9e, 0x7e, 0x5) [ 62.603654] IPVS: set_ctl: invalid protocol: 255 255.255.255.255:20003 none 2018/03/29 16:07:23 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, 0x0, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 2: r0 = perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000100)=0x1) read(r0, &(0x7f0000000280)=""/50, 0x32) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x5c, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x5c, "8dbbc693cbcdb6da0870f3ea570e2c74cefc40cd9ea2f5a2cf45916bdec155afedd2f5ed6a646a3836dcf16e581508c0bf827546b3b708745aaa7d0307513735a8f2f4bddc138046698fd857c31b3d8095baac40190ac925be24144e"}, &(0x7f0000000080)=0x64) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0x9, 0xfff, 0x4, 0x451, 0x5a, 0x800, 0x7c57, 0x1ff, r3}, &(0x7f0000000200)=0x20) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f000001cfb0)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xf}) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000240)='hybla\x00', 0x6) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) fcntl$setlease(r1, 0x400, 0x2) 2018/03/29 16:07:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000040)={{0x0, @dev={0xac, 0x14, 0x14, 0x10}, 0x4e24, 0x4, 'wlc\x00', 0x4, 0x3, 0x1a}, {@empty, 0x4e23, 0x7, 0x7, 0x7, 0x942a}}, 0x44) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0), 0x2) 2018/03/29 16:07:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:23 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) read(r2, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(0xffffffffffffffff, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(r2, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000), 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0x0, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:23 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/protocols\x00') ioctl$fiemap(r1, 0x40286608, &(0x7f0000000140)=ANY=[@ANYBLOB="a8815f02d155bf0c8c354bb7a873f60aaeb70c2edab419ff47c9c1b629ddc76945e81462068160c9c9133503a3c72f4b797c764c6daa30a3d597b4b498dac4693e4b5b6677b1270a4f6b8747fd7d362cd7e83141ea82d1be207da824a762bf44caa30c1b15f25ff4c5ddd8054b9f1b382421ab58a5d123e04bbea1cb11aacc4e2542a728aeb29e7cf84802d6cac77c58d7b013819a307992908bebb4d74d338fc16858fc7782463a08236c36fa272969da1f38cddf88a221351822a99c5d1eb4c90ffe3c8137c3c536b2fe3933962279dfe66408624935126bba6f9a5cca0a0951b6a2de6bb3c26331f689dd5638f77d19839eb3046f6e28"]) 2018/03/29 16:07:23 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, 0x0, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000), 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:23 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:23 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000040)=""/58) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000080)="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") syz_open_dev$audion(&(0x7f00000010c0)='/dev/audio#\x00', 0xfffffffffffffff9, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000001080)={0x7, 0x2}) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001b4ff6)='/dev/ptmx\x00', 0x106, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7fffffff, 0x10000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000002c0)={0x4, &(0x7f0000000280)=[{}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000340)={r2, 0x2}) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000100)={0xfffffffffffffc01, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x2}) writev(r0, &(0x7f00000b5000)=[{&(0x7f0000000000)="ebb29c2aa804af648d63b2908439b40213", 0x11}], 0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8001, 0x0) r4 = memfd_create(&(0x7f0000000080)='vboxnet1\x00', 0x2) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000000c0)=0xaca, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000480)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f0000000300)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000200)={0x2, 0x4001, 0x400, 0x4, 0x75}) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000f00)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001000)=0xe8) r8 = fcntl$getown(r3, 0x9) fstat(r3, &(0x7f00000012c0)) sendmsg$nl_xfrm(r4, &(0x7f0000001780)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x10080201}, 0xc, &(0x7f0000001740)={&(0x7f00000060c0)=@expire={0x118, 0x18, 0x2, 0x70bd26, 0x25dfdbff, {{{@in6=@ipv4={[], [0xff, 0xff]}, @in=@dev={0xac, 0x14, 0x14, 0x19}, 0x4e22, 0x969, 0x4e20, 0xffffffffffffff40, 0xa, 0x80, 0x80, 0x0, r5, r6}, {@in=@multicast1=0xe0000001, 0x4d5, 0x6f}, @in=@loopback=0x7f000001, {0x4, 0x2, 0x400, 0x800, 0x0, 0x8, 0xfffffffffffff2b2, 0x80000000}, {0xff, 0x6, 0x6ea, 0x100}, {0x4, 0x0, 0x4}, 0x70bd2c, 0x34ff, 0x2, 0x7}, 0x7d6}, [@replay_thresh={0x8, 0xb, 0x8}, @replay_val={0x10, 0xa, {0x70bd28, 0x70bd29, 0x9}}, @extra_flags={0x8, 0x18, 0x6}]}, 0x118}, 0x1}, 0x8010) sendmsg$netlink(r4, &(0x7f00000016c0)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001600)=[{&(0x7f00000001c0)={0x10, 0x21, 0x70a, 0x70bd28, 0x25dfdbfe}, 0x10}, {&(0x7f0000001040)={0x148, 0x34, 0x8, 0x70bd2a, 0x25dfdbfe, "", [@nested={0xdc, 0x84, [@typed={0x8, 0x57, @uid=r7}, @generic="08fff29d136d6540140b61b532554275250d045ff852d1e88f0ffddb8b9d4bdc67ccdec47cd5d7fa546dda412bbf285c1625a0e079009d22566dbf2d3cf854df32e79b0c7738436e3dd87679a35d21ede1f0764f05ab942e3c14638690f27bf57bd60cefdf7aa0e827511e582c04e522524efe392b8571c8e1f0d5dd616941003e98db58dce38c8aafdc695136ffcb8612cc315bd48d37be15324aa557891c1c61cd944ed28bd1", @generic="5b2882039de51504f87fbf9193f879c856ee113edc61c4b71cebcfa4f1d7517142814091e861"]}, @generic="7533b799bd3d8584a2a1970cbfa145b86f53e54516d6b2149084033c78614c6b80a937f5ede55b4c94bc40f044f2dd0bac9214cd9a97a8eba3001565a14b184eff0218ce3c84f6b1889965ee7de44f8b4289e280837c96bff7fc"]}, 0x148}, {&(0x7f0000003cc0)={0x221c, 0x28, 0x620, 0x70bd28, 0x25dfdbfb, "", [@nested={0x2010, 0x91, [@generic="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", @typed={0x8, 0xf, @ipv4=@loopback=0x7f000001}, @typed={0x1004, 0x68, @binary="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"}]}, @generic="1694681126b4252cb59da2bfa47467514c0631070acb242132349d682c1135b89bb15addb257297624376fc08eb5f1bf74bf9c1da1a318d21083d472f00016daddb56f603547287f076f5e56557c37753c3226b253d8279e7b53fca63f4e45b358d67ccf48a81f9877d3133662d3ee297b3baa7ffb058a4d6df4b0a1a23ed2a15643a348fd252cc4300ab0e234fa437ee5d84b45042672128b8b311e3432ec1cf75a58f97c47e03dd09cc9707a36177199dd13c58ab0e9ae06883e9361772aaf04b35aa3ff379dec55cd7c84b7e87c69573d7bb3c496d341508d3740848a6a81dabdf080320d2a0e11", @nested={0xf8, 0x40, [@generic="2b4e2623be4c65b5fca9493fc22288c4e5ce20b841cffeea99ea15294883aaeadad4b8d91601b8e1fe9f89ca3de2d7dc8a0b911cec01c6100dd081ccd5ecff79e327a68b4a1ed6d3bbab80896f3a4dfe3ed911afb71ab5791d700ffadefa64e794e4fb0dcebcf3ae4dacaf24ee0544c7ef512ad0df94be949a4c7fd17246dc0c96dbebd05c510b7d08b5d558c56e4084f4a592b93fdd9d578fba1fc07838cfae291d17d4d1c604a648200949e2bb17bc3910b82cbb56981745cbb50a5b0f7055b8", @generic="9b5c9d17cecf193d3b9d36ab4a3c3b067b01155907a9f14bdcfa6362fc59ab5b1088ecc3842f42837e6bf6c225d0bc3149cc32"]}, @typed={0x8, 0x30, @ipv4=@dev={0xac, 0x14, 0x14, 0x13}}, @typed={0x10, 0x15, @str='/dev/ptmx\x00'}]}, 0x221c}, {&(0x7f0000001200)={0x10, 0x14, 0x301, 0x70bd29, 0x25dfdbfd}, 0x10}, {&(0x7f0000001240)={0x18, 0x1a, 0xf00, 0x70bd29, 0x25dfdbfc, "", [@typed={0x8, 0x37, @pid=r8}]}, 0x18}, {&(0x7f0000001340)={0x104, 0x42, 0x1, 0x70bd2c, 0x25dfdbff, "", [@typed={0x8, 0x1d, @fd=r4}, @nested={0xec, 0x29, [@generic="a55c7279b2d595d14edca87443487b5b3a3abb64336e0aedda34d1ecabd8e1611df24388ed294ebf55355011c2036f22485c311954c3439ce06acb6c951e40cccf28ac954255ff384c3903aade558f77174ad5e40f846c076a7a413d5a8e7e7fb7b24efa9c06634f53cb2ab7d74aa072831f1266b6fb148bc6e85495b79f52142d23d5e5ff2ca662d4b95f2950bed85f915a75ee404e48e150f5a55058d9b77dd62755f862224a253c25fdeaf190e59d7f59d047cf1bbf0049822dccca64b022c13d6537a7bf4235ad0f8b21daad53b925", @typed={0x14, 0x96, @ipv6=@local={0xfe, 0x80, [], 0xaa}}]}]}, 0x104}, {&(0x7f0000001480)={0x10, 0x2a, 0x20, 0x70bd2d, 0x25dfdbfc}, 0x10}], 0x7, 0x0, 0x0, 0x8080}, 0x84) ioctl$TCSETA(r0, 0x5402, &(0x7f00000018c0)) socket$packet(0x11, 0x3, 0x300) 2018/03/29 16:07:23 executing program 2: r0 = socket$inet(0x2, 0x200000000003, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000000080)={0x0, 0xffffffffffffffc0, 0x0, 0x0, &(0x7f0000ffa000/0x1000)=nil}) openat$dsp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dsp\x00', 0x100, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000240), 0x8) socket$key(0xf, 0x3, 0x2) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) getgroups(0x3, &(0x7f0000000480)=[0x0, 0x0, 0x0]) fcntl$getown(r1, 0x9) signalfd(0xffffffffffffffff, &(0x7f00000002c0)={0x4}, 0x8) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000000)=ANY=[]) r3 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000000)=r3) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x1, &(0x7f0000000200)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f0000000300)=""/199}) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000040)={0x0, r3}) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000f82ffc)=0x4001) 2018/03/29 16:07:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0x0, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(blowfish)\x00'}, 0x58) recvmsg(0xffffffffffffffff, &(0x7f0000158000)={&(0x7f00002fffa0)=@nfc_llcp, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000da2000)}, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x20) gettid() r4 = getgid() r5 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f00000006c0)=0xe8) sendmsg$unix(r3, &(0x7f0000000a00)={&(0x7f0000000440)=@file={0x1, './file0/file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000440), 0xfffffddf}], 0x1, &(0x7f00000008c0)=[@rights={0x28, 0x1, 0x1, [r3, r3, r2, r3, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r4}, @rights={0x28, 0x1, 0x1, [r3, r0, r3, r1, r3, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x20, 0x1, 0x1, [r0, r2, r3]}, @cred={0x20, 0x1, 0x2, r5, r6}], 0xc8, 0x20008040}, 0x20004001) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f0000000ac0)=0x1) chdir(&(0x7f00000001c0)='./file0\x00') r7 = accept4(r0, 0x0, &(0x7f0000000200), 0x80000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f0000000300)=[{0x3, 0x8}, {0x8, 0xe0ec}, {0xf}, {0xe}, {0x2, 0x4}, {0x3, 0x400000000000}], 0x6) r8 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pid(r8, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000340)) chroot(&(0x7f0000000380)='./file0/file0\x00') truncate(&(0x7f0000000140)='./file0\x00', 0x3) r9 = request_key(&(0x7f0000000100)='syzkaller\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000003c0)='skcipher\x00', 0xfffffffffffffffb) keyctl$get_security(0x11, r9, &(0x7f0000000d00)=""/196, 0x1c4) 2018/03/29 16:07:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:23 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0x0, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:23 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x0) 2018/03/29 16:07:23 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000040)) 2018/03/29 16:07:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0x0, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0x0, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x0, 0x5, 0x4000b) 2018/03/29 16:07:23 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:23 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0x0, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:23 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) 2018/03/29 16:07:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:23 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000180)='attr/fscreate\x00') recvfrom$unix(r1, &(0x7f0000000080)=""/164, 0xa4, 0x40002143, &(0x7f00000001c0)=@abs={0x835b7f57247e3a5a, 0x0, 0x4e20}, 0x6e) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)=')', 0x1}], 0x1) 2018/03/29 16:07:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:23 executing program 0: getpgid(0xffffffffffffffff) readv(0xffffffffffffffff, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r0, 0x400) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r3 = dup3(r1, r0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(0xffffffffffffffff, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000200)={r4, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000340)={r4, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x0, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x40) fallocate(r0, 0x11, 0x0, 0x4000b) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x40) bind$unix(r1, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'bcsf0\x00', 0x4000}) 2018/03/29 16:07:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:23 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') chdir(&(0x7f0000cd2ff8)='./file0\x00') r0 = msgget$private(0x0, 0x0) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000040)=""/186) symlink(&(0x7f0000000140)='..', &(0x7f0000272ff7)='../file0\x00') r1 = creat(&(0x7f0000000100)='../file0\x00', 0x8) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000180)=0x5) rmdir(&(0x7f0000000200)='../file0\x00') 2018/03/29 16:07:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x0, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x0, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000040)={0x20, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x17}}}}, 0x88) sendmsg$nl_xfrm(r0, &(0x7f0000b2f000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f0000beeff0)={&(0x7f000065e000)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2=0xe0000002, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x0, 0x32}, @in6=@ipv4={[], [0xff, 0xff]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/03/29 16:07:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000040)={0x10000, 0x0, 0x9, 0x2}) 2018/03/29 16:07:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:23 executing program 0: getpgid(0xffffffffffffffff) readv(0xffffffffffffffff, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r0, 0x400) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r3 = dup3(r1, r0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(0xffffffffffffffff, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000200)={r4, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000340)={r4, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x0, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x3, 0x4000b) 2018/03/29 16:07:23 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) io_setup(0x8, &(0x7f0000000080)=0x0) socket$inet(0x2, 0x80807, 0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0xc2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x4, 0x4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r3, 0xb3dc}, 0x8) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000180)={0x4, r0, 0x1}) io_submit(r1, 0x1, &(0x7f0000001300)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000000c0)="ab", 0x1}]) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000200)={0x3, {0x2, 0x4e21}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x1, 0xffffffff00000001, 0x100000000, 0x20, 0x9578, &(0x7f0000000140)='bond0\x00', 0x1ff, 0x8, 0x1}) 2018/03/29 16:07:23 executing program 2: r0 = socket$inet6(0xa, 0xfffffffffffffffe, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000680), 0x4) setsockopt$inet6_buf(r0, 0x29, 0x14, &(0x7f0000000000)="ff55d36cffb9ffffef00000000070c0401000000", 0x14) close(r0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000005c0)=@nat={'nat\x00', 0x19, 0x2, 0x4f0, [0x200000c0, 0x0, 0x0, 0x20000468, 0x20000498], 0x0, &(0x7f0000000080), &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x4, 0x0, 'ipddp0\x00', 'teql0\x00', '\x00', 'bcsh0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0xff, 0xff, 0xff], 0x2d8, 0x340, 0x378, [@vlan={'vlan\x00', 0x8, {{0x1, 0x6, 0x0, 0x0, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x1d, [{0xfffffffffffffffc, 0x9, 0x3ff, 0x3}, {0x1, 0x2, 0x6, 0xfff}, {0x2, 0x2d, 0xfffffffffffffff9}, {0x1, 0x2, 0x80000000, 0xd257}, {0x200, 0x1, 0x7, 0x5}, {0x1, 0x9, 0x3c4, 0xb0}, {0x7fff, 0x5, 0x94, 0xffffffff00000001}, {0x1, 0x2, 0x9, 0x2a61}, {0x217a, 0x204, 0x8000, 0x2}, {0x293d, 0x3ff, 0x10001, 0x6}, {0x2, 0x8, 0x7, 0x8}, {0x9, 0x3f, 0x82, 0x1}, {0x10000000, 0x2, 0x3, 0x2}, {0x8, 0xfffffffffffffffe, 0x3, 0x4}, {0x6, 0x8, 0x5, 0xa4d2}, {0x80, 0x0, 0x80, 0x2b7f}, {0x8000000000000, 0x4125, 0x4}, {0x9, 0x5, 0x7, 0x8e1}, {0x7fffffff, 0x1, 0xfffffffffffeffff, 0xae9}, {0x8000, 0x3f, 0x1, 0x559f}, {0xa16, 0x4, 0x8, 0x9}, {0x7fff, 0x4, 0x4, 0x7}, {0xd77, 0x0, 0x1, 0x1}, {0xfffffffffffffff7, 0x3, 0x80000001, 0x9}, {0xff, 0x1f, 0x4, 0x2}, {0x7, 0x7, 0x8a9d, 0x800}, {0xff, 0x5, 0x0, 0x3}, {0x4, 0x6f, 0x0, 0x78}, {0xe884, 0x48d, 0x5, 0x6}, {0x89, 0x2, 0x401, 0x7}, {0xff, 0x9, 0x8000, 0x6}, {0x1, 0xffffffff, 0xb79, 0x8}, {0x3b, 0x1, 0x80, 0x7}, {0x4, 0x7, 0x401, 0x9}, {0x2, 0x7, 0x71, 0x9f}, {0x3, 0x7, 0x2, 0x4}, {0xfffffffffffffff8, 0x8000, 0x1, 0x3}, {0x2, 0x3, 0x1, 0x6}, {0x4d4a, 0x0, 0x1, 0x7}, {0xf6, 0x100, 0x7, 0xe1}, {0x400, 0x5229, 0x2, 0x6d6cbd42}, {0x3, 0x5, 0x80, 0x86b3}, {0x10001, 0xf7a, 0x7, 0xfff}, {0xffff, 0x2, 0xfffffffffffffff8, 0xfffffffffffffff9}, {0xfffffffffffffff8, 0xff, 0x4}, {0x8, 0xffffffffffffffc8, 0x9, 0x5}, {0x1000, 0x1f, 0x7, 0x1}, {0x3, 0x3, 0x27ef, 0xf4}, {0xfffffffffffff6c4, 0x9, 0x800, 0x10001}, {0x200, 0x2, 0xffff, 0x100000000}, {0x0, 0x0, 0x7ff, 0x2ed5}, {0xac3, 0x101, 0x9, 0x7f}, {0xe5, 0xf31, 0x8, 0xff}, {0x3, 0x6, 0x800, 0x101}, {0x34, 0x4, 0x7, 0xd506}, {0x8, 0x7, 0x8, 0x380000000000}, {0x7fff, 0x1, 0x7, 0x8}, {0x2f87fd, 0x5, 0x38f, 0x2}, {0xffff, 0x275, 0x0, 0xff}, {0xff, 0x3, 0x8001, 0x7fff}, {0x7ff, 0x4, 0x1ff, 0x9}, {0x6, 0x9, 0x5, 0x8001}, {0x9, 0x9, 0x81, 0x9}, {0xd9c7, 0x974c, 0xff, 0xffffffff}], 0x2}}}]}, [@common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}, @snat={'snat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x9, 0x10, 0x884c, 'ipddp0\x00', 'gre0\x00', 'vcan0\x00', 'nr0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"6a890abc4adb44500201d7f1563185b950264b2f9b0f0d81e770c17be2a3"}}}]}]}, 0x568) close(r0) 2018/03/29 16:07:23 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x0, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:23 executing program 0: getpgid(0xffffffffffffffff) readv(0xffffffffffffffff, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r0, 0x400) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r3 = dup3(r1, r0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(0xffffffffffffffff, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000200)={r4, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000340)={r4, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x0, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) fadvise64(r0, 0x0, 0x8d79, 0x1) ioctl$sock_netrom_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 2018/03/29 16:07:23 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x0, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-aesni-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) bpf$BPF_PROG_QUERY(0xc, &(0x7f0000001000), 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7f, 0x8000) r2 = eventfd(0x4) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000000c0)={0x3, r2}) socket$netlink(0x10, 0x3, 0xf) 2018/03/29 16:07:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f000072d000)='smaps\x00') readv(r0, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) read(r2, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r1, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(r2, r1, 0x0) sendmmsg(r0, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r0, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x0, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:24 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x4e, &(0x7f00000c6000)={{{@in=@broadcast=0xffffffff, @in=@rand_addr}}, {{@in=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, 0xe8) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = semget$private(0x0, 0x4, 0x1) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000080)=""/97) r2 = dup(r0) ioctl$KIOCSOUND(r2, 0x4b2f, 0x80) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000100)=""/4096) 2018/03/29 16:07:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:24 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) fallocate(r0, 0x11, 0x3ff, 0x4000b) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x1, 0x80000001, 0x81, 0x101, 0x0, 0x6, 0x82400, 0xa, 0x1000, 0x40000000000000, 0x3ff, 0x7, 0x6af, 0x200, 0xffffffffffffff46, 0x6, 0x5, 0x4, 0x8, 0x7, 0x6, 0x40, 0x7fff, 0x31b2, 0x7, 0x6, 0x7fffffff, 0x5, 0x5, 0x7fff, 0xffffffff, 0x8001, 0x10000, 0x2, 0x2, 0xfffffffffffff500, 0x0, 0xdb3, 0x1, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x2, 0x528, 0x2, 0x7f, 0x7, 0xcb}, r3, 0x6, r0, 0x8) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000180)=0x1, 0x4) 2018/03/29 16:07:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x0, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'dummy0\x00', 0x1}) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x48000}, 0x10) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x40000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010027bd7000fcdbdf25010000000800050003f30000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000040)={r0, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e20}, @in6={0xa, 0x4e20, 0xfff, @mcast1={0xff, 0x1, [], 0x1}, 0x5}], 0x2c) 2018/03/29 16:07:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f000072d000)='smaps\x00') readv(r0, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) read(r2, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r1, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(r2, r1, 0x0) sendmmsg(r0, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r0, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x0, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:24 executing program 2: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) r1 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="651ba577667915d46f2f791dfa196a804b80f833fcfb000000000000dec4bcc4d9896c138478283ee8f0d37e428b999dc287c6e8cb074ad89d7f886a1922f886bea8615716d024c639f2a871b2bc3426119e14010637309716e894ff9bae74cffee2e343a8e51fb82137d8291d9dafc6a1a52fee2def0169476a29cf808fc21a4f810013c0922322cdf32090a8b88bc4e1b37478b79a3e22bdc4a6abe3130640440dd78c8856f1a1bc4761e1448c8d804ff7a8efa210a912496221444edd129770aa677b731d3c9835b59c7070c7000000000000"], 0x10}, 0x0) munlockall() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f00000001c0)=""/90) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x1a080, 0x0) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000280)={"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"}) 2018/03/29 16:07:24 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0x0, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'tunl0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e22, 0x0, 0x4e21, 0x212, 0xa, 0x0, 0x0, 0x0, r1, r2}, {0x8000000000000, 0x4, 0x9, 0x6e, 0x10000, 0x0, 0x4, 0x7fff}, {0x0, 0x1, 0x3, 0xff}, 0xfffffffffffffff8, 0x6e6bb9, 0x0, 0x0, 0x1, 0x1}, {{@in=@broadcast=0xffffffff, 0x4d5, 0xff}, 0xa, @in=@multicast1=0xe0000001, 0x3507, 0x0, 0x0, 0x9, 0x5, 0x1, 0x8}}, 0xe8) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) fallocate(r0, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r0, r0, &(0x7f0000000080), 0x6) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r0, &(0x7f0000000040)=0x20000000, 0x10001) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x8, 0x2) r3 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x90402) bind$netlink(r2, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbff, 0x10}, 0xc) ioctl$PPPIOCGFLAGS(r3, 0x8004745a, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000200)={0x101}, 0xfffffffffffffdc9) fallocate(r1, 0x11, 0x0, 0x8001) 2018/03/29 16:07:24 executing program 2: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='user.syz\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) rename(&(0x7f0000000240)='./control/file0\x00', &(0x7f0000000300)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/03/29 16:07:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x0, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0x0, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f000072d000)='smaps\x00') readv(r0, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) read(r2, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r1, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(r2, r1, 0x0) sendmmsg(r0, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r0, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:24 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0xa) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0x0, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x4000000000001, 0x400001) readlinkat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/159, 0x9f) unshare(0x28060400) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000100), 0x0, 0x0) 2018/03/29 16:07:24 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x1) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={0x0, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:24 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/kcm\x00\b\x00') ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000080)=0x6, 0x4) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) sendmsg$kcm(r0, &(0x7f0000002700)={&(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)}, 0x40010) sendfile(r2, r1, &(0x7f0000dbf000), 0xffff7ffc) 2018/03/29 16:07:24 executing program 4: open(&(0x7f0000000100)='./file0\x00', 0x60000, 0x22) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x200000) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x28041, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000080)={0x2, 0x0, [0x2, 0x9, 0x81, 0x8, 0xfffffffffffffff8, 0x8fa, 0x8ad8, 0xff]}) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x0, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:24 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28043, 0x100) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000100)={0x10000, 0x0, [0x8081, 0x6, 0x6, 0x4, 0x269, 0x400000000c6, 0x9, 0x1]}) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)={0x2, 0x9, 0x3, 0x454, 0x5, 0x4, 0x9, 0x1, 0x6, 0x7}) r2 = gettid() perf_event_open(&(0x7f0000000080)={0xfffffffffffffffc, 0x70, 0x0, 0x4, 0x1f, 0x8, 0x0, 0x1, 0x10080, 0x1, 0x0, 0x0, 0x41, 0xfffffffffffffa9f, 0x3de, 0x400000003, 0x9, 0x6d, 0xfff, 0x9, 0x9, 0x5, 0x2, 0x6, 0x7, 0x5, 0x7fff, 0x6, 0x2, 0xfffffffffffff899, 0x6e0, 0x2, 0x7, 0x401, 0x5f61a062, 0x1, 0x3, 0x9, 0x0, 0x0, 0x5, @perf_config_ext={0x101, 0x800}, 0x8000, 0xc7e, 0x5, 0x5, 0x0, 0x2, 0x5}, r2, 0x3, r1, 0x0) timer_create(0x3, &(0x7f00000001c0)={0x0, 0xc, 0x0, @tid=r2}, &(0x7f0000000200)) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r1, &(0x7f0000000180)={r1, r0, 0x8}) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) fallocate(r1, 0xfffffffffffffffe, 0x0, 0x4000b) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000340)) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000280)={0x4, {{0x2, 0x4e23}}}, 0x88) 2018/03/29 16:07:24 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x100, 0x0) close(r0) sendmsg$alg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000100)="11deed4eec87941f1479618d3b14804b7e246bc0bae1b2e0d62d7e2dd48c8043b5351ff3011365e09ed04b37bc5a8d2afd64e71af0fd2b15d3e2362f190eac723e3f073710f95d89c006d4a02b4c99b7cd8307792efb48392ab44746fafabb71b3a0429eea0751c4d33b66b7465162243b4b703ada6a5d041839ed64318d8931f94eb634ca5e267c03769585f8ec4aaeea938e991da701dc6ce4f41266d9f5c65fb122e575a858db3d3404d8e1131cff97e88f1b1b7b2b5310319e284e310ebc76a237427fdece8f542ae45f", 0xcc}, {&(0x7f0000000200)="535c33bb8e9815c2ed7b7fb6f09c40bef05dcd3b5ce01b8f15315795805aa6b13bed61641d548ed4128b531fae727aa699d669b22ee1445c32cbbe86485fb9106daa9fe7375ca759e8bdaf3fd95f9a6a7a8ca448ea255d0dc0619de553b35ea5a88b588417858810ea680c959e07b9f7046d58b86cb520595594d845a69682d9cb913015125a687c2866bfe5cf15206f3a2ac798e404eed999be0eb01884fcb113cb6dd237720c235f1db2c1bc0bc5b08c0d827b0aeb12f87c9467b5b838c7ae1b63b17f25df2e67d3824982e4d50526cd57f03a8a", 0xd5}], 0x2, &(0x7f0000000340)=[@op={0x18, 0x117, 0x3}], 0x18, 0x8000}, 0x4000) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0x424000, 0x0) tee(r0, r1, 0x3, 0x1) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f00000003c0)=""/195) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000500)={{0xa, 0x4e24, 0x1, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x98d}, {0xa, 0x4e24, 0x40, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x0, [0xa5, 0x8001, 0x19d, 0x1f, 0x7, 0xfff, 0x7, 0x7fff]}, 0x5c) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000005c0)=ANY=[@ANYBLOB="020000000000000000000906efd3e5320711e57b85025a6b35f9ec5584f08fde38ef0f329385535941c1c491d115592d2d0347c9ae74b4db1774a424f7add76827c9c4db5074e1a191b960dbe3b54ebd0af12f5a76857ea7205ea34536a4e8f00b57972c0f34d7c8426a5fca7c63968e22878e"]) 2018/03/29 16:07:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x0, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x1) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={0x0, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:24 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:24 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x40}) read(r0, &(0x7f0000000180)=""/68, 0x44) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000003000/0x4000)=nil, 0x4000}, 0x1}) sched_setaffinity(0x0, 0x8, &(0x7f0000cd3ff8)=0x1) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}}) clone(0x0, &(0x7f00007d1fff), &(0x7f0000001ffc), &(0x7f0000915ffc), &(0x7f00002d5fff)) read(0xffffffffffffffff, &(0x7f0000000200)=""/100, 0x64) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x74, 0x40) setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000040)=0x7fffffff, 0x4) 2018/03/29 16:07:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = accept$inet(r0, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140)={0xffff, 0x2, 0x5, 0x9, 0x9, 0xf6, 0x7318, 0x3, 0x1, 0x516a, 0x5}, 0xb) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000001, 0x800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000280)={r3, 0x3}) r4 = socket$packet(0x11, 0x800000000002, 0x300) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r5 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x3db7, 0x3) getsockopt$inet6_tcp_int(r5, 0x6, 0x0, &(0x7f0000000340), &(0x7f0000000500)=0x4) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000380)="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", 0x147) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000200), &(0x7f00000001c0)=0xfffffffffffffd87) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f00000002c0)={'raw\x00', 0x2, [{}, {}]}, 0x48) 2018/03/29 16:07:24 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x1) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={0x0, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:24 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)={0x6, 0x800, 0x3ff, 0x4, 0x9, 0xb2ba}) fallocate(r0, 0x11, 0x0, 0x4000b) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8, 0x44000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x80}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r2, 0x3}, 0x8) 2018/03/29 16:07:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x0, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x0, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:24 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x0, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:24 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0xfffffffffffffffe, 0x4000b) 2018/03/29 16:07:24 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], &(0x7f00000024c0)=0x1) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x0, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x2, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x11}, 'syzkaller0\x00'}}) r1 = perf_event_open$cgroup(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r1, 0x80000) syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x6b, 0x8200) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0xfffffffffffffff9, 0x200, 0x9, 0xee9, 0x0, 0x0, 0x80, 0x8, 0x6, 0x80000001, 0x1, 0x7, 0x80, 0x0, 0x8001, 0x374, 0x0, 0x10001, 0xfffffffffffffffb, 0x3, 0x80000000, 0x3, 0x6, 0x11, 0x6, 0x0, 0x5e, 0x1, 0xffffffffffff9475, 0x10001, 0x4, 0x4, 0x0, 0x0, 0x5, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0x10000, 0xffff}, 0x2000, 0x7, 0x3f, 0x3, 0x4, 0x1000, 0x33966226}, r2, 0xe, r1, 0xa) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_dev$dspn(&(0x7f0000000540)='/dev/dsp#\x00', 0x3, 0x260800) getpeername$unix(r2, &(0x7f0000000180), &(0x7f0000000080)=0x6e) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x6}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000003c0)={r3, @in6={{0xa, 0x4e24, 0x9, @loopback={0x0, 0x1}, 0xfff}}}, &(0x7f0000000480)=0xffffffffffffffc0) ioctl$sock_ipx_SIOCIPXCFGDATA(r2, 0x89e2, &(0x7f0000000380)) 2018/03/29 16:07:24 executing program 5: ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x40) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00007f3ffb)='yeah\x00', 0x5) syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000300)={0x0, 0xf1c}, 0x8) restart_syscall() ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f00000001c0)={0x0, 0x7}) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffd79, 0x20000000, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0xc) fcntl$setpipe(r0, 0x407, 0x0) shutdown(r0, 0x1) 2018/03/29 16:07:24 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x9) fallocate(r0, 0x11, 0x0, 0x4000b) ioctl$TUNSETLINK(r0, 0x400454cd, 0x204) [ 63.975614] syz-executor6 (8312) used greatest stack depth: 15640 bytes left 2018/03/29 16:07:24 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x0, 0x800) getpeername$inet6(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) prctl$setfpexc(0xc, 0x80000000020083) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r1, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000140)='skcipher\x00', 0xfffffffffffffffc) r2 = msgget$private(0x0, 0x27a) msgrcv(r2, &(0x7f0000000440)={0x0, ""/156}, 0xa4, 0x0, 0x800) r3 = accept$packet(r0, 0x0, &(0x7f0000000180)=0xffffff4a) getsockopt$packet_int(r3, 0x107, 0x10, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r4 = getpgrp(0xffffffffffffffff) prctl$setptracer(0x59616d61, r4) request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='\x00', 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000400), 0x4) 2018/03/29 16:07:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x0, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(0xffffffffffffffff, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:24 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], &(0x7f00000024c0)=0x1) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr/exec\x00') perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000100)='/selinux/status\x00', 0x0) sendfile(r2, r1, &(0x7f0000000200), 0x10000) r3 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000240)={{0x2, 0x0, @rand_addr}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0), 0x0, 0x0) 2018/03/29 16:07:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x0, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x0, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:24 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x40000000028042, 0xf1e9bf35513f86f) fallocate(r0, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], &(0x7f00000024c0)=0x1) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x0, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(0xffffffffffffffff, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:24 executing program 2: r0 = perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = geteuid() stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r2, r3) r4 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x19, &(0x7f000074fffc)=0x3, 0xa9) r5 = getpgid(0xffffffffffffffff) r6 = getpid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000004c0)={{0x9, r2, r3, r1, r3, 0x80, 0x18e}, 0x9, 0x8000, 0x9, 0x4, r5, r6, 0x7}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000200)={0x4, 0x8, 0x100000000, {0x77359400}, 0x1f, 0x100000000}) r7 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x802) r8 = dup(r4) setsockopt$inet6_tcp_int(r4, 0x6, 0x20000000000000, &(0x7f0000000600)=0x81, 0x4) ioctl$int_in(r4, 0x5421, &(0x7f0000000000)=0xfc) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000440)=@int=0x7, 0x4) sendto$inet6(r4, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$DRM_IOCTL_AGP_ENABLE(r8, 0x40086432, &(0x7f0000000140)=0x380) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="7f0006005a4306000801000600"], &(0x7f0000000080)=0x2) ioctl$BINDER_GET_NODE_DEBUG_INFO(r7, 0xc018620b, &(0x7f00000003c0)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r7, 0xc018620b, &(0x7f0000000480)={r10}) setpriority(0x1, r5, 0x80000000) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f00000000c0)={r9, 0x5, 0x1, 0x100, 0x6, 0xac2}, 0x14) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000580)=0x1, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r8, 0x400442c8, &(0x7f00000002c0)=ANY=[@ANYRES32=r8, @ANYBLOB="1f00000029c5469648cb991166927d76ffbfb48c0ba15fa9a2cef2f9e0f4f15620a0116cf961e568882455531bce4cd1e3f79d25442951da9798400ff7e04889faea079415a24d022264226d35b6de3bb3d5589ce80959b9747999d77e7004278f201d0219861a1c472acdd6355eb0fd7efa140ae075fdef1ffc2f73e4afff1662f7e7436543ba0734140e40b3414ee2096bd534ae9f5fd10f5e80597cdbafb16767631a9dc4da6f28af1740ecf17927431b8a58646158bbe503e1d19c2f04cbf0612aa9ea9f1a22c8f9"]) r11 = open(&(0x7f0000000540)='./bus\x00', 0x141042, 0xa2) ftruncate(r11, 0x7fff) sendfile(r8, r11, &(0x7f0000000400), 0x8000fffffffe) 2018/03/29 16:07:24 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f000000b000)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f000000d000), &(0x7f0000048000), 0x0) socket$l2tp(0x18, 0x1, 0x1) 2018/03/29 16:07:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:24 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x6750e9c2, 0x4) fallocate(r0, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x0, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x5b) 2018/03/29 16:07:24 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(0xffffffffffffffff, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:24 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80), 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x0, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x5b) 2018/03/29 16:07:24 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:24 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x400, 0x10000) ioctl$TIOCNOTTY(r0, 0x5422) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000080)) ioctl$TIOCSETD(r1, 0x5412, &(0x7f0000000000)=0xfffffdfd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000100)=r2) ioctl$KDSKBLED(r1, 0x4b65, 0x7) 2018/03/29 16:07:24 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r0 = socket(0x11, 0x4000000000080002, 0x0) rt_sigsuspend(&(0x7f0000000000)={0xde}, 0x8) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x717) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) 2018/03/29 16:07:24 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400100, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000080)=""/107) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) socket$nl_netfilter(0x10, 0x3, 0xc) unshare(0x8400) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000140), 0x4) ioctl$TIOCNOTTY(r1, 0x5422) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x400, 0x2000) 2018/03/29 16:07:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x0, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x5b) 2018/03/29 16:07:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:25 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:25 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) getpgid(r0) tkill(0x0, 0x1c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b3fdc)={0x0, 0x1000000000000000}) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) getsockopt$inet6_int(r2, 0x29, 0xd0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write(r1, &(0x7f0000000200)="397ad0c9edffe9486f1748144523c0c253773e00d4bba29028eac32e8de58f5930fd4c8ebb78dcf50bbc54c90c0ea17b4763dde5f902dfc811b38375640258335444c9fe3d138b122315ff5baf945f522c26157fdc4fa3d48f3a08b59a3bb57755976f1bcc37f3e0169da898335fd7552450a48204c4c44cb728f06f1bbbd9e01197ad56076dfc57da2fbd661c0108afb286a0a34eb68ef227d93685df20229d0e6f86", 0xa3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) r3 = syz_open_pts(r1, 0x41) writev(r3, &(0x7f000036ef90)=[{&(0x7f0000dcb000)="10", 0x1}], 0x1) ioctl$TCSETS(r3, 0x5402, &(0x7f0000a30fdc)) sched_getaffinity(r0, 0x8, &(0x7f0000000140)) syz_open_pts(0xffffffffffffffff, 0x8000) 2018/03/29 16:07:25 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x8, 0x4000) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) accept4$bt_l2cap(r1, &(0x7f0000000280), &(0x7f00000002c0)=0xe, 0x800) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1004000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xf8, 0x0, 0x201, 0x70bd2a, 0x25dfdbff, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffe01}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xaf}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x47cf}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x14}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x37}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffffffff}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x51}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1ff}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x80}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffff81e}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xf35}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x20}]}, 0xf8}, 0x1}, 0x4044801) fallocate(r2, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r0, 0x5b) 2018/03/29 16:07:25 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x8004, 0x4) fallocate(r0, 0x0, 0x0, 0x5) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x8) splice(r0, &(0x7f00000000c0), r1, &(0x7f0000000100), 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000040), 0x80000001) sendfile(r1, r0, 0x0, 0xc08f) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) capget(&(0x7f0000000200)={0x20080522, r2}, &(0x7f0000000240)={0x5, 0x100, 0x4, 0xdcd, 0x3508, 0x3ff}) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000180)={0x6, &(0x7f00000001c0)=[0x3, 0x400, 0x7fff, 0x8, 0x3f, 0x7fffffff]}) 2018/03/29 16:07:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x0, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80), 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:25 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:25 executing program 2: socket$bt_rfcomm(0x1f, 0x1, 0x3) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="94666f1c3e786d94e25cbba5a739fb9c", 0x10) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x141800, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x8001, 0x0) r3 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x8, 0x101000) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000200)=0x8, 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f00000002c0)=r4) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'system.', '^\x00'}, &(0x7f0000000380)='\x00', 0x1, 0x1) getpid() bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r1, &(0x7f00000003c0)="057b1f7ebbbe34600100064291145aaace2f909a9208ab1286fc812352a0d77a5e1143c1e626087ed6a88e91069230cb8344b5fb6027f5d2461716bdcf6d59bb7e0ee39d35d368351942a96d0e5fb28761f3b38b4d9390e27c83909571966179a0a4a7fab2e725cef8322ed1b458187b071cb478a1e6a924170e178329e2df7ac757e2b78a54eae6088f7b3e3c6925ebb1822bfc158bed42ec62f5dadb6b2b7875964195459481c11848368179aee3205ffa865880d72b48a508fe28c1e5ec6d175ad27bc8918a585b6e09d906e92a62f48b5bd246abb2191cf831d0860a855346c2d1c08fac6e19b185", &(0x7f00000004c0)=""/26}, 0x18) lsetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=@random={'user.', '^\x00'}, &(0x7f00000005c0)='securityposix_acl_access&\x00', 0x1a, 0x1) write(r1, &(0x7f0000000600)="f23ba06c6d037ef66922047a09f8ceaa96eefc78a086c9aa41561fb8e75a5dd99dd858faaad242589f22230171156c8977ad5448f2506f6a125a90573eefb22dc932d0950807839cdaa2c71b93429afe83575bf87c17f7bf87814a621c315fefdffd86d1397581678b5fcdbc9bb9a75d1b28197efe9ea1c76af922563b521618956753cd0ce9187f884e7d55d8ba1d2074b7e50a86238e55ab1bbb0bb71af2c1a5e4ff8948b0b15f8711e1e71f9d1eb07a3c4735931cfa6f380768baff4ef423ddedd227", 0xc4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000700)=0x16, 0x4) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000740)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000780)={0x7, 0x76c553d6, 0x101, 0x101, 0xfffffffffffffffa, 0x7}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000800), &(0x7f0000000840)=0xc) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000880)={0x200, 0x5}) preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/55, 0x37}, {&(0x7f0000000900)=""/22, 0x16}], 0x2, 0x0) pipe2(&(0x7f0000000980), 0x84800) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000009c0)={0x0, 0xd7, 0x820a, 0x7c, 0x7, 0x2, 0xefc, 0x0, 0x0}, &(0x7f0000000a00)=0x20) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000a40)={r5, 0x6, 0x6, 0x400}, 0x10) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/vhost-net\x00', 0x2, 0x0) open_by_handle_at(r6, &(0x7f0000000ac0)={0xde, 0x8001, "aa9995d3b71e37279f4ba028b0533b4688a684fa98d62d80430fb9d3f6372c8259fcae3402a4945016803d2831d49ea444b4dfe019339ecdbeb5568aed5a665adae9eb4f7abc7e9dc5e670db96910fe57aae6ae0ebe0e8c0476eeb648f65c4a9ccba134f73757cd5923ba0ea47637318df5e5bd1066614f2df19c674013e256d45664b5e181c912033b245bf99e0a3539479ddd8b6c250849cefe455f470e67c6c377b64ef7e9a296e1ab012e114fc94b83ada75d7dcc553d53f7b4ecfe783b83c1af392ba30d90156acc62bceeee4a6ca26715db961"}, 0x203) ioctl$TCSBRK(r2, 0x5409, 0x395) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000bc0)=0x3ff, 0x4) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000c00)) 2018/03/29 16:07:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00'}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:25 executing program 3: r0 = socket(0x0, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5ea0, 0x88040) r0 = epoll_create1(0x80000) fallocate(r0, 0xd, 0x2000000000000000, 0x4000d) 2018/03/29 16:07:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r0, 0x9) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) socketpair(0x0, 0x4, 0x8001, &(0x7f0000000440)={0xffffffffffffffff}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) socket$inet(0x2, 0x0, 0x8) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f75700067e4b68ef6be7a74be34061b5d", 0x200002, 0x0) fchdir(0xffffffffffffffff) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write(r5, &(0x7f0000000180)="15", 0x1) close(r5) mmap$binder(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x80010, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x200, 0x80) connect(r0, &(0x7f0000000000)=@generic={0x1, "3799664c2c1ae75c43aa1c352eec80d299197004efc9ec072c45190faeebd4843b4c3d2214c9c5232ad972391d49e3eb8b1a82637ea6946a666a3cc2c805887f2e087243169c40e68d33abff7ca263f21ad8d9e8c54e0f013d33ba4c24d1dad3cc8109adb641bf1f2269289f2b26dfe63e402dec471bdb6548e195de5be5"}, 0x80) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000300)={0x0, 0xfffffffffffffffb, 0x1, 0xe52d, 0x0, 0x20000000000}, &(0x7f0000000340)=0x14) r6 = dup2(r3, r3) bind$ipx(r6, &(0x7f0000000280)={0x4, 0x0, 0x80, "34c1b884fbec", 0x81}, 0x10) connect$ax25(r6, &(0x7f00000002c0)={0x3, {"20ada8787a1d43"}, 0x3}, 0x10) getsockopt$sock_buf(r6, 0x1, 0x3f, &(0x7f0000000480)=""/4096, &(0x7f0000001480)=0x1000) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000480), &(0x7f00000004c0)=0x4) writev(0xffffffffffffffff, &(0x7f0000000380), 0x0) 2018/03/29 16:07:25 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80), 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x0, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x4f, 0x0, 0x7, 0x0, 0x8, 0x200, 0x8, 0x80000000, 0xff, 0x9, 0x80000001, 0x4833, 0x46, 0x1, 0x80000001, 0x6, 0x3, 0x7, 0x7ff, 0x6, 0x3, 0x7f4, 0x6, 0x10000, 0x9, 0x9, 0x2, 0x10001, 0x6, 0x100000001, 0x0, 0x81, 0x6, 0x0, 0x9ac, 0x0, 0x8, 0x2, @perf_config_ext={0x5, 0x8}, 0x4, 0x3, 0x2, 0x7, 0xffffffff, 0xffffffffffffffe9, 0xfffffffffffffff8}, r1, 0x9, r0, 0x2) fallocate(r1, 0x11, 0x0, 0x4000b) [ 64.624423] QAT: Invalid ioctl 2018/03/29 16:07:25 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f63"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:25 executing program 3: r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x0, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00'}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) [ 64.661715] QAT: Invalid ioctl 2018/03/29 16:07:25 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000080)={{0x1, 0x3}, 0x6}, 0x10) fallocate(r1, 0x11, 0x0, 0x4000b) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x1) 2018/03/29 16:07:25 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:25 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x4000000004005) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x4001, 0x32, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4134e475824fbfaeefb278580e4aedd886c0b629cd32c56ebff94329c3a32a4b8c171676b94083085709923fd77ead8ca0073183b09c62b90673944ded2f276e", "49710f290076931228cd8c92a1b9375555874f087c556b616155647a2732f399"}) 2018/03/29 16:07:25 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x0, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f63"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') bind$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x5, 0x2, 0x6548, "46a4b47d91138ff45e215b70ec86c8687828c27ee974b6c154445ab877fc53ff787353b7183923a176b56b10b899d17d3ddaf6bbc714799c49ce5321ad3f4c", 0x30}, 0x60) io_setup(0x100000000006, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001200)}]) 2018/03/29 16:07:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x84000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x3, 0x2, 0x2, 0x7, 0x3, 0xffff, 0x10000, 0x4, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r1, 0x0, 0x4, [0x1, 0x6, 0xa80, 0x1]}, 0x10) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(0xffffffffffffffff, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000d35000)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r2, 0x5}, &(0x7f0000000180)=0x8) r3 = accept$alg(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0xcf, 0x3}, &(0x7f00000000c0)=0xc) sendmmsg$alg(r3, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000040), 0x59, &(0x7f0000000080), 0x371}], 0x21b, 0x0) 2018/03/29 16:07:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00'}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x0, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x0, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:25 executing program 2: r0 = semget$private(0x0, 0x1, 0x642) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000240)=""/4096) socket$unix(0x1, 0x5, 0x0) capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000200)={0x7, 0x6, 0x1, 0x4}, 0x8) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) socket$netlink(0x10, 0x3, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e21, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x6}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e24, 0x80, @mcast1={0xff, 0x1, [], 0x1}, 0x40000000000}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e22, 0xca, @local={0xfe, 0x80, [], 0xaa}, 0x41d5}, @in6={0xa, 0x4e20, 0x44f9, @mcast1={0xff, 0x1, [], 0x1}, 0x98}, @in={0x2, 0x4e22, @multicast1=0xe0000001}], 0xb0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0, 0xffffffffffffff00}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000001c0)={r2, 0x7fffffff}, 0x8) 2018/03/29 16:07:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-des3_ede-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200)=0xdd, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="ad56b6d5820faeb99529890e1f1cf9cbedd30a07524c90c2", 0x18) sendmsg$can_raw(r1, &(0x7f0000000380)={&(0x7f0000000000)={0x1d}, 0x10, &(0x7f0000000340)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "38a070a180d38a239f0f7c5a26f3a1b3611919263b88665a7c8c749d3ea32fddf7b040c47d59769af7f47da30faba190cd5890e6b8613a41e2ad18ad538c4e95"}, 0x2a5}, 0x1}, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000480)=""/145, 0x91}, {&(0x7f0000000540)=""/234, 0xea}], 0x2, &(0x7f0000000680)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f0000000740)={0x77359400}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000780)="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", 0x1000) 2018/03/29 16:07:25 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f63"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x0, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:25 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(0xffffffffffffffff, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x40000, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 2018/03/29 16:07:25 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:25 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a50"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:25 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1c2) connect$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0xecf863ffdae76628, 0x0) msgget(0x2, 0x41) bind$ax25(r1, &(0x7f0000000100)={0x3, {"ba8af9748ccce1"}, 0x5}, 0x10) poll(&(0x7f0000000140)=[{r0, 0x188}, {r1, 0x20}, {r1}, {r0, 0x199}, {r0, 0x90b0}], 0x5, 0x5200000000000000) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000280)={0x0, 0x1, {0x1, 0x2, 0x0, 0x3, 0x1}}) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000300)={0x0, 0x9, 0xffff, 0x7}, 0x8) r2 = syz_open_dev$sndmidi(&(0x7f0000000340)='/dev/snd/midiC#D#\x00', 0xffff, 0x1) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000380)={{0x32, @loopback=0x7f000001, 0x4e20, 0x0, 'lblcr\x00', 0x0, 0x762f, 0x26}, {@broadcast=0xffffffff, 0x4e21, 0x0, 0x615, 0x444d, 0x9}}, 0x44) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000400)={'vcan0\x00', {0x2, 0x4e22, @multicast1=0xe0000001}}) unshare(0x100) sync_file_range(r1, 0x3, 0x6, 0x6) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000440)={0x2, [0x1, 0x1]}, 0x8) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f00000004c0)=0x6) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000500)={0x2, [0x0, 0x0]}, &(0x7f0000000540)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000580)={r4, 0xb1a, 0x8aab}, 0x8) rmdir(&(0x7f00000005c0)='./file0\x00') getpeername$netlink(r0, &(0x7f0000000600), &(0x7f0000000640)=0xc) select(0x40, &(0x7f0000000680)={0x0, 0x8000, 0x400, 0x2, 0x57, 0x1, 0x2, 0x5}, &(0x7f00000006c0)={0x5, 0x1d63e312, 0x20, 0xd1, 0xdc, 0x1, 0xc0, 0x52b}, &(0x7f0000000700)={0x9c97, 0x7, 0x291266b2, 0x6, 0x0, 0x95bb, 0x8, 0x1}, &(0x7f0000000740)={0x77359400}) accept(r3, &(0x7f0000000780)=@rc, &(0x7f0000000800)=0x80) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000840)=0x9, &(0x7f0000000880)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000008c0)) fcntl$getownex(r0, 0x10, &(0x7f0000000900)={0x0, 0x0}) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000940)=r5) getitimer(0x2, &(0x7f0000000980)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000009c0)={{0xa, 0x4e24, 0x6, @mcast1={0xff, 0x1, [], 0x1}, 0xfffffffffffffffa}, {0xa, 0x4e23, 0x92, @mcast2={0xff, 0x2, [], 0x1}, 0x6}, 0x9, [0x7f, 0x1, 0xee, 0x5, 0x9, 0x100000001, 0x2, 0x3]}, 0x5c) 2018/03/29 16:07:25 executing program 2: socket(0x11, 0x4000000000080003, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x80000) setsockopt(r0, 0x107, 0xc, &(0x7f0000000040), 0xffca) 2018/03/29 16:07:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040)=0x8c9, 0x4) r1 = open(&(0x7f0000000080)='./file0\x00', 0x181080, 0xc) pread64(r1, &(0x7f00000000c0)=""/183, 0xb7, 0x45) fallocate(r0, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0x0, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(0xffffffffffffffff, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f00004e5fff), &(0x7f00003a3fff)="16"}, 0x20) r1 = syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x2315, 0x82000) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000500)=0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x10000, 0x0) r3 = getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = gettid() fstat(r2, &(0x7f0000000440)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0]) sendmsg$unix(r2, &(0x7f0000000400)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000100)="70cd46cfd0", 0x5}], 0x1, &(0x7f00000003c0)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x40, 0x20040001}, 0x1) 2018/03/29 16:07:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$setendian(0x14, 0x2) socketpair(0x1, 0x0, 0x7, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000240)=0x16, 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000340)={0x32, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25, 0x0, 0x4d}, 0x2c) sendmsg(r1, &(0x7f0000001d00)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000002c0)="28cfb5b4e1ae7150819b5a38baca7eab44", 0x11}], 0x1, &(0x7f0000001d80)=ANY=[], 0x0, 0x4048000}, 0x40) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'lo\x00', 0xfff}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'gretap0\x00', {0x2, 0x4e21, @multicast2=0xe0000002}}) mq_getsetattr(r1, &(0x7f0000000380)={0x7f, 0xb9, 0xffffffff80000000, 0xa2db, 0x5, 0x0, 0x6, 0x2}, &(0x7f00000003c0)) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) 2018/03/29 16:07:25 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a50"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0x0, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:25 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(0xffffffffffffffff, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000080)=""/6) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x5) fcntl$setflags(r0, 0x2, 0x1) 2018/03/29 16:07:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0x0, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a50"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:25 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(0xffffffffffffffff, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 65.097424] IPVS: set_ctl: invalid protocol: 50 224.0.0.1:0 dh 2018/03/29 16:07:25 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x4, 0xfffffffffffffffe, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x7ff, 0x800, 0x3, 0x8, 0x5b98, 0x6, 0x1}, 0x1c) [ 65.140416] IPVS: set_ctl: invalid protocol: 50 224.0.0.1:0 dh 2018/03/29 16:07:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x2000000000007) r1 = dup2(r0, r0) sendmsg$alg(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="f273bf4743081b288159f23c4fe7b6c746add8bcd8982c35657f3ad9c228fd1780941e66b7843167cb72f09d900138ad4262286b5406e49687c704385ed7320349bd42089a9ac1d2fa1e1b29673115a2c16b13a1868d54a3dd91475109a1e43820fb81a59d3ce5981873e05945bcea75d562", 0x72}, {&(0x7f0000000100)="a269d0dbbf73f6ad5210c26a8aacafb2765f011faf502f0fb1c76e02e4ff696dc9c76eac5b48f1b6f9832d9cd690e9dcd03cad0a741d82b0946b5b8b03a804631911684b954b69fa1e95d3e967a5dfc5315884d5dceb46486dff9a5d05375eb4102d48988f212dbe", 0x68}, {&(0x7f0000000180)="23fda46af2ea6c4c935a02655f5f874dc9d3988972a7213be9f1e45bbba1d95557af32c2f46fc2f7cc0525537baac712fcb17401eb61d6922d3a60ee7e0fa21b28e4042ff1f12d4c56456a5238ea14515258358ee578b54a42736c714f6264db1c826f95f1171942681a67b82c5157ace65d52803e11692545a28a8a659f67bebd97b7f9c6c36e9c090a04c4286600f95c40cce40f5c58c61979f29288256d88a167ff19b32425876404a057504424d859671c408531b12c53be16a3be23458b28a8042640f569d25402860e9bec495e50e757403cb371ca5cc2474b461c0499cc13165afe09d3e757371c6b64d13f87", 0xf0}, {&(0x7f0000000280)="5ca30dcf04f0ec9591f9d4665063d985bdd0f546c2e579d2dec9362159f231a5c230f5ee63521c26111eaac08d7555822c66c0288f16b79b915ff69a40e611a68433e324c4c796b8edad378cbe54b13ad1e6f6df709c5cb74916f6ce9b22987af45513c9c3d7998a367b034570905acb823a21ef0e20d09370a2f02d2bd7ec629a1fcc26d0eda2270999e18365dd1ed9d011c88119844dc7fc7dc6b4871d85034490b59f5b9ad16f893e9deb8ffd11dcd5eb4ac7e0892de5ece22f1927a536e4ca2785082a091eebcba490af1b56dba3255e481fcb72fe4ddd32cc26545b2de91417", 0xe2}, {&(0x7f0000000380)="83bd753193ce5fa58e2e9771e3d9e6daef5762753528a58bd8ee0ea27502c2a173a4c217aa1218b6e201f2478f0c55832e050f9ce6c008852dbe66bd84263dbf0e3092d41acf8030a5878f0835ab0dc52b115c904494ce3f2ce901592a31cad939f7614de6fb5a153014cf794c64f9147d499d73a434f5a58c59b2b671309b060cb835ecd977d5d5bebe203de5e73f7f1656329cef96db8b923a63f355f5e2422bf811b5ee2c43ca8282861e258f8f8f1d9cf3c87a8543a995618e93dbbb739f1447beadb67a8d", 0xc7}], 0x5, &(0x7f0000000500)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @op={0x18, 0x117, 0x3}, @iv={0xa8, 0x117, 0x2, 0x93, "88d6581f2d1340f39a4743b867fb07aed08323554966326895aeafb925aee616809b09678cd5f0bc17484d34adfeafb3ccbecee48a78de4a13eba5588604d8dd12fa37d79ed78e4cf0aa8401494e12cc338c0e56a329b4612d0e255134518c31e3db1be9d568667fc92c02f3bdb00bf5027a6a40aa5e14ab8e2e2349fb3aa6c560d1a11d4864ca751a079a202c147fe09d9fda"}], 0x10f0, 0x4004}, 0x8000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000001640)=[@in={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e24, @rand_addr}], 0x20) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000001680)=""/6) socket$netlink(0x10, 0x3, 0x4) 2018/03/29 16:07:25 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f00000001c0)={0x8, 0xf000}) r1 = memfd_create(&(0x7f0000000240)="0020515a520e3b7c6b347bf16d94ac120b4c251cd7aee7c28a95820f30769b9149e3220608000efcb5e88d136f1344", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000057ff3)='/dev/snd/seq\x00', 0x0, 0x101802) r3 = dup2(r2, r1) getsockopt$sock_buf(r3, 0x1, 0x37, &(0x7f0000000000)=""/152, &(0x7f00000000c0)=0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r3, &(0x7f0000048fe4)=[{0x0, 0x1ff, 0x0, 0x0, @time={0x77359400}, {}, {}, @control}], 0x1c) socketpair(0x10, 0x6, 0x4, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000180)={0x0}) write$sndseq(r3, &(0x7f0000053000)=[{0x0, 0x1, 0x0, 0x0, @time={r4}, {}, {}, @ext={0x0, &(0x7f0000055ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000100)={0xa7}) sysfs$3(0x3) 2018/03/29 16:07:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x0, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecb"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:25 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(0xffffffffffffffff, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:25 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:25 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000003c0)={0x7ff, 0x0, 0x10001, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000400)={r2, 0x1}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000480)={'ip_vti0\x00', 0x0}) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000500)=0x500001d) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000004c0)={r3, 0x1, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10) readv(r1, &(0x7f0000001b80)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/74, 0x4a}, {&(0x7f0000001640)=""/181, 0xb5}, {&(0x7f0000001700)=""/235, 0xeb}, {&(0x7f0000001800)=""/68, 0x44}, {&(0x7f0000001880)=""/129, 0x81}, {&(0x7f0000001940)=""/43, 0x2b}, {&(0x7f0000001980)=""/83, 0x53}, {&(0x7f0000001a00)=""/173, 0xad}, {&(0x7f0000001ac0)=""/192, 0xc0}], 0xa) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x1a000, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000440)=0xe6fb971859aea954) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f0000000300)={@generic={0x0, "1bac499ff1f29ca7c9c46c58b187b6b6849c9244529eaaf4049fd3f23910bba3ade77d4ee06180007d24b4a8289e47dde45fac9737c54d19c3e2528cf691f252c7785fb0f6abd2507e577afb112b191890d89469102c2848fa0a131e499a73025c882f28cedf5506f41ac4dd17d70c7346b9b407f94f83383572d76b59e7"}, {&(0x7f0000000200)=""/255, 0xff}, &(0x7f0000000180), 0x40}, 0xa0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101081, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x100000001, 0x7, 0x9, 'queue0\x00', 0xa37}) ioctl$VT_DISALLOCATE(r0, 0x5608) removexattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=@random={'osx.', '\x00'}) open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) 2018/03/29 16:07:25 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f000000b000)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f0000000000), 0x5, 0x0, &(0x7f000000d000)={0x77359400}, &(0x7f0000048000)=0x1, 0x3) r0 = accept$ipx(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) getpeername(r0, &(0x7f00000000c0)=@in6={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x80) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x14b, 0x40000) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x401) openat$cgroup(r1, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) getpeername$unix(r1, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) 2018/03/29 16:07:25 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) open(&(0x7f00000004c0)='./file0\x00', 0x40000, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") fsetxattr(r1, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)="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", 0x137, 0x0) fremovexattr(r1, &(0x7f0000000000)=@known='user.syz\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000002c0)={0xfffffffffffffffd}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)={0xfffffffffffffff9, 0x8, 0xb54, 0x964d, 0x7, 0x1}) accept(r1, &(0x7f0000000340)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f0000000480)=0x80) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) rename(&(0x7f0000000240)='./control/file0\x00', &(0x7f00000001c0)='./file0\x00') 2018/03/29 16:07:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x0, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecb"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:25 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(0xffffffffffffffff, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0x100000000, 0x8) 2018/03/29 16:07:25 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x0, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:25 executing program 5: r0 = socket(0x2, 0x2000000000000005, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x0, [0x0, 0x4, 0x0, 0x8]}, 0x5c) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000380)={'bridge0\x00', &(0x7f00000000c0)=ANY=[]}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'yam0\x00', &(0x7f00000000c0)=@ethtool_flash={0x33, 0x6, "c42fee70c94f1adab1eeee60153dc092b6c6fe2f280459107ce2562769d69da4396d7ed18763fe6ad3fd4bc97039555acbbc0644a2cc553bfd63e2eb007b5da83a25760e77d31bd3b0e0ef9035d3beb895b3ac6cd67fb8221a0d71656e0d037bed7f6f091892c496ab97fdf304c78286c3ffbed3b41906bd4f9406004ee0c137"}}) 2018/03/29 16:07:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x7}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000000c0)={r1, 0x10000017f, "52ba0c765849378102e491e1aa8d3167c931693a513b9d2ff5bf55eefc6ea7f9c79c8e0748d081d37ac793c481ded313912f963966b883fc2d10ab99cc8b102f00f01f6c1ca09be32dfdfd8a8a1e15a523f560c6a20e48d874b82c9f496a4e84e861ca1f9ceaf8f76275795a5df56deee8759886a3edf517bc24453f60d6ccff7d0435cf"}, &(0x7f0000000040)=0x32) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r2}, &(0x7f00000001c0)=0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000), 0x8) 2018/03/29 16:07:26 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000100)=""/4096, &(0x7f0000001100)=0x1000) r2 = fcntl$dupfd(r0, 0x406, r0) clock_gettime(0x0, &(0x7f0000001140)={0x0, 0x0}) write$sndseq(r1, &(0x7f0000001180)=[{0x0, 0x1, 0x2, 0x1, @time={r3, r4+30000000}, {0x800, 0xa04}, {0xfffffffffffffff8, 0x1f}, @control={0x2, 0x7}}, {0x0, 0xfffffffffffffffd, 0x3, 0x1, @time={0x0, 0x989680}, {0xfffffffffffffffc, 0x1ff}, {0x5, 0x7}, @raw32={[0x3, 0x8]}}], 0x60) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x280000000000000, 0x0, 0x10001}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f0000000080)={r5, 0xa19}) r6 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r6, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:26 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecb"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x0, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:26 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:26 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = dup2(r0, r0) recvfrom$inet6(r1, &(0x7f0000000080), 0x34, 0x0, 0x0, 0xfe92) bind$inet(r0, &(0x7f000000f000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000040)) r2 = getgid() r3 = getgid() setregid(r2, r3) sendto$inet(r0, &(0x7f0000004000), 0x33f, 0x0, &(0x7f0000002000)={0x2, 0x4e23}, 0x10) 2018/03/29 16:07:26 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a79"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:26 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r1) 2018/03/29 16:07:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x0, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:26 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:26 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x80, 0x3, 0x400, 0x1000, @tick=0x100000001, {0x9, 0x10001}, {0x0, 0x69c1}, @queue={0xe5b, {0x40, 0x10000}}}, {0x8, 0x80, 0x2, 0x8, @tick=0x401, {0x7f, 0x9}, {0x1}, @raw32={[0x3, 0x78, 0x7fe0000000000]}}], 0x60) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000100)) umount2(&(0x7f0000000100)='./file0\x00', 0x0) 2018/03/29 16:07:26 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040)=0x2, 0x8) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:26 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a79"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x9, 0x400000) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000300)=0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x2, 0x101080) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000340)={0x1, 0x5, 0x5a93ba45, 'queue0\x00', 0x401}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000180)={0xffffffffffff7fff, 0xfffffffffffffffc, 0x8, 'queue1\x00', 0x800}) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)=0x4) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100)={0x0, @broadcast=0xffffffff, 0x0, 0x0, 'lc\x00', 0x0, 0x3}, 0x2c) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000b04cf4)={0x14, 0xd, 0x100a, 0xfffffffffffffffd}, 0x14}, 0x1}, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000240)=0x0) socket$inet6_sctp(0xa, 0x5, 0x84) rt_sigqueueinfo(r3, 0xb, &(0x7f0000000280)={0x41, 0xeb02, 0x1, 0xfffffffffffffffa}) 2018/03/29 16:07:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:26 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000100)={'vlan0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x114) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)=0x1ff) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x1, 0x7c1, 0x6, 0x80000001, 0x6, 0x7a0000000, 0x5, 0x3, 0x4, 0xffffffffffffffc1}) bpf$MAP_CREATE(0x0, &(0x7f000092efe4)={0xe, 0x4, 0x4, 0x1811, 0x0, 0xffffffffffffffff, 0x0, [0x10]}, 0x2c) semctl$IPC_RMID(0x0, 0x2, 0x10) 2018/03/29 16:07:26 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x0, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:26 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) rt_tgsigqueueinfo(r1, r2, 0x3, &(0x7f00000000c0)={0x12, 0x100000000, 0x100000001, 0x2}) fallocate(r0, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:26 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a79"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:26 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(blowfish)\x00'}, 0x58) recvmsg(0xffffffffffffffff, &(0x7f0000158000)={&(0x7f00002fffa0)=@nfc_llcp, 0x5c, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x20) gettid() geteuid() getgid() r3 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r2, &(0x7f0000000a00)={&(0x7f00000003c0)=@file={0x1, './file0/file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000440)="e532d344568e26606817286c33dc5776070e1e2ad03c95cb1280c1527cbb3321462cc80b5b6d86d6a86e3bcc01aae12ece6457b903744248d256c14910f2551314b59ad9aa54a40c3a8f4f60b8ffc07d175110f79111291e2f1337a3", 0x5c}], 0x1, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="0000000020f2ff0000000100010000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00@'], 0x58, 0x20008040}, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000ac0)=0x1) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) chdir(&(0x7f00000001c0)='./file0\x00') r6 = accept4(r0, 0x0, &(0x7f0000000200), 0x80000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000300)=[{0x3, 0x8}, {0xf}, {0xe}, {0x2, 0x4}, {0x3, 0x400000000000}], 0x5) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000500)={&(0x7f0000000d80)=ANY=[@ANYBLOB="df319dc5e3b5aa0827ba8d68c706179195fe183337a01f81686e38c2bb489f0533832b36e76508410b964b32067786f2d28a53f1c1ea04ea2a2259c80c22fe7eee9c11ca344b5f7f17e53ed8bf30807f255fbfc46e2551acdd08da5c7d9fcf3eff3f4fe891943a88aba3ec9cea782f7e27c18d2abe15a7d7f8432d29dfbbd29a8efc8fd78ea8ec742a5bfd5e93e22f5bb9cdf91a32e4f764430b7c8a3d9378562511058e2b9ea6377fe9b718e9f1c0eb24e5bae94534153a173dee577b74b17f304e1e8a6717122208a1b55200bcc25c", @ANYRES16=r8, @ANYBLOB="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"], 0x1b0}, 0x1, 0x0, 0x0, 0x10}, 0x4040001) r9 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pid(r9, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$KVM_GET_MP_STATE(r7, 0x8004ae98, &(0x7f0000000340)) chroot(&(0x7f0000000380)='./file0/file0\x00') truncate(&(0x7f0000000140)='./file0\x00', 0x3) write(r9, &(0x7f0000000180)="15", 0x1) 2018/03/29 16:07:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:26 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='procmime_typesystem:\x00', 0x15, 0x0) 2018/03/29 16:07:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x0, 0x0, 0x5}) ioctl(r0, 0xc0184908, &(0x7f00000000c0)) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000040)={0x1000, 0x100000}) 2018/03/29 16:07:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:26 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:26 executing program 2: clone(0x200, &(0x7f00000051c0), &(0x7f0000005180), &(0x7f00000052c0), &(0x7f00000000c0)) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f0000000000)) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x0, 0x7}, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200), &(0x7f0000000380)) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) r1 = getpid() fcntl$setown(r0, 0x8, r1) fcntl$setsig(r0, 0xa, 0x12) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x100000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$join(0x1, &(0x7f0000000140)={0x73, 0x79, 0x7a}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000100)={0x2, 0x6, 0x5, 0x95c, "f4b3b7e57a932057554ff9d84a9ee7c1f2e2e0c8946578c0d435239b0522ae03863201d99e08ce6cd63e267c", 0x10001}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000280)={0x8, 0x1, {0x3, 0x0, 0x4, 0x1, 0xffffffffffffff9f}}) ioctl$DRM_IOCTL_GET_STATS(r3, 0x80f86406, &(0x7f0000000180)=""/252) munlockall() msgrcv(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0900000000001a0067dd00"], 0x8, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00'], 0x1, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r4, 0x1000000000013) getresgid(&(0x7f0000000340)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) getresuid(&(0x7f0000000440)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{0x0, r6, r5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000040)=0xaa12) 2018/03/29 16:07:26 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]) 2018/03/29 16:07:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:26 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:26 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:26 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:26 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x810, r0, 0x4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x20000, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000040)=""/98) 2018/03/29 16:07:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:26 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000000)='"', 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2}}, 0x0, 0x0, 0x0, 0x0, 0x34}, 0x98) socket$vsock_stream(0x28, 0x1, 0x0) 2018/03/29 16:07:26 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:26 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/03/29 16:07:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:26 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:26 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:26 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x80) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000040)={0x2, 0x101}) 2018/03/29 16:07:26 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000001180)='syzkaller\x00', &(0x7f00000011c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001540)="91b3b1040279f1e45429c74720fc539d7a1e8570d820a4bf77810c3591f40993d15ffc5ba081489514d171fce75cdaa705debfd50d16488431e608e853ecd7754b58290b623dd9dc07a71834d2b0302d0d103541a457598858769b8a137af7543101284fae81dd9eb5ecebc35f4936169d478aba1bab2e17b31f771fd081186271a5e541dff2be7dc58c0fba83d73c3d42a067886043f712a74260703ac196020264e4ed0e87da8c9c0765437dfc0db1167c0cabead1a37d00979abef95dd833329d4f590640c19536", 0xc9, 0xfffffffffffffff9) r1 = request_key(&(0x7f0000001200)='dns_resolver\x00', &(0x7f0000001440)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001480)="0000b7b286b1e600", 0x0) keyctl$reject(0x13, r0, 0x1ff, 0x4, r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0xffff, 0x2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r3, 0x0) write$rdma_cm(r2, &(0x7f0000000240)=@get_event={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) madvise(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x200000009) creat(&(0x7f0000000040)='./bus\x00', 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xf9c, 0x40) syz_open_dev$binder(&(0x7f0000001800)='/dev/binder#\x00', 0x0, 0x2) r5 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140)="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", 0x1000, 0xffffffffffffffff) r6 = request_key(&(0x7f0000001140)='encrypted\x00', &(0x7f0000001240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000012c0)="0000b7b286b1e60000", 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f00000000c0)={0x3ff, 0x0, 0x10000, 0xffff}) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) sendmsg$inet_sctp(r4, &(0x7f00000017c0)={&(0x7f0000001380)=@in6={0xa, 0x4e23, 0x1, @empty, 0x3}, 0x1c, &(0x7f0000001740)=[{&(0x7f00000013c0)="46a92cb8ac5e7880f0421750303caaa46981987da1cbf4ca8922b3fbc3035302da3a35a3e556ae24674aa66663ea8c25d5c0b000322dc6c94e6d24fb47b913cd9a9b923725ede31c5e984e8bd9f99fb7d94e9b4c11701f", 0x57}, {&(0x7f0000001500)="23098076d78db53e6750dcd9ed8bb9c4981dc46323db896cb474bdff22e03ce358", 0x21}, {&(0x7f0000001640)="92f69f44f091026c318cb0b4b27fb5b72130400959898bcf447bbef125f53aed9e56f6807e42614c81eb3f46d84c0808080ce3c3a7c34183d004a09995850612f7adea6bc3162d31ad7a369cd0655e1df160352b09d20b19d4495df1270620d5fcf591d7b3", 0x65}, {&(0x7f0000001700)="f6aad0027f3baf892a9466c96039e59ba35355218adc7f58e1", 0x19}], 0x4, 0x0, 0x0, 0x40000}, 0xc051) fcntl$setpipe(r4, 0x407, 0x77) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001300)=""/73, &(0x7f0000001280)=0x49) 2018/03/29 16:07:26 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:26 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:26 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x4) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x10001, 0x4000b) 2018/03/29 16:07:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:26 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:26 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) 2018/03/29 16:07:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000982000)='/dev/cuse\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000640)=""/56, 0xb7, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000300)={0x6, 0x0, [{0x40000000, 0x1, 0x7, 0x6, 0xffffffff, 0x5, 0x5}, {0xc0000001, 0x0, 0x1, 0x9, 0x8, 0x6, 0x1ff}, {0x80000007, 0x6, 0x7, 0x6, 0x0, 0x800, 0xffffffffffff887e}, {0x2, 0x3, 0x0, 0x0, 0xfffffffffffffff8, 0xfffffffffffff6b6, 0x1}, {0x80000007, 0x7f, 0x4, 0x0, 0xfffffffffffffff8, 0x8f21, 0x9}, {0xc000000b, 0xa5c5, 0x3, 0xfffffffffffffffe, 0x7, 0x2, 0xe09c}]}) readv(r0, &(0x7f0000814fe0)=[{&(0x7f0000296f99)=""/103, 0x10}], 0x10000000000001c0) listen(r0, 0x1c) write$fuse(r0, &(0x7f00000e5f18)={0x10, 0xfffffffffffffffc, 0x1}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x0, 0x0, "bffbd16a6216ad731fa6913937d89136a9bf0163d9e5b55f38745d2e6da25b340b13847662625c2e757ed4b0fc20716ca16a05f7ebc45c858f782171153d6a0a6817e1681f2d118807b7afa51841aa3c"}, 0xd8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), 0x10) socket$inet_sctp(0x2, 0x5, 0x84) readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000440)=""/61, 0x3d}, {&(0x7f0000000680)=""/33, 0x21}], 0x2) 2018/03/29 16:07:27 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:27 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x800000000) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x60880, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x0, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:27 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) 2018/03/29 16:07:27 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x0, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x1, 0x10) fallocate(r0, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 2: mkdir(&(0x7f0000578000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') r2 = fcntl$getown(r0, 0x9) getpriority(0x2, r2) getdents64(r1, &(0x7f0000003000)=""/216, 0xd8) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000080)=0x5, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x10, &(0x7f0000000040)=0x3, 0x4) 2018/03/29 16:07:27 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:27 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:27 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) 2018/03/29 16:07:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair(0x0, 0x2000000007, 0x3bc, &(0x7f0000000080)) 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x0, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:27 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) getsockopt$ax25_int(r2, 0x101, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendfile(r1, r2, &(0x7f0000e64ff8), 0x8e18) 2018/03/29 16:07:27 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:27 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:27 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x40, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe61}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x404000, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000200)={0xb7}) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) r2 = gettid() ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000140)={0x0, 0x0, [0xdf, 0x8001, 0x1, 0x7fffffff]}) wait4(r2, &(0x7f0000000040), 0x1000000, &(0x7f0000000080)) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x83, 0x400041) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x3, 0x2, 0x4000b) 2018/03/29 16:07:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x0, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x50000, 0x0) socketpair(0xa, 0x2, 0x80000001, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0xb3) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast1, @multicast2}, &(0x7f00000000c0)=0xc) bind$bt_hci(r2, &(0x7f0000000100)={0x1f, r3, 0x3}, 0xc) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x98}, 0x1}, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000140), &(0x7f0000000180)) 2018/03/29 16:07:27 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:27 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:27 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:27 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x4000b) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x80000000, 0x201) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x16) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000080)={0xfae, 0x5, 0x8, 0x0, "ddf9928c297089fccd802742517fa7cae67307d69dbf062e5503309489e49f88b4830953fe79c95acc901ee3", 0x7}) dup2(r0, r0) 2018/03/29 16:07:27 executing program 2: setrlimit(0x7, &(0x7f00000dd000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x80, 0x0) epoll_wait(r0, &(0x7f0000000180)=[{}, {}], 0x2, 0x45e) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000001c0)={0x20000000}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x9, {0x2, 0x4e21, @rand_addr=0x2c}, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e23, @multicast2=0xe0000002}, 0x90, 0xfffffffffffffffc, 0x61c, 0xe8, 0x7ff, &(0x7f0000000080)='bond0\x00', 0x3, 0x8000, 0xadfb}) setrlimit(0x0, &(0x7f0000000000)={0x2, 0x7}) userfaultfd(0x0) 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:27 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:27 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0), 0x0, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:27 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x0, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7ff, 0x800) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000140)=0x800) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x2, 0x0) splice(r0, &(0x7f0000000180), r1, &(0x7f00000001c0), 0x9, 0x7) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000240)=""/200, 0xc8}], 0x1) close(r1) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x101083, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000080)) userfaultfd(0x80000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x0, 0x0) close(r2) 2018/03/29 16:07:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:27 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x0, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:27 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:27 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0), 0x0, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x0, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) accept$alg(r0, 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x4000b) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 2018/03/29 16:07:27 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={0x0, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:27 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:27 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0xc0) ioctl$TIOCCBRK(r0, 0x5428) r1 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xfffffffffffff001}, 0x68) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) 2018/03/29 16:07:27 executing program 2: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000000)={0xff50, 0x0, "a0dcc8a298de29da402b2e36b5baaee1db3e3c50ffb2bea7574a72b35dd245e3027a33a752dbe66eec833aefb660ed2f6062"}, 0x400000) r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = socket$key(0xf, 0x3, 0x2) dup3(r0, r1, 0x80000) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xf8, r3, 0x1, 0x70bd29, 0x25dfdbfb, {0x8}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x59}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xf}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote={0xfe, 0x80, [], 0xbb}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xa}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3f}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0xf8}, 0x1}, 0x24008000) 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x0, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x0) 2018/03/29 16:07:27 executing program 4: setpriority(0x1, 0x0, 0x80000001) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x400, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') kcmp(r0, r1, 0x3, r2, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0xb5, @loopback={0x0, 0x1}, 0x7}}, 0x2, 0x10000}, &(0x7f0000000280)=0x90) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000002c0)={r3, 0x101}, &(0x7f0000000300)=0x8) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000240)={0x5, 0xfffffffffffffffc, 0x2, 0x800, 0x401}) ioctl$TCSBRKP(r2, 0x5425, 0x3f) 2018/03/29 16:07:27 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:27 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0), 0x0, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:27 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:27 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={0x0, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x0, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:27 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={0x0, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:27 executing program 1 (fault-call:4 fault-nth:0): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:27 executing program 4: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r2 = dup2(r0, r1) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 2018/03/29 16:07:27 executing program 2: r0 = open(&(0x7f0000000380)='./bus\x00', 0x141042, 0xfffffffffffffffc) ioctl$TUNSETLINK(r0, 0x400454cd, 0x100) fallocate(0xffffffffffffffff, 0x0, 0x8004, 0x0) fallocate(r0, 0x0, 0x4b99, 0x5) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x8) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x1000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x7}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000300)={r2, 0x7}, &(0x7f0000000340)=0x8) shmdt(0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) msgget(0x3, 0x400) bind$ax25(r1, &(0x7f0000000240)={0x3, {"c80a94ea447e6b"}, 0x1f}, 0x10) sendfile(r1, r1, &(0x7f0000000040), 0x80000001) fcntl$getflags(r1, 0x40a) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f00000000c0)) sendfile(r1, r0, 0x0, 0xc08f) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000180)) 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x0, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:27 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 67.183648] FAULT_INJECTION: forcing a failure. [ 67.183648] name failslab, interval 1, probability 0, space 0, times 0 [ 67.194938] CPU: 1 PID: 9079 Comm: syz-executor1 Not tainted 4.16.0-rc7+ #5 [ 67.202030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.211381] Call Trace: [ 67.213967] dump_stack+0x194/0x24d [ 67.217608] ? arch_local_irq_restore+0x53/0x53 [ 67.222276] ? print_irqtrace_events+0x270/0x270 [ 67.227042] should_fail+0x8c0/0xa40 2018/03/29 16:07:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000ade000)={0x4, 0xffffffffffffffff}) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000040)) 2018/03/29 16:07:27 executing program 2: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x100, 0x38d103) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000240)={[{0x8001, 0x2e3e, 0x100000001, 0xf93, 0x1, 0x100000001, 0x1, 0xb87, 0x8, 0xef, 0x401, 0x5, 0xa3}, {0x6, 0x100000001, 0x8aa, 0x5, 0x3, 0x8, 0x36, 0x1, 0x8, 0x6, 0x0, 0x10000}, {0x7ff, 0x400, 0xf0, 0x7ff, 0x8, 0x9, 0x6, 0x8, 0x4, 0x1f, 0x5, 0x6, 0x80}], 0xa3}) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000580)=""/254) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f00000001c0)={0x0, 0xbbf878e, 0x4, 0x604}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000000)=0x40000000000000, 0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000340)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_TSS_ADDR(r3, 0xae47, 0xd000) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ipddp0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}) connect$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x135) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000008c0)={0x9, {{0x2, 0x4e21, @multicast1=0xe0000001}}, 0x1, 0x8, [{{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, {{0x2, 0x4e20, @loopback=0x7f000001}}, {{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}, {{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e21, @broadcast=0xffffffff}}, {{0x2, 0x4e20}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xe}}}, {{0x2, 0x4e23, @broadcast=0xffffffff}}]}, 0x490) write$rdma_cm(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="00000000180000fa0300000000000000"], 0x10) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000480)={'bcsf0\x00', {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}) write$rdma_cm(r0, &(0x7f0000001d40)=ANY=[@ANYBLOB="0b000000100000fa", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000ee00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008815e881e7911a26edca477a0000"], @ANYRES32=0xffffffff, @ANYBLOB="ffffffff"], 0x18) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f00000003c0)={[{0x4}]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rfkill\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000500)={0x0, 0xffff, 0x9, 0x100}, &(0x7f0000000540)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000007c0)={r4, 0xcb, "678d544f49825b12848a4cf943b493ec96f979099986d61574878e07881e6577a0e0119fa61addb9db09291d555df3fcfdc143d3d33c74b556a091634b05e0a2d5f602d50a474c82b650c508e299284b7d5d115614957b92d7ed08ef598bd52a107b0b685d6743f4c0e5d98c164ed83983580504b40d050915b1e3a65587b05a0ecf9894443c2f4e8100000021f1a5d157351f9e903acb1afb8c4688b186b6d5dab7f446c3e179dcc0254726e0b9d7ad6057b810e41a276431ff53f091e76093e8714e82638455b01e4b38"}, &(0x7f0000000680)=0x27a) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000100)) [ 67.230764] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 67.235863] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 67.241062] ? task_dump_owner+0x28f/0x4d0 [ 67.245302] ? print_irqtrace_events+0x270/0x270 [ 67.250086] ? __lock_is_held+0xb6/0x140 [ 67.254177] ? check_same_owner+0x320/0x320 [ 67.258495] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 67.263682] ? rcu_note_context_switch+0x710/0x710 [ 67.268628] should_failslab+0xec/0x120 [ 67.272606] kmem_cache_alloc+0x47/0x760 [ 67.276668] ? __lock_is_held+0xb6/0x140 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x2, [0x8, 0x2663]}, &(0x7f00000000c0)=0xc) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x2, [0x8, 0x2663]}, &(0x7f00000000c0)=0xc) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) [ 67.280745] jbd2__journal_start+0x1d3/0x9f0 [ 67.285160] ? jbd2_write_access_granted.part.9+0x3a0/0x3a0 [ 67.290863] ? rcu_note_context_switch+0x710/0x710 [ 67.295790] ? __lock_is_held+0xb6/0x140 [ 67.299853] ? __might_sleep+0x95/0x190 [ 67.303827] ? _cond_resched+0x14/0x30 [ 67.307722] __ext4_journal_start_sb+0x15f/0x550 [ 67.312470] ? ext4_alloc_file_blocks+0x528/0xa40 [ 67.317315] ? ext4_journal_abort_handle.isra.5+0x2a0/0x2a0 [ 67.323025] ? ext4_ext_index_trans_blocks+0xef/0x120 [ 67.328223] ? ext4_meta_trans_blocks+0x216/0x2d0 2018/03/29 16:07:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x2, [0x8, 0x2663]}, &(0x7f00000000c0)=0xc) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) [ 67.333075] ext4_alloc_file_blocks+0x528/0xa40 [ 67.337749] ? lock_release+0xa40/0xa40 [ 67.341729] ? ext4_access_path+0x110/0x110 [ 67.346050] ? __might_sleep+0x95/0x190 [ 67.350027] ? down_write+0x87/0x120 [ 67.353733] ? ext4_fallocate+0x6ec/0x1f90 [ 67.357964] ? down_read+0x150/0x150 [ 67.361691] ext4_fallocate+0x12c3/0x1f90 [ 67.365842] ? ext4_insert_range+0x1350/0x1350 [ 67.370402] ? iterate_fd+0x3f0/0x3f0 [ 67.374180] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 67.378997] ? trace_hardirqs_off+0x10/0x10 [ 67.383300] ? lock_acquire+0x1d5/0x580 [ 67.387247] ? lock_acquire+0x1d5/0x580 [ 67.391196] ? vfs_fallocate+0x515/0x6f0 [ 67.395245] ? __lock_is_held+0xb6/0x140 [ 67.399297] ? rcu_read_lock_sched_held+0x108/0x120 [ 67.404288] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 67.409024] ? __sb_start_write+0x209/0x2a0 [ 67.413323] ? ext4_insert_range+0x1350/0x1350 [ 67.417880] vfs_fallocate+0x33c/0x6f0 [ 67.421775] SyS_fallocate+0x53/0x90 [ 67.425463] ? compat_SyS_ftruncate+0x30/0x30 [ 67.429937] do_syscall_64+0x281/0x940 [ 67.434325] ? __do_page_fault+0xc90/0xc90 [ 67.438532] ? _raw_spin_unlock_irq+0x27/0x70 [ 67.443004] ? finish_task_switch+0x1c1/0x7e0 [ 67.447481] ? syscall_return_slowpath+0x550/0x550 [ 67.452386] ? syscall_return_slowpath+0x2ac/0x550 [ 67.457294] ? prepare_exit_to_usermode+0x350/0x350 [ 67.462285] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 67.467633] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 67.472461] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 67.477621] RIP: 0033:0x4548b9 2018/03/29 16:07:28 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:28 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x0, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:28 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:28 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0x0, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) [ 67.480783] RSP: 002b:00007f423f397c68 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 67.488464] RAX: ffffffffffffffda RBX: 00007f423f3986d4 RCX: 00000000004548b9 [ 67.495706] RDX: 0000000000000000 RSI: 0000000000000011 RDI: 0000000000000015 [ 67.502947] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 67.510189] R10: 000000000004000b R11: 0000000000000246 R12: 0000000000000016 [ 67.517431] R13: 000000000000007d R14: 00000000006f2c58 R15: 0000000000000000 2018/03/29 16:07:28 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:28 executing program 1 (fault-call:4 fault-nth:1): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:28 executing program 2: r0 = socket(0x10, 0x803, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000), 0x2) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000080), &(0x7f0000000100)={0x80000000}, 0x8) [ 67.624403] FAULT_INJECTION: forcing a failure. [ 67.624403] name failslab, interval 1, probability 0, space 0, times 0 [ 67.635824] CPU: 0 PID: 9124 Comm: syz-executor1 Not tainted 4.16.0-rc7+ #5 [ 67.642929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.652263] Call Trace: [ 67.654833] dump_stack+0x194/0x24d [ 67.658450] ? arch_local_irq_restore+0x53/0x53 [ 67.663131] should_fail+0x8c0/0xa40 [ 67.666835] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 67.671959] ? print_irqtrace_events+0x270/0x270 [ 67.676719] ? __lock_is_held+0xb6/0x140 [ 67.680796] ? check_same_owner+0x320/0x320 [ 67.685098] ? perf_tp_event+0xae0/0xae0 [ 67.689148] ? rcu_note_context_switch+0x710/0x710 [ 67.694084] should_failslab+0xec/0x120 [ 67.698045] __kmalloc+0x63/0x760 [ 67.701480] ? perf_trace_run_bpf_submit+0x20d/0x330 [ 67.706572] ? ext4_find_extent+0x6ae/0x930 [ 67.710894] ext4_find_extent+0x6ae/0x930 [ 67.715058] ext4_ext_map_blocks+0x264/0x4410 [ 67.719535] ? perf_trace_lock_acquire+0x532/0x980 [ 67.724477] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 67.729469] ? find_held_lock+0x35/0x1d0 [ 67.733521] ? trace_hardirqs_off+0x10/0x10 [ 67.737833] ? lock_downgrade+0x980/0x980 [ 67.741969] ? lock_release+0xa40/0xa40 [ 67.745953] ? lock_acquire+0x1d5/0x580 [ 67.749904] ? lock_acquire+0x1d5/0x580 [ 67.753859] ? ext4_map_blocks+0xa8d/0x1830 [ 67.758180] ? lock_release+0xa40/0xa40 [ 67.762139] ? ext4_es_cache_extent+0x600/0x600 [ 67.766793] ? rcu_note_context_switch+0x710/0x710 [ 67.771714] ? __might_sleep+0x95/0x190 [ 67.775681] ? down_read+0x96/0x150 [ 67.779284] ? ext4_map_blocks+0xa8d/0x1830 [ 67.783587] ? __down_interruptible+0x6b0/0x6b0 [ 67.788242] ? __might_sleep+0x95/0x190 [ 67.792214] ext4_map_blocks+0xd69/0x1830 [ 67.796344] ? __ext4_journal_start_sb+0x167/0x550 [ 67.801271] ? ext4_issue_zeroout+0x170/0x170 [ 67.805750] ? ext4_ext_index_trans_blocks+0xef/0x120 [ 67.810925] ? ext4_meta_trans_blocks+0x216/0x2d0 [ 67.815767] ext4_alloc_file_blocks+0x554/0xa40 [ 67.820424] ? lock_release+0xa40/0xa40 [ 67.824396] ? ext4_access_path+0x110/0x110 [ 67.828707] ? __might_sleep+0x95/0x190 [ 67.832669] ? down_write+0x87/0x120 [ 67.836358] ? ext4_fallocate+0x6ec/0x1f90 [ 67.840572] ? down_read+0x150/0x150 [ 67.844293] ext4_fallocate+0x12c3/0x1f90 [ 67.848452] ? ext4_insert_range+0x1350/0x1350 [ 67.853027] ? iterate_fd+0x3f0/0x3f0 [ 67.856819] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 67.861643] ? trace_hardirqs_off+0x10/0x10 [ 67.865954] ? lock_acquire+0x1d5/0x580 [ 67.869904] ? lock_acquire+0x1d5/0x580 [ 67.873861] ? vfs_fallocate+0x515/0x6f0 [ 67.877925] ? __lock_is_held+0xb6/0x140 [ 67.881997] ? rcu_read_lock_sched_held+0x108/0x120 [ 67.886999] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 67.891742] ? __sb_start_write+0x209/0x2a0 [ 67.896054] ? ext4_insert_range+0x1350/0x1350 [ 67.900619] vfs_fallocate+0x33c/0x6f0 [ 67.904507] SyS_fallocate+0x53/0x90 [ 67.908202] ? compat_SyS_ftruncate+0x30/0x30 [ 67.912686] do_syscall_64+0x281/0x940 [ 67.916550] ? __do_page_fault+0xc90/0xc90 [ 67.920762] ? _raw_spin_unlock_irq+0x27/0x70 [ 67.925242] ? finish_task_switch+0x1c1/0x7e0 [ 67.929720] ? syscall_return_slowpath+0x550/0x550 [ 67.934632] ? syscall_return_slowpath+0x2ac/0x550 [ 67.939546] ? prepare_exit_to_usermode+0x350/0x350 [ 67.944549] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 67.949908] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 67.954748] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 67.959914] RIP: 0033:0x4548b9 [ 67.963083] RSP: 002b:00007f423f397c68 EFLAGS: 00000246 ORIG_RAX: 000000000000011d 2018/03/29 16:07:28 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x0, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:28 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0x0, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) [ 67.970770] RAX: ffffffffffffffda RBX: 00007f423f3986d4 RCX: 00000000004548b9 [ 67.978023] RDX: 0000000000000000 RSI: 0000000000000011 RDI: 0000000000000015 [ 67.985273] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 67.992518] R10: 000000000004000b R11: 0000000000000246 R12: 0000000000000016 [ 67.999768] R13: 000000000000007d R14: 00000000006f2c58 R15: 0000000000000001 2018/03/29 16:07:28 executing program 4: capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x100, 0x0) mq_notify(r0, &(0x7f0000000040)={0x0, 0x36, 0x6, @thr={&(0x7f0000000180)="094c48420fa4c791b64c3266a572dc5fd4cc214fd1f5f0e37d1407a3bb7fffb5e6223f0e9264e1d2ae5ce1f1136bf4f67044db27cdad51400c9933663ce60b99068a9652b5a8aea98643e6fa9f1020679616f72b12f86acb911c0e26c14d8d9d138730dbc74e15c17541373253a858648688ba81651b5a2aec6026a32a7be98d9dc262fb40d41ed700167818e4c0c136650ffa7f7085a567e720f14ad7b108abf81a12a80e8ac7d8e0fffd96ea5d0f66c941c4a4dbc4ed29aa224ed302d34475ea3926e0f5", &(0x7f0000000280)="72c36b02b3365fe08e2401cf42343b1ae305236ee80c56c494edd67998d3ad013b41a50ad789714ea604b27f368367c41fff0bc9e40ccd5fd903c423ed0df7d7ce97e4193135806fe68eeab2a06f7633b7069e8b231fd59ef394bd9446a85dcaaacd75b5696732358e603b193a1cc2084a0fce8c53edbf08450798bc832af31e7848bdb6c4f5780bb859941732c648e5318120583af3d80c45e58c55d82a1527f6162397543175cdaaa446d48cd7b5ebc3af3a903428e6ebd63799b791bd84f1a7eb71edf382ae83300b4dcba05c6f1c002340d58489cdafc36ba38951260c32633139ea7a094dd767aaee"}}) setpriority(0x1, 0x0, 0x0) 2018/03/29 16:07:28 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:28 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") fsetxattr(r0, &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000080)='\x00', 0xfffffdfa, 0x1) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x1, 0x4) 2018/03/29 16:07:28 executing program 1 (fault-call:4 fault-nth:2): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:28 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:28 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0x0, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:28 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x0, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:28 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x2, [0xc, 0x2663]}, &(0x7f00000000c0)=0xc) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:28 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x2, [0xc, 0x2663]}, &(0x7f00000000c0)=0xc) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:28 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 68.105806] FAULT_INJECTION: forcing a failure. [ 68.105806] name failslab, interval 1, probability 0, space 0, times 0 [ 68.117457] CPU: 1 PID: 9150 Comm: syz-executor1 Not tainted 4.16.0-rc7+ #5 [ 68.124559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.133907] Call Trace: [ 68.136497] dump_stack+0x194/0x24d [ 68.140140] ? arch_local_irq_restore+0x53/0x53 [ 68.144835] should_fail+0x8c0/0xa40 [ 68.148562] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/03/29 16:07:28 executing program 4: socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000000540)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000580)='/dev/vcsa#\x00', 0xf6, 0x101000) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f00000005c0)={0x7, 0x112, 0x1, 0x200}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x40, 0x0) bind$inet6(r3, &(0x7f0000000500)={0xa, 0x4e24, 0xfffffffffffffffe, @empty, 0x9}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0xd386, @mcast1={0xff, 0x1, [], 0x1}, 0x6}}, [0x2, 0xd, 0x3f, 0xffff, 0xfffffffffffffff7, 0x4, 0xd3a, 0xf9c1, 0xac, 0x101, 0x5, 0xac31, 0x3, 0xfffffffffffffffb, 0xe72a]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000440)={r4, @in6={{0xa, 0x100, 0x92, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x8cc}}, 0x100, 0x9f6}, &(0x7f0000000140)=0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 68.153681] ? find_held_lock+0x35/0x1d0 [ 68.157755] ? is_bpf_text_address+0x7b/0x120 [ 68.162243] ? lock_downgrade+0x980/0x980 [ 68.166398] ? perf_trace_lock_acquire+0xe3/0x980 [ 68.171241] ? __free_insn_slot+0x5c0/0x5c0 [ 68.175579] ? perf_trace_lock+0x900/0x900 [ 68.179812] ? rcutorture_record_progress+0x10/0x10 [ 68.184831] ? trace_hardirqs_off+0x10/0x10 [ 68.189145] ? is_bpf_text_address+0xa4/0x120 [ 68.193636] ? kernel_text_address+0x102/0x140 [ 68.198229] should_failslab+0xec/0x120 [ 68.202191] kmem_cache_alloc+0x47/0x760 2018/03/29 16:07:28 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00007f3ffb)='yeah\x00', 0x5) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2}, 0x10) socket$bt_hidp(0x1f, 0x3, 0x6) shutdown(r0, 0x0) [ 68.206233] ? __es_tree_search+0x181/0x1e0 [ 68.210548] __es_insert_extent+0x2a3/0x1050 [ 68.214958] ? ext4_es_free_extent+0x7e0/0x7e0 [ 68.219741] ? lock_release+0xa40/0xa40 [ 68.223733] ? __lock_is_held+0xb6/0x140 [ 68.227827] ext4_es_insert_extent+0x296/0x720 [ 68.232414] ? ext4_es_find_delayed_extent_range+0xae0/0xae0 [ 68.238253] ? rcu_read_lock_sched_held+0x108/0x120 [ 68.243265] ? __kmalloc+0x46e/0x760 [ 68.246983] ext4_ext_put_gap_in_cache+0x147/0x1b0 [ 68.251920] ? ext4_zeroout_es+0x150/0x150 2018/03/29 16:07:28 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r1, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x200) r2 = accept4$nfc_llcp(r1, &(0x7f0000000100), &(0x7f0000000080)=0x60, 0x800) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x7, r2, 0x1}) ftruncate(0xffffffffffffffff, 0x45) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000000c0)=@generic={0xffff, 0x9, 0x3000000000}) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x8, 0x200) memfd_create(&(0x7f0000000000)='/dev/sg#\x00', 0x1) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) r3 = getpid() fcntl$setownex(r2, 0xf, &(0x7f0000000340)={0x2, r3}) pipe2(&(0x7f00000002c0)={0xffffffffffffffff}, 0x4800) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000200)={0x3d, 0x0, 0x2}) setsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000300)=0x81, 0x4) 2018/03/29 16:07:28 executing program 4: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000002ef88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0x0, 0x51, r0, 0x0) [ 68.256161] ext4_ext_map_blocks+0x15d2/0x4410 [ 68.260780] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 68.265780] ? find_held_lock+0x35/0x1d0 [ 68.269846] ? trace_hardirqs_off+0x10/0x10 [ 68.274174] ? trace_hardirqs_off+0x10/0x10 [ 68.278493] ? lock_downgrade+0x980/0x980 [ 68.282640] ? lock_release+0xa40/0xa40 [ 68.286626] ? lock_acquire+0x1d5/0x580 [ 68.290591] ? lock_acquire+0x1d5/0x580 [ 68.294558] ? ext4_map_blocks+0xa8d/0x1830 [ 68.298868] ? lock_release+0xa40/0xa40 [ 68.302842] ? ext4_es_cache_extent+0x600/0x600 [ 68.307520] ? rcu_note_context_switch+0x710/0x710 [ 68.312454] ? __might_sleep+0x95/0x190 [ 68.316420] ? down_read+0x96/0x150 [ 68.320031] ? ext4_map_blocks+0xa8d/0x1830 [ 68.324329] ? __down_interruptible+0x6b0/0x6b0 [ 68.328978] ? __might_sleep+0x95/0x190 [ 68.332936] ext4_map_blocks+0xd69/0x1830 [ 68.337060] ? __ext4_journal_start_sb+0x167/0x550 [ 68.341976] ? ext4_issue_zeroout+0x170/0x170 [ 68.346445] ? ext4_ext_index_trans_blocks+0xef/0x120 [ 68.351616] ? ext4_meta_trans_blocks+0x216/0x2d0 [ 68.356444] ext4_alloc_file_blocks+0x554/0xa40 [ 68.361094] ? lock_release+0xa40/0xa40 [ 68.365050] ? ext4_access_path+0x110/0x110 [ 68.369352] ? __might_sleep+0x95/0x190 [ 68.373306] ? down_write+0x87/0x120 [ 68.376990] ? ext4_fallocate+0x6ec/0x1f90 [ 68.381201] ? down_read+0x150/0x150 [ 68.384903] ext4_fallocate+0x12c3/0x1f90 [ 68.389051] ? ext4_insert_range+0x1350/0x1350 [ 68.393609] ? iterate_fd+0x3f0/0x3f0 [ 68.397386] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 68.402205] ? trace_hardirqs_off+0x10/0x10 [ 68.406508] ? lock_acquire+0x1d5/0x580 [ 68.410454] ? lock_acquire+0x1d5/0x580 [ 68.414400] ? vfs_fallocate+0x515/0x6f0 [ 68.418448] ? __lock_is_held+0xb6/0x140 [ 68.422504] ? rcu_read_lock_sched_held+0x108/0x120 [ 68.427500] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 68.432232] ? __sb_start_write+0x209/0x2a0 [ 68.436530] ? ext4_insert_range+0x1350/0x1350 [ 68.441090] vfs_fallocate+0x33c/0x6f0 [ 68.444963] SyS_fallocate+0x53/0x90 [ 68.448650] ? compat_SyS_ftruncate+0x30/0x30 [ 68.453125] do_syscall_64+0x281/0x940 [ 68.456986] ? __do_page_fault+0xc90/0xc90 [ 68.461196] ? _raw_spin_unlock_irq+0x27/0x70 [ 68.465667] ? finish_task_switch+0x1c1/0x7e0 [ 68.470141] ? syscall_return_slowpath+0x550/0x550 [ 68.475046] ? syscall_return_slowpath+0x2ac/0x550 [ 68.479954] ? prepare_exit_to_usermode+0x350/0x350 [ 68.484946] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 68.490291] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 68.495118] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 68.500280] RIP: 0033:0x4548b9 2018/03/29 16:07:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f00000001c0)={0x6, "fb5ed20ef8b2"}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x5000, 0x1000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/03/29 16:07:29 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0x0, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:29 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 68.503443] RSP: 002b:00007f423f397c68 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 68.511124] RAX: ffffffffffffffda RBX: 00007f423f3986d4 RCX: 00000000004548b9 [ 68.518366] RDX: 0000000000000000 RSI: 0000000000000011 RDI: 0000000000000015 [ 68.525609] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 68.532851] R10: 000000000004000b R11: 0000000000000246 R12: 0000000000000016 [ 68.540092] R13: 000000000000007d R14: 00000000006f2c58 R15: 0000000000000002 2018/03/29 16:07:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:29 executing program 1 (fault-call:4 fault-nth:3): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:29 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0x0, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:29 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8), 0xfffffffffffffcb4, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) signalfd4(r0, &(0x7f0000a71ff8), 0x8, 0x0) 2018/03/29 16:07:29 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:29 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101880, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {}]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') r1 = shmget$private(0x0, 0x2000, 0x1000000000000, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r1, 0xb) 2018/03/29 16:07:29 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x2, [0xc, 0x2663]}, &(0x7f00000000c0)=0xc) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:29 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 68.685248] FAULT_INJECTION: forcing a failure. [ 68.685248] name failslab, interval 1, probability 0, space 0, times 0 [ 68.696577] CPU: 0 PID: 9201 Comm: syz-executor1 Not tainted 4.16.0-rc7+ #5 [ 68.703679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.713028] Call Trace: [ 68.715624] dump_stack+0x194/0x24d [ 68.719280] ? arch_local_irq_restore+0x53/0x53 [ 68.723960] ? rcutorture_record_progress+0x10/0x10 [ 68.729031] should_fail+0x8c0/0xa40 [ 68.732760] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 68.737859] ? unwind_get_return_address+0x61/0xa0 [ 68.742835] ? print_irqtrace_events+0x270/0x270 [ 68.747570] ? save_stack+0xa3/0xd0 [ 68.751202] ? __lock_is_held+0xb6/0x140 [ 68.755245] ? ext4_fallocate+0x12c3/0x1f90 [ 68.759598] ? check_same_owner+0x320/0x320 [ 68.763900] ? __lock_acquire+0x664/0x3e00 [ 68.768126] ? rcu_note_context_switch+0x710/0x710 [ 68.773045] ? free_obj_work+0x690/0x690 [ 68.777113] should_failslab+0xec/0x120 [ 68.781078] __kmalloc+0x63/0x760 [ 68.784513] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 68.789685] ? perf_trace_run_bpf_submit+0x20d/0x330 [ 68.794781] ? ext4_find_extent+0x6ae/0x930 [ 68.799108] ext4_find_extent+0x6ae/0x930 [ 68.803274] ext4_ext_map_blocks+0x264/0x4410 [ 68.807758] ? perf_trace_lock_acquire+0x532/0x980 [ 68.812713] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 68.817711] ? find_held_lock+0x35/0x1d0 [ 68.821776] ? trace_hardirqs_off+0x10/0x10 [ 68.826099] ? lock_downgrade+0x980/0x980 [ 68.830246] ? trace_hardirqs_off+0x10/0x10 [ 68.834597] ? lock_acquire+0x1d5/0x580 [ 68.838548] ? lock_acquire+0x1d5/0x580 [ 68.842508] ? ext4_map_blocks+0x377/0x1830 [ 68.846838] ? lock_release+0xa40/0xa40 [ 68.850801] ? ext4_map_blocks+0xc14/0x1830 [ 68.855113] ? rcu_note_context_switch+0x710/0x710 [ 68.860052] ? __might_sleep+0x95/0x190 [ 68.864033] ? down_write+0x87/0x120 [ 68.867726] ? ext4_map_blocks+0x377/0x1830 [ 68.872038] ? down_read+0x150/0x150 [ 68.875743] ? __might_sleep+0x95/0x190 [ 68.879722] ext4_map_blocks+0xc90/0x1830 [ 68.883887] ? ext4_issue_zeroout+0x170/0x170 [ 68.888369] ? ext4_ext_index_trans_blocks+0xef/0x120 [ 68.893549] ? ext4_meta_trans_blocks+0x216/0x2d0 [ 68.898405] ext4_alloc_file_blocks+0x554/0xa40 [ 68.903074] ? lock_release+0xa40/0xa40 [ 68.907058] ? ext4_access_path+0x110/0x110 [ 68.911375] ? __might_sleep+0x95/0x190 [ 68.915345] ? down_write+0x87/0x120 [ 68.919038] ? ext4_fallocate+0x6ec/0x1f90 [ 68.923305] ext4_fallocate+0x12c3/0x1f90 [ 68.927479] ? ext4_insert_range+0x1350/0x1350 [ 68.932050] ? iterate_fd+0x3f0/0x3f0 [ 68.935841] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 68.940673] ? trace_hardirqs_off+0x10/0x10 [ 68.944993] ? lock_acquire+0x1d5/0x580 [ 68.948949] ? lock_acquire+0x1d5/0x580 [ 68.952910] ? vfs_fallocate+0x515/0x6f0 [ 68.956993] ? __lock_is_held+0xb6/0x140 [ 68.961084] ? rcu_read_lock_sched_held+0x108/0x120 [ 68.966087] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 68.970827] ? __sb_start_write+0x209/0x2a0 [ 68.975138] ? ext4_insert_range+0x1350/0x1350 [ 68.979706] vfs_fallocate+0x33c/0x6f0 [ 68.983604] SyS_fallocate+0x53/0x90 [ 68.987303] ? compat_SyS_ftruncate+0x30/0x30 [ 68.991790] do_syscall_64+0x281/0x940 [ 68.995659] ? __do_page_fault+0xc90/0xc90 [ 68.999876] ? _raw_spin_unlock_irq+0x27/0x70 [ 69.004357] ? finish_task_switch+0x1c1/0x7e0 [ 69.008842] ? syscall_return_slowpath+0x550/0x550 [ 69.013761] ? syscall_return_slowpath+0x2ac/0x550 [ 69.018677] ? prepare_exit_to_usermode+0x350/0x350 [ 69.023686] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 69.029055] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/29 16:07:29 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000080), 0x10) sendmsg$nl_route(r0, &(0x7f00008f4000)={&(0x7f000076fff4)={0x10}, 0xc, &(0x7f000009b000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001900210500000000000000001c00001f0000000000000000040001009a727469a0b5ab82279db7717fabe014f7ca799ff188e71a43bc3fddc7571d6aa7f681f89b271eae0ecf0ab940967c150d99e74538fd061de22d857740096a3785edd27a90cd989fff6691f570"], 0x20}, 0x1}, 0x0) 2018/03/29 16:07:29 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x0, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:29 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0x0, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:29 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000040c0)=@broute={'broute\x00', 0x20, 0x6, 0xe00, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20004e00], 0x0, &(0x7f0000003a80), &(0x7f0000004e00)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'teql0\x00', 'rose0\x00', 'bridge0\x00', 'teql0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x16}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x1f, 0x0, 0x0, 'tunl0\x00', 'syzkaller0\x00', 'ip6gretap0\x00', 'syzkaller1\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}, {{{0x0, 0x0, 0x0, 'ip6gre0\x00', 'ip6_vti0\x00', 'ifb0\x00', 'sit0\x00', @link_local={0x1, 0x80, 0xc2}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x8f0, 0x968, 0x9b0, [@among={'among\x00', 0x858, {{0x0, 0xffffffffffffff8d, 0x0, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba], 0x2, [{[], @rand_addr}, {[], @loopback=0x7f000001}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001], 0x3, [{[], @multicast2=0xe0000002}, {}, {[0x0, 0x8f7], @dev={0xac, 0x14, 0x14}}]}}}}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}, @common=@AUDIT={'AUDIT\x00', 0x8}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x2, [{{{0x5, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'nr0\x00', 'bond0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0x70, 0xa0}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'nr0\x00', 'nr0\x00', 'ipddp0\x00', 'irlan0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0x0, 0x0, 0x0, 0x0, 0xff], 0xa0, 0xd0, 0x148, [@vlan={'vlan\x00', 0x8}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "3fbf1f36402970ee891b26a03c34f303702bdc62520e1580f42a56fdbf9f344afe3aab8cc1e7361216426f2928ac174ecd882f775a62dab1b0401bc9e19621fd"}}}}]}]}, 0xe78) r1 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r1, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x1000008000) r2 = socket$inet_dccp(0x2, 0x6, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="6701a838f2e3a55f9f2c64d9511a6e03dfdc7ba9b570ab9191290a9bf5f8417bd8136a59de2af88f461d98822d3af8bea128f357adb2c0e074215cc3c6be93ccf27019d8168bd51b17d6f1d107c45a5463a30de2a5aa36b97cb24a165d2d5e33375404040dee01386922c2fdf5df6760a7b94ece629ba0390d260b472b33e364904f0bccd1c4a2f5a83acc85ffacb9fb38ad1a8608", 0x95}], 0x1) connect$inet(r2, &(0x7f00002f7ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r2, &(0x7f00008cb000), 0x0, 0x0, &(0x7f0000a42000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000240)='vcan0\x00', 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001740)) sendmmsg(r2, &(0x7f0000d1bf10)=[{{&(0x7f0000000140)=@ax25={0x3, {"a976372427d807"}}, 0x80, &(0x7f0000d73fb0), 0x0, &(0x7f0000000100)}}], 0x159, 0x0) r3 = accept(r1, &(0x7f0000000440)=@l2, &(0x7f00000004c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000600)={&(0x7f0000000280)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x2000c000) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000001680)={0x80, {{0xa, 0x4e23, 0x1e, @empty, 0x19}}}, 0x88) setsockopt$inet_udp_int(r3, 0x11, 0x64, &(0x7f0000000680), 0x4) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000001580)={0x6, {{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x88) r4 = socket$alg(0x26, 0x5, 0x0) accept4$packet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000001640)=0x14, 0x800) bind$alg(r4, &(0x7f0000001500)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ecb(cast5),sm3-generic)\x00'}, 0x58) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000280)={@loopback={0x0, 0x1}, 0x30, r5}) pwritev(r3, &(0x7f0000000380)=[{&(0x7f00000002c0)="bfe861cfb3a1", 0x6}, {&(0x7f0000000900)="4e32c0aff957f5ffcc00b643459d0a44e03a08d6a7d34bc3cc9ea64d858498c5c51bc0862e8508be8beee51e7129f9039868abe31a63a862e3f4d897eb775d880dbbf6e3cca3e546a21dd2d565ca2f3c99c39b452e4da1ef1ad2303bfab07186eee71894902195418f31c268a181e425b7b916f2789986ad41907cee56187e9b096f13e18502da8cf37c2f4e68091559511b887deceacc8fb9adb95eb5d6c5a8c19f459f53157d8ad59ad7bcfd3541208bbce1b9bbb056ad80e80d7021d85145bef983f655f1359d1a9d0870d2b8beb993", 0xd1}, {&(0x7f0000000300)="8f7bd6ed4e4c107559d37ffb50e17decc67062c436e3c6007058999bf030abbcfebad5e83d521efff67cbe60c5a32cbcd5e721acc22b7655220153b2c4010dbaa9fca333107cbe22f83f0f16e3a94d11c38ff6a3950d7637d6baaf488f30", 0x5e}, {&(0x7f0000000a00)="30d8a1bc4bba3f5ceee72a46153fe224e8d0471fcc9fc59b81c9ef2eac2e8b7fcd68e5e1fa4a45f3f9adf2a4cbb94c4b99f1fd84820121ae570915a917910cae6b67c14b490e738628595a0a7e4447e6bb929576e2c95452002d66dd7cdb28473eba134a6348961bb1977321b89c5c56fd12961f12691c7c55a845ae892901fff167ea006878b164a3b55f3dc0a6490d955492b94d72de81a2fd15f74f6aacfdd84eb0d86400c8a9a2692be69a6d8c837bad4624f77e5a9f3feb190f61ab06c7b46c938d7009f577eea9349f3a71f7e8c6e42cb3b91b51a7e536fdb5fa1fbe0f5378e3f13971770eb7051d6688eb347e", 0xf0}], 0x4, 0xfffffffffffffff7) [ 69.033907] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 69.039078] RIP: 0033:0x4548b9 [ 69.042250] RSP: 002b:00007f423f397c68 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 69.049942] RAX: ffffffffffffffda RBX: 00007f423f3986d4 RCX: 00000000004548b9 [ 69.057197] RDX: 0000000000000000 RSI: 0000000000000011 RDI: 0000000000000015 [ 69.064447] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 69.071697] R10: 000000000004000b R11: 0000000000000246 R12: 0000000000000016 [ 69.078951] R13: 000000000000007d R14: 00000000006f2c58 R15: 0000000000000003 2018/03/29 16:07:29 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x0, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:29 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:29 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 69.142742] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 69.162805] netlink: 'syz-executor2': attribute type 1 has an invalid length. 2018/03/29 16:07:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:29 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x0, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:29 executing program 1 (fault-call:4 fault-nth:4): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:29 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:29 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4", 0xf}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:29 executing program 2: r0 = userfaultfd(0x0) fcntl$setsig(r0, 0xa, 0x15) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x44}) dup(r0) readv(r0, &(0x7f0000d32fc0)=[{&(0x7f0000000000)=""/185, 0xb9}], 0x1) sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2}, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000003000/0x4000)=nil, 0x4000}, 0x1}) r1 = getpid() capset(&(0x7f0000000100)={0x39980732, r1}, &(0x7f0000000140)={0x100000000, 0x8b1f, 0x6, 0x0, 0x46, 0x3}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x80800, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0xffff) r3 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x81, 0x2000) r4 = dup2(r0, r0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000001c0)=r4) ioctl$KDGKBLED(r4, 0x4b64, &(0x7f0000000200)) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) 2018/03/29 16:07:29 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000000500)=""/67, 0x43}], 0x2, &(0x7f0000000000)=""/251, 0xfb}, 0x2) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) select(0x40, &(0x7f0000000180)={0x4, 0x1, 0x7fff, 0x100000001, 0x4, 0x10001, 0xfffffffffffffff7}, &(0x7f00000001c0)={0x325c000000000, 0x0, 0x1, 0x10000, 0x8, 0x9, 0x4db, 0x1ff}, &(0x7f0000000200)={0x200, 0x6, 0x2, 0x9, 0xff, 0x0, 0x200000000000, 0x4}, &(0x7f0000000280)={r2, r3/1000+30000}) sendmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)}, 0x0) setsockopt$llc_int(r1, 0x10c, 0xf, &(0x7f0000000140)=0x4, 0x4) 2018/03/29 16:07:29 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 69.211310] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 69.282602] FAULT_INJECTION: forcing a failure. [ 69.282602] name failslab, interval 1, probability 0, space 0, times 0 [ 69.293912] CPU: 1 PID: 9253 Comm: syz-executor1 Not tainted 4.16.0-rc7+ #5 [ 69.301007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.310346] Call Trace: [ 69.312913] dump_stack+0x194/0x24d [ 69.316535] ? arch_local_irq_restore+0x53/0x53 [ 69.321191] ? lock_downgrade+0x980/0x980 [ 69.325330] ? queue_io+0x840/0x840 [ 69.328948] should_fail+0x8c0/0xa40 [ 69.332647] ? __lock_is_held+0xb6/0x140 [ 69.336697] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 69.341792] ? __mark_inode_dirty+0x262/0x1170 [ 69.346362] ? __inode_attach_wb+0xf70/0xf70 [ 69.350747] ? lock_release+0xa40/0xa40 [ 69.354728] ? __lock_is_held+0xb6/0x140 [ 69.358813] ? check_same_owner+0x320/0x320 [ 69.363130] ? __dquot_alloc_space+0x18b/0x800 [ 69.367705] ? rcu_note_context_switch+0x710/0x710 [ 69.372617] ? mark_held_locks+0xaf/0x100 [ 69.376763] should_failslab+0xec/0x120 [ 69.380733] kmem_cache_alloc+0x47/0x760 [ 69.384790] ? percpu_counter_add_batch+0xce/0x130 [ 69.389731] ext4_mb_new_blocks+0x69e/0x3e40 [ 69.394138] ? lock_release+0xa40/0xa40 [ 69.398107] ? __free_insn_slot+0x5c0/0x5c0 [ 69.402432] ? ext4_discard_preallocations+0x11f0/0x11f0 [ 69.407859] ? kernel_text_address+0x102/0x140 [ 69.412422] ? __kernel_text_address+0xd/0x40 [ 69.416895] ? unwind_get_return_address+0x61/0xa0 [ 69.421812] ? __save_stack_trace+0x7e/0xd0 [ 69.426142] ? save_stack+0xa3/0xd0 [ 69.429752] ? save_stack+0x43/0xd0 [ 69.433352] ? kasan_kmalloc+0xad/0xe0 [ 69.437563] ? __kmalloc+0x162/0x760 [ 69.441252] ? ext4_find_extent+0x6ae/0x930 [ 69.445543] ? ext4_ext_map_blocks+0x264/0x4410 [ 69.450187] ? ext4_map_blocks+0xc90/0x1830 [ 69.454479] ? ext4_alloc_file_blocks+0x554/0xa40 [ 69.459299] ? ext4_fallocate+0x12c3/0x1f90 [ 69.463608] ? vfs_fallocate+0x33c/0x6f0 [ 69.467649] ? SyS_fallocate+0x53/0x90 [ 69.471509] ? do_syscall_64+0x281/0x940 [ 69.475543] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 69.480905] ? print_irqtrace_events+0x270/0x270 [ 69.485644] ? save_stack+0xa3/0xd0 [ 69.489248] ? print_irqtrace_events+0x270/0x270 [ 69.493978] ? trace_hardirqs_off+0x10/0x10 [ 69.498270] ? __lock_is_held+0xb6/0x140 [ 69.502302] ? ext4_fallocate+0x12c3/0x1f90 [ 69.506615] ? __lock_is_held+0xb6/0x140 [ 69.510686] ? rcu_read_lock_sched_held+0x108/0x120 [ 69.515685] ? __kmalloc+0x46e/0x760 [ 69.519375] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 69.524543] ? ext4_find_extent+0x6ae/0x930 [ 69.528842] ? ext4_ext_search_right+0x40c/0xaa0 [ 69.533571] ? ext4_inode_to_goal_block+0x2ac/0x3b0 [ 69.538569] ext4_ext_map_blocks+0x209e/0x4410 [ 69.543141] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 69.548129] ? find_held_lock+0x35/0x1d0 [ 69.552183] ? trace_hardirqs_off+0x10/0x10 [ 69.556489] ? trace_hardirqs_off+0x10/0x10 [ 69.560791] ? lock_downgrade+0x980/0x980 [ 69.564919] ? trace_hardirqs_off+0x10/0x10 [ 69.569228] ? lock_acquire+0x1d5/0x580 [ 69.573172] ? lock_acquire+0x1d5/0x580 [ 69.577123] ? ext4_map_blocks+0x377/0x1830 [ 69.581428] ? lock_release+0xa40/0xa40 [ 69.585379] ? ext4_map_blocks+0xc14/0x1830 [ 69.589684] ? rcu_note_context_switch+0x710/0x710 [ 69.594604] ? down_write+0x87/0x120 [ 69.598298] ? __might_sleep+0x95/0x190 [ 69.602257] ext4_map_blocks+0xc90/0x1830 [ 69.606389] ? ext4_issue_zeroout+0x170/0x170 [ 69.610861] ? ext4_ext_index_trans_blocks+0xef/0x120 [ 69.616039] ? ext4_meta_trans_blocks+0x216/0x2d0 [ 69.620868] ext4_alloc_file_blocks+0x554/0xa40 [ 69.625527] ? lock_release+0xa40/0xa40 [ 69.629489] ? ext4_access_path+0x110/0x110 [ 69.633796] ? __might_sleep+0x95/0x190 [ 69.637755] ? down_write+0x87/0x120 [ 69.641440] ? ext4_fallocate+0x6ec/0x1f90 [ 69.645664] ext4_fallocate+0x12c3/0x1f90 [ 69.649820] ? ext4_insert_range+0x1350/0x1350 [ 69.654388] ? iterate_fd+0x3f0/0x3f0 [ 69.658166] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 69.662997] ? trace_hardirqs_off+0x10/0x10 [ 69.667303] ? lock_acquire+0x1d5/0x580 [ 69.671247] ? lock_acquire+0x1d5/0x580 [ 69.675199] ? vfs_fallocate+0x515/0x6f0 [ 69.679248] ? __lock_is_held+0xb6/0x140 [ 69.683298] ? rcu_read_lock_sched_held+0x108/0x120 [ 69.688301] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 69.693047] ? __sb_start_write+0x209/0x2a0 [ 69.697347] ? ext4_insert_range+0x1350/0x1350 [ 69.701903] vfs_fallocate+0x33c/0x6f0 [ 69.705778] SyS_fallocate+0x53/0x90 [ 69.709464] ? compat_SyS_ftruncate+0x30/0x30 [ 69.713939] do_syscall_64+0x281/0x940 [ 69.717798] ? __do_page_fault+0xc90/0xc90 [ 69.722011] ? _raw_spin_unlock_irq+0x27/0x70 [ 69.726490] ? finish_task_switch+0x1c1/0x7e0 [ 69.730964] ? syscall_return_slowpath+0x550/0x550 [ 69.735868] ? syscall_return_slowpath+0x2ac/0x550 [ 69.740775] ? prepare_exit_to_usermode+0x350/0x350 [ 69.745776] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 69.751132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 69.755965] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 69.761136] RIP: 0033:0x4548b9 [ 69.764312] RSP: 002b:00007f423f397c68 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 69.772002] RAX: ffffffffffffffda RBX: 00007f423f3986d4 RCX: 00000000004548b9 2018/03/29 16:07:30 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x2, [0xc, 0x8]}, &(0x7f00000000c0)=0xc) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:30 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc) 2018/03/29 16:07:30 executing program 2: r0 = accept(0xffffffffffffff9c, &(0x7f0000000240)=@sco, &(0x7f00000002c0)=0x80) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x10000000000000e1}, 0x19c664ab9572b237) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0xd3, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)="43504c00ad6d549d32b2c2de6e862538adb8a59645d1cc67d1847ffe739d18eec5025500f050bebc1021de16207f42a297d8b24afd584b4c4c2978e090e595bd5ee1e26086cc8139f7a8cf436c6d7b50ee873eeca4be11de7c3158e35c40bd036a35688d736fdc5390084761223f9fd654bae1b5a15e708617b965dd4e28d0e24a25a9b91544c9dc7b78efbf7e5cd757dc929f8992d1f4e97766f00fc2ed7e58c2eca0d8c194b44ac258f7aaa7bc259d6995ed36d3831748140b37c9f92b0b54d331a269463e5bf3304207c74204000000520e22657b9532f9f84900000000000000000000000000", 0x84, 0x7f, &(0x7f00000001c0)=""/127, 0x41100}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x3, &(0x7f0000003000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000002ff6)="00647a72616c8c657200", 0x7e0, 0xe7, &(0x7f000000df19)=""/231}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xe7}, 0x10) 2018/03/29 16:07:30 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4", 0xf}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:30 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:30 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) [ 69.779253] RDX: 0000000000000000 RSI: 0000000000000011 RDI: 0000000000000015 [ 69.786497] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 69.793744] R10: 000000000004000b R11: 0000000000000246 R12: 0000000000000016 [ 69.800991] R13: 000000000000007d R14: 00000000006f2c58 R15: 0000000000000004 2018/03/29 16:07:30 executing program 4: r0 = socket(0x10, 0x20001000000003, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) write(r0, &(0x7f00000000c0)="220000001400070000e80000000003000208030001000000080002004100fff0f055", 0x22) ioctl$void(r0, 0xc0045878) 2018/03/29 16:07:30 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x4000b) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x0}]}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000180)={r1, 0x1}) 2018/03/29 16:07:30 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4", 0xf}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:30 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:30 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x2, [0xc, 0x8]}, &(0x7f00000000c0)=0xc) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:30 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:30 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x2, [0xc, 0x8]}, &(0x7f00000000c0)=0xc) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) [ 69.901871] netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. [ 69.934716] netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. 2018/03/29 16:07:30 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000100)={0x4, 0x0, 0x3, 0x7}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000140)={0x8, r2, 0x0, 0x100000000}) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:30 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={0xffffffffffffffff, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x0, 0xfffffffffffffffa}, 0x2c) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000080)=""/101) 2018/03/29 16:07:30 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355", 0x17}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:30 executing program 2: r0 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x4) unshare(0x20000) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x8, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x5}}, 0x9f2}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000340)={r2, 0x4}, &(0x7f0000000500)=0x8) setns(r1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000040)) syncfs(r0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0xfffffffffffffff7}, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) mlock2(&(0x7f0000a91000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000540)={@in={{0x2, 0x4e23, @rand_addr=0x4}}, 0x100000001, 0x392, 0x0, "97939d06177d303fb04b48ffdd34859febaab1e00079f98c0ea10a1eb9914c6439e123214c0ac7bd75964b5df96f7cbbcbe88a2e2251fea720f2a7dc7dadf4c45f6e350cfd5e4a6ebb567bab287d04ed"}, 0xd8) getrusage(0x1, &(0x7f0000000200)) 2018/03/29 16:07:30 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:30 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x0]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x0, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3e27, 0x500) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc) 2018/03/29 16:07:30 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x0]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:30 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={0xffffffffffffffff, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:30 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355", 0x17}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:30 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x3e0, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x40000002, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:30 executing program 2: r0 = socket(0x10, 0xa, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f00000003c0)=@full={{0x3, {"12ff63a9a51595"}, 0xffff}, [{"508b937319b823"}, {"e6b59abca4c414"}, {"9c1cbee5de31a7"}, {"e6f441b8ac1fe0"}, {"edd1618edda24d"}, {"b348eabc3b09b9"}, {"15000cdf064f27"}, {"4640f97d95d46b"}]}, 0x10, &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffef6}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0)=[{&(0x7f0000002000)="4c5614c00401a0dbf8a66983bf16d12c4f7a79e606457dfdf09e2ec2ed253b", 0x1f}], 0x1, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710"}) r3 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) r4 = socket(0x11, 0x100000802, 0x0) r5 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={"db70c04900", 0x10}) ioctl$TUNSETLINK(r5, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000001c0)={'ifb0\x00', 0xa201}) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f00000002c0)=""/227) accept$packet(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001640)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000010c0)=0xe8) sendmmsg(r2, &(0x7f0000002d40)=[{{&(0x7f0000000440)=@ll={0x11, 0x1f, r6, 0x1, 0x7fff, 0x6, @random="321c0189a6da"}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000004c0)="d00a7160c65d815613d853e47fc5807bfdf21a040ba7aa9027aac05d1ede92ecb18d2e53552eecfd6a5c6ff7f54aaca06388697d80aa64d4ffc3d84d140990f859bb5323dd7aa893e979fbfaecc2236174c5e61ca561112ebee09e7350659b7246acd43f9be167851855a6", 0x6b}, {&(0x7f0000000540)="20e8669abc77db48e05dc0bcbca176a5971209578be35c074d7f6cbfd31830ff8c39d05be6e9dec4fbbacf89875e1f8e43a80b0a", 0x34}, {&(0x7f0000000580)="6fd287808fe5e6da4002faffc443c0c0fa5428a0f58bfccc40c695fa1494c27e586103f4acd8927d0e091727736629f3aeaa7c298f81f09d4e90eca3527a03539e7e6af31ebada9516bf82706314a73bb323c39c003a126402b07cb8e6c3696e317aaa5ccaaf9f90bd58301f34b719094e954bfc6c00c5b9535e78528e1c0711d496570be3714acb0d68e59b0782fceb28c2d2e9b8e6f48a9248f4f1cc920a64e62a746fc44235d0d6ab5e784b4fd5667ca1e268eaa334279e835946915b85ddc5f688420b54aa8a1365876ba67afc4a91adee6baffd45d151", 0xd9}, {&(0x7f0000003080)="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", 0x1000}, {&(0x7f0000000680)}], 0x5, &(0x7f0000004fc0)=[{0x80, 0x100, 0x75, "ac90588f155956f567f0cd5cc8caf90378dc9a424bc7475e13b17cc976deb5bc2f472288f4e676d9059f79198486e097e8b25fedea499ff67bf5e5ce581e430465772a5dbda832192168b568aff63d40d16f9f84e896c727a548d45f5abee754a31dd8332536454dab1fd4a3"}, {0xd8, 0x111, 0x2a10, "c9259a0f6fa4dcf0e4146bb9d5cfede5fb884c3c39e7e7a4462b2bf05de79ff9030e91a47db306ea61612b8fc4464773ef9702d01f81076d6ec88a2e009461ed4a49110410dd148cbdfd98cfed37a9deaa853ca7c619cd4ddee28b5ee4eb0e6d2529c6bd1cbd4ade15c30c35c5dfd1cd184da3a1c84ebc77fe054e5315be7ca5e31b16eff22d05d0c49475344916b2487348e17977340c0047dcc547ffc5cb3c485484c48644db3471bc797ad82e13053261d220ccfe1621f39f4183651b2fb814"}, {0x48, 0x109, 0xfffffffffffffff8, "cde8b7fa3aa0aae578cd4c0df4fd07e984a83645c27ebc4abd884eff2ce26c63ab770b5a0f20090e92e1230c65608f81a2"}, {0x40, 0x0, 0x4, "243adf7b983cf676ced2d15bc7c99afcc2937c86cdfb493490c2c6ad9b056cabb9d0fe566e1d36b90183d3"}, {0x68, 0x111, 0xdcf9, "c20841d6df4e695bb4cf56ba4c9cb8c81b27d0ecedbab1b025a95a4d3ba013d9319b07df2c67763048c31406ff11ba7f4a51a7408807ebeb6f74179725d20930ac1a75f0280a7aac14879f1f4596e35a9893"}, {0x60, 0x10d, 0x7fff, "961779c7b329101c7f4d30465a922c67f2246773a9360ed952eae52eea8272a600e531e737316416323602fa2d78d267385a2c17461ae1a5ebec4df6d8dc72a065e5c61152dcaf2cca"}, {0x58, 0x84, 0x2, "db9e9e3590da8515b78bc7dcc725b72bf3d51f0b8be97fec489d535488e9846819d9425969615e4337c20dec3f698285956d49c8b62a1fe7de00270aa7e38aa37b4d"}, {0x1010, 0x0, 0xffffffff, "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"}, {0xe8, 0x116, 0x7, "1481c3aadd7174218ffe0a0eb4066378cea0c664362d02ad4ed2be97894e0c63c2fb5b8e17c8fc0c31604be3147915575afe8aa41bbad5093ca2d6be85386fd1860ff35bfee41ff28d445b23aba7c79caab5db93189d9b8b98decf9d4b1cb6e2d419227e9238a36c387ae05213235235cf904e003c406f9e63b726070cc7cfcf8394abcbc5dd1f42f558abc413ea8412e5921a656a9bd1607f3d7102f31c1b11aaf203145f8345f5ea3cd914cf67370a14b65c98aa1b1e3c577a6cc9a0da22bf9008e8d475b8b3eda26f7e23e2b4a3b89a1b7f9c6562f6"}, {0xc8, 0x107, 0x80000000, "c6a131c37f37472c22283917a4ca008200a6f435138f7c6cc2d387113191d88d958a73c038c24dd8d25f9f001b3160c0265eaa74c83f4bf7409b687d42d648cb2e2ab6d8c22811e367df36fe9e32cf2af834a935734d82382c328de73014fe08056eff4fd2d308f27a3b2e58591058e9ad5f82e6dc4863096609954f4ce2d06cc33b74b14872356c01006827bbe3ce985128e8a68badc1ee1bbb11a807921a340b685fa6ad0105a5326b68990bb7b5acc4549d030cd18059"}], 0x14c0, 0x4041}, 0xf6}, {{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000740)="118c8ba127a7b56d", 0x8}, {&(0x7f0000000780)="c443099782554c4565d7f6a88bc6ac0d4399d2f37d4e48bc87087a402fae6cd1659756d7893e53a32de3c5b0d8e9824db920cd177deb199968b8550e435c6bdc81873e18939e321826d8c75e5034440efcaef9b767abdece5416eb3fd8015d93053a60adf489225bbc7f1f395fc21fea6d912e87c6", 0x75}, {&(0x7f0000000800)="7be4b927cc28431c33f3d0425692fe1a2370c1a3a00ec7f3ed988999ebc25975a2dfd5f3e77d4b5e1dca2599d69e2036b4306d911b938bd1f6076b476e171b10f8c71b8397d1f968775e9745f4", 0x4d}, {&(0x7f0000000880)="4e758a7ddf292769f0e4b3bc0d0dd1303427006290a5d9262334afe9a4db63b7a4d76b91c7a808c338bcf69a16dc7d3845e709ccaf52b11f216883e57ca3db4924c86f60ba4a2548a561e2fcbee9e995799f7a356744a9c7061baba651f8fb8916188b0a9c260cf48b8b145bf0029b9c29d7b61275e015438554ad385e3f19700735ab12ab5922a3e0b0", 0x8a}, {&(0x7f0000000940)="c4182d630569233b8f24f6fb50634b542865800786018ee41fd4134db91181a8aadfd1d73ec614579b9ed5c52416cab2a1a2f1cad42a73ca72ee6d59069c6b3afd647ecc15beed7144a44603fd077d15f55cbe496ba633b8628871f00c96df17fe6c363d2052e6912eb879", 0x6b}, {&(0x7f00000009c0)="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", 0xff}], 0x6, &(0x7f0000000b40)=[{0xe8, 0x107, 0x9, "05ca8e7a99296d2b64d9287857fb7d0cf6dc0ef4debbc4fce2c60daaed5df9af4afbb69f52be37edcb20b793b502f83a2ee6e8e173f6401ba18e7a3f4d45406b7adf0fffd980b1804cc8bc97f50a4fad4d700a6cf69c2f0120ac5408f2b9fb5e8b67207563f2a1ee1cb1bd0ad9223fe3c13b439ad03c1e9ec18caf3a083b8fb396e9be24b365ee32727031b5e6a31217817fe19c854bbeb76f2452a56cf46cf2911cdfa96c41fba1b2c4ecdce71823a0a85e8de2f1bdb43b4d16432fc9e25018a62f31430e0a337a98d91bd047fb317e1fbb"}, {0xf8, 0x100, 0x5, "9095400f4e8d21fc592b8908f3e8c281f5081a087725d9c69129ee5d4edddb4d648e9ea7a3dcf30b8743e005b97b1e95ca341fae356da4a0549fb0f41fcd06cbf34c816e487ee54a68fb7b26fffa4645d9bfab4b6af4ee42b99d5a3b4ce228de01fe5b35b09cb658d9ed09d5581a0ec5b860a02cd19a32594efe72b504e2d4d33c3048d95f93ff32913e223c9f7ccd808e90df61560664c6f114c723d6e256f01d233e5e3e4f574f1d10c644d57ae0a3414a0623532f0bf148cfc86a49d6ef56443d786deb50f40d076cef267608edc896154ca0aaeb9d8fec979d50a08c8c69e81b684a"}, {0x78, 0xff, 0x3, "87d07aa653ebb291ce07aadb3ca667c72f167ad7d992cc5daf9c1f01f2e0a0428df21f0f8d2817e208eee8dc72d07de3f62f31fb9e745a225b40c46999bdea7a96848f17289ca7b1c92b768aa76289dd39ae3cba45a1c9893ee12cf9667ce78ce9ec94d757"}], 0x258, 0x24000044}, 0x2}, {{&(0x7f0000000dc0)=@ax25={0x3, {"89c7cdcb960fb1"}, 0x3}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000006480)="55a7d740275dffda151c0d041f513d72319c28adf3776c9e19de0b4d2a38ae55d03ba2f3104d021f1e6589786deb8a8fab51bc0418af4bb4eff79aeaa61f1b798d243739c21451e1e664f41ff1878b719d323f0bcbc98048b71193864b4f8d26ba5c5a6004a49bf147235cf5ba5011aa2c120c13f2de398b6c514a97420b5a4c0cf44eb6dcd36e449cf2370b82e1e29f487a8d2c5d402bd9da3761cb607aeba94ddd9138a54cb0970f67df978b04f91ba8ffe797541e6e7130a8e20b1913c1150380e923b5274ef83891d9b359f979b54ee1fa6e8495dadd21b7547e84b5761fe9445c983ba627937d64cd7c291767d7f1591e8e5cada7768793d480520fc67268da011af1bc28e5ed8d66a4bf19c261f549b25f830763b95634b2d8393f0073dfd53c7c4ca36b8b6b1faafe99aca7f6d4b5860aef8c74021965aa62371936f4839a9376a172eb989717d69ce80154cb16447c1127cceaa9fcf52aac7f91b35c0bd08c8d0a3e7e852a8ce5cfb79428ecbab98eec9e26e03b6d15a4eb869ab167b190d8fd27b902106ec34267bb816a989b63436bc7a21744bf7c957856890535cf546cd6fb25ab74afc98da509d9e7d7f941ea98a49573279ffd2f76add7a4a407458ed42ff26e0efebc11cb26815e7a20208c7f745b02b47f080b7f0744ab0a83558bd5ab2afda10d37312b581682d4cf85645d8b1b4669217083dd0a512e49e0e041fa012c2a8b6cb6c4cf1ec76ae8cea99e6ab4afa7a37b711c7dcd5cc1732a20bf3d06e69040f204716d1eda0889b1c10236e3c98bf87557b381552210df1909e5aaa9722b4556a4afa020335c372f0d62614238829cb1d64852b7a61aaa73ed85a36f26a7ffc60af949febd03e4f8347e7f0476dc986436d9100865eaf8285dad9f39a145ffa0f68d12d710295db96e94f1ac726df20709ade886d6faf8bcd39d06801884fea9b49b87ffe1faa3680e5f379f7c6d62864350d9f596ffa23353a2ee3c4086ba4bfcf3eac6be82d1b6135881b3687edb60485454d680ce6a6e6ed66853e2a09ea7b6148e61eae4f4851182e816d603d7d96f0391a543bfd0b160bd09aa3cb256d101070ee1036cd749c8789619709d5a334fc2dee3e0dc6e69b8cc539103a7df355425757746110f54258f43d3e0c3b2f74683f52294faf2cd0e593ddc0a5d095c42d4dd99bcf902383798415751e9b3d82b2501b0e7a6c4113027541e6b1d702a177b086c790810f3264c08abd2e0fd3479e23288fe31e3ba35b1cb23700147b70f3473bcaf5cbeadae679c2baea45f654b58c52c0d05adf84de43564970b050adea696eadba2113c39e4c4d36ac180f3d3611b18b33e0674f49b69751d0298ef6b12076e1d83ba5cc13f40151d7cf3d0efe87984782634618f10803ab678ed9fa3af0fd6401969ceb2da9d0b6a275f1a3c2f6a17661fb348f1e77e0dc14ab3a067150d6a8d1bb8129cf9629e1d6352540077b4e686a7731cd89ca789877f9b17451ae85f425bfc8ef53840af93b827e840d42cba23509565dffb3b6ed182d1ea2872dc0ba569c977316ce55823747e79e020de2ec806d9e379329a6e82dc55699dfb44c81bd0756db09bdc03c50f98e2469548642ded3330b26452ee3b12d202a5e6000d9187e3a4bc6b9494ae69769f6b918a95cd8e75c79358110f57f3fa0314eb79f8884435ba5baf276de734bcdb52305d3d048515fec2dc54eb7a69888aed1c60d91c98373af274a0df51b566cec87b1a6d5816ab17096079e25b1d1ce95d02bf8aaed5e0a2f680bcf3a8a980f74d8b35e6d138d53c6bb95ab58f69d014b6c42f4c120a88c2a82987fb7b24d0f6f0410aa46a2f4e0bb48b35a325d8af4f47ea3e7369575d867559500f0763dfe36c99f0692dacc96b655d8b234f325fdefcce35169f17d6a7e8c8111172a85b40eeb9181fca751b2a353b16210b7a457f80ee02e29ba04fa15b104b0a0cdc10a52c7bdf25a58a392d39032cdfaba444ec07bc0d8e763d4258c0f63833b2ee0a19869a0995078355f1fef9489ff1b8c5b973482a468ecfc6ad60d5af63f80acc2529169c619e4c5665e2afcd928a575ed4565a9cd74514783c4bca8727cb789e016d20a55e0a00526cebbd9711e1996d75033b37caca17c3597fa68c2886ba826842222ecc8f5bce2d872be554feadb35e9de3751088e2750e21308cc477105ca475d2dde28a187e7d5e119fa5fe13143c09f8b02727248b0f4bf5a1531f18a89f37c16fb7999db9ec97f5930788f40282937c6f3183977a7c450268f64aaf4c9c0e67e69c365260c78e66d6d35c2648c355fb24a53a8387b72398da34845ece46f635d588890ebc273e0299d38aa7f455c015db2180a2192e657ab3c097d28d84c1347630df0ba32254fb6409b583d9328c62a6aefed1fb875ee3526c136f31a5da5277f34d68b340dffa43313f4e746a206edfb73114b90600beb292a12339a5699fbfcac579452ba09db9c3399e7a43e76e2d36e6eda40ed88052467a5838d9078dd105593fdf57b291b6e31c80be9654bc1ab611c41529dcae99cc89ba89068efb217a959ee037eb751b072e009b4ac0d5abf97ac15371f1fef1f05a64e2ddb72465083dd33c9570c5d7fc703c0205a1f64b1d8d7a40af6d54e83cb008ec4f0ec862406958d3e535a0b8f85f1bc303603db3f8a7bf1508f0166251f82d1d39045fa08ed5898e3b43593cff0c34ad163135a83fe0e79532808f12a0376a8b61eeb17e09cd4a0d7e8cf19d03f2f7b18953f74b1548b5b38beb660dd7b111c4c7eca482702319fc31c374045de659efb194dc3412939c0a0e512b054f0e50f3a0e6009384426b41f30a2d9e5d37e5104161772d350708d20621d8d16cb244b800def10335ba3cdfa307201f43fe4012ac2231d35fd520ed3f2c61f4aeeee8a6e8adf01db902682af8d8a9402424e78ee0602bd3678f0eda2b02739ce77fcc01086a6534b5facd2e3e2e890fd28ac8dae519efee2f1f012dbb3cfded5eb7f3a44428cfc3db795ba8c7da53a8e6e96367893384d9ea23df67f515c2653009bcbf39d53d203d10253c731a90bb60650d692631b487c8b36099da31e4ac5c18b5d3e5d7a0ec42dd99d42d2814969a9539ed1edd5ee201a047c65380f5e7e7b23f93bff139948268a97d41f2c13a69fdfad419c31049bdf4abd120ca9da989bcb59fe6e66a65be2150c44911eafe90f703a5b4b5c22113265b99a76dbded3630c46ad176d7a70c41ab2a260286e286f08b764463849f0107b5c33d875a8c33b32fe6ecfe992520c88860cc3a709334fd6253c7568ca84fcdbc6f2bb68b3ce1475e8cf87f20f598e0d5397bc9bc37d685fa10e976979c1ba39fdb06bf80d08a2bc2a1e173eaf4486ffe59df4cf3e00adf758af8004385d5a08f848575741f31a17269f68455ff6f890416536a31c99330a406800f80379bff63972e720b8116c548ea204b97bdc59beff609a009e01d981aba74dc23be79bc1d484281105047a38189fbe73f9f4c5a742dfcf439ee47037642f3fda4313b417db16e58541232961a34d978639f1e4683e61479069db5be6accd01b8faa45a6b78244d8238b35fa8364936534cbee5d34d926980ac0e02de24ebdc9c1ecf0c2f436158c0f5d9398b45263e8e5f5c21b03e786b28cb8738da3e17ac833acb9bdd296b2f740c0a284f10339c7e910eaba0faf795855e973c758a0ed6fac56fda0b2db5b549b28e91b3dfbeeda7acd56578242e326dfc4ceca3d6fc413474ac9685c3e854141a1cff2855d37e91efd883eca875d2fb59844192f52ca2157bc8e7d632f18c60718486031ac70e6443631682da2c5b882de0bdea02e031039c6ddc6c8ab33068e6798113d5ee344a0fe37d564e423952af739aa0b0bbd80c02ac22bc26942be5969f703c3b017311de141617ef1ccfe13b5783fff41658eff2c527fdf5d18f82662b66a914fa47108d187de7be4ab596fbe216fe7a141f248366c3624885a1b80f2731fc0a13ff65d4455993f3628d7c6785b8e6dcd167432a2e96dec23b1245b1674282c89c8e52df2ce0a811ba89cf6d0b7a529a5b9fbe8fd374554b61d37468c1938312a16c517b998a8cbd8dde13622197592825e73797bd50c1bbfc93db21278feb0296e5d39681252c92978f6d4759e32464db4c3916dca44adf63ee86b97e0a2a627d2eb17f09c63b7def9d5fede9e42701b2308835fd9d044336246880c09ce8082a1ed048236dc20a7f826e798460d9b365f26c9759fc75ae95a97b55b98ac140190127f2fb3c64216d47488ec999b0a44bf9768b8e1a5f8ac63d87f297ac02a208cfc4cc4c74276e9fe21d944fbd025062cc730828da426be65bba9b662a2f9e38981919491e163217c930ac7f6e962b49ee3279885d34bad8e7de9f90f75c24646791351e96c54009db8c210d4def5fda4578f7298858cc6f4cb272cca3a09bd0aedc7d75a6c1f7a4f28f827b9fb87eef3d8b2077b8ddfe165ed3fcabacdc8f56a43693c97d8f3a27256f526a01be02bf2a10af225e5e97b21b8b676fa8f357f159dd47c28daf4264e93d2df5f394294977e4115914e3f123394fde8f9dc3d5ff59dd6d9b75c132759410b57d6473d4496e837ceea921aa6e839c8b68bcc6bd31f7e2351b36a4eb7180f30f975c8ffde23e7ce0dac17f65bdddc8cd14dcb487a2a04ce9a210e48be64e5b78a071bee2d30c6c3298b90eea9ef8c897155392f084accc66757f2894a538fb3e3616daeb76349ab54c0544ba6dfd5fd01cbb99a79e5bcc569fa04c417aba23362390eb627d546a566d0c8ca6df8c31a787b652e996fad291651146a3720648a499cb2dc4bb05224340d7ff47996d01b6c477a9dc6e5501c07a1bbc308b82c659a58279bde699ce653aa83fca4c6cd6c6a4ecca5a9112093d8fda701911718896e1c2435ef7bfe9b0cc17c91125e941feb1790635859ae38d9be5d271df469b7165d8b5e9cd36f19abe5d21bdd650c5484558670aba2cf504a20b3bc939cbdaf67e9d11a2097b1ebee9660608da084a7119b1befd1ca3ad86b7164f5f030dbbb2b13bee76b83ae63a86b6541aa04edf2c058889d901a3548fa06ab37e6d0d724d07ff1708f2f1342652fb1dce3e209eb4b90756e3ecae3795e1b026a1f1a68c2969cd5fd59114e74a60ff2b128f02acbae22632f4224210b6da847b2c88fd1081649a16c5a609f2fb6bb78d2d0f3ca1aeceb969565cc41e7b51570a0700ca0971156a92f3caa0de9a2daec685286a22675101a6ee1577cedd0c0ff849a5c89de404844ca4900a0932c5e896ef55d3f4453a925e13fdc43d5f578e0f7e13a56bcd9e79f7f56300cb6b4679d3e8d0a333371e42581c8e03cacb084d9748d335b32f4a036b2634dadc2762f0a2fdd4c5334aaf71e512fbd6b2e14c98a87ae207263064bdeaf874f0b5069b9b17629852ec3b407511ddc0959871b047e8c9beb1044c80896cd33795204328c21522020988eaf9deac4900d5365f6cf7d69f4f3120261148f54922699f12675115d47fca7390f62e550285ddfe995b557b0160da7b5d3c911906009e84b96fd96f1a25518435d5078aab626260786a944c22660a6ad7b5a9a4ef9af7796a7096116804509a163cbf02215f87077e3a69f0414f5b9045f83c6424327fde2be998a6d7d5e770159a676dd39f629b7e441c9c18e59e788e105867091920078e2756c5a8db155c30354846664a74d13576f2aa5f7b970ce8c987f03ea65c7905734817e3b5b9fc581c145dfc383e185bf1e309b47", 0x1000}, {&(0x7f0000000e40)="c150ce2c0dcd2d5977ef905a9de643405e7b97ae37093588e50ec6e1ce6a923c45204065eef14c22056dee205bf1a740949a4f79426f03c99c25e648b4eeddd0007781b70a5b41f942fb572f0a09799a249e7d03601ecdfe04628a6b028d23b7d24dcd4950d3d6c18754faf602b50300680d5b66a2ab9551e25242357dc17979e8c24ec007d9ca688c36388527a42f4cf23df1c9d818dc28d6b1a9748131e807a03e38c94a34646d1786d658c7f43ec06727c3b3096765326a8b054b53fc4f668e4bfa12d03dd825e0735c1399b55874d474789beb", 0xd5}, {&(0x7f0000000f40)}], 0x3, &(0x7f0000001140)=[{0x98, 0x111, 0x80000000, "c0107290efee43d87d2c99dfe5dea707615b6753975057b81bdbc539e00dc58b8fe064160ee4498c26f8873a286b75b06cea10024ff0d0873bd73cff1a451a16056815eb3c4cac056ed99ec6ad2946c12ece2ef9d3894762ae8f4cda3435d002dc901cc640cb2f15260042117af796d2e7c8c76f0d0b86dede2b7cdca16f7c2d8ab02a"}, {0xf8, 0x10c, 0x0, "6cd99eeb26592d5edd8cd38791edc648c970a4299a1bfe9a846f7394559e5a082985ac1350142d2f5e5bb4a17a1bb732ad06cc465bfeb1cd4e4cc306bc7dd82117032388f1a7144d02ccde876ed59bf494313954131250b0c96822f7eda81492c3dec3a4c8f764dfac89b71f3afa5c06f02e0fc6959bb46a20c0ef6a962271d0ac3109cf99b981e974968d47ec72e59e3f69a5ea4a89584a1230dac4357953c6928684a3c4850a1bfb4fae0b1a80e00f1b2ef1e641feeb89e5c45c2a15ec2cff026eca807bacb52942ac7752fc27496d5346a949ac9395be50070ac59e092e115cf57ab0c560"}, {0xe8, 0x118, 0x0, "04614823a49f14213f5f9d6524c4226cda57381eb436c038102c2f9fe26b28c30007ac3f8ddd737c33cccbac2f79392e5ae218e9e6989ee59ac06ab82783336e5a7faa3db76f920e6f2bb58bbfabf3b5dbd02a0a2d6428fdb530d8b8c594df35ab6ee44d745cc8699ca2fdc3e03c71d50402f097dcffa96432020c9da0b86722fd54129ecb7e925ff115e40fdfc369474f43e1f7e7de72c38a1bc935709b7e2a110ee4fb5303fd26996f4aee543c2b334dc6021caf51afbbc3d6187c2ec085dfe1128d9955e19dabeb8e586347c173f5b48494cadd23"}], 0x278, 0x40000}, 0x5}, {{&(0x7f0000000fc0)=@in={0x2, 0x4e20, @multicast2=0xe0000002}, 0x80, &(0x7f0000001080)=[{&(0x7f0000001040)}, {&(0x7f00000013c0)="f57e96072f4bfa4d0aa413e72d0ea8c026a063420f1f2181099129778087cfea23c3e455ff6fd7f88f8fb017702f3025a0fb01218620724e231c4cac755cd8350dbb0aee702a4d6d6d5b0b6c4fbc132e5abec6146290b31bc577b5642566ef80de28c645e951167d248036011b7ab2946aea27d0574b4d5895dd8f45657444d94d4c4fc5", 0x84}], 0x2, &(0x7f0000001480)=[{0x10, 0x115, 0x3}, {0xb8, 0x119, 0xa889, "76a1f23e136f4b830126efe0abc2be4cc98689fa7b9cf456102852e6904011d7dfd0f1ee74a04115326decfb174a29654ed25c2ad81fc77e005630c2a260852bf80f69d6d417a3c0d532614c457c587546779d421e79e5e3935a5f78d77f976206a3705b0213e1c5227e8b4413d6b23ca5ce706864354698f1e49793fd5df95ee96cf6a0f42ad595a4c5458f9b4572d035db05a4a3f3712e61bd3a8d7a39fd358b5b"}, {0xe0, 0x104, 0x8, "d0d175ef21d42a3235057742b7d3971900f1c9bd56c7d9cc63edd870580b64e026e958ea8463baddfaffcaa73275ba1c39a27661b9dfd6598c5702278f69028e56169f7295132644751050cd4dc49aade74abdf311d4a5fe8ffc5d9cb75e8db2d0dc9803525a9d2526ad6deff6c0b99581ee1aee74d889317cb0566d1f613d8c7ae34670ea90a464d0231f0e2562a7c9b565b3ed26292e0eceffdc21b716dc56d926d46391c999c8d1f8d26bb65fa0b0f4ac36923d84263b07896dbdc7da7b38d23c629b6197773eee86"}], 0x1a8, 0x4}, 0x8000}, {{&(0x7f0000001740)=@hci={0x1f, r7, 0x3}, 0x80, &(0x7f00000018c0)=[{&(0x7f00000017c0)="3ee050051d50360fc5ed7dc2bb1ad3e77584b70d778d75a6caa9c83c34c33c04dd3c2de81ed86616ee7a30a5fcf792d914f50a9d69e0ba6f867ec150fe397e2b0549cd5013a592df7fd25badde229ade8c1edb028bfc4aca21e24e64817a1abb31f6b854997a073f2e64c4a35fee4fd22404683402fff3d339c6eb6b97bf0573e439cc830a94a0094274594c07a2bb77f71b1cc049bab5c3ddf1b496c4a41cf6d67553ddabdc63ab7efd11889e51c7d149d3541d0e77d933bcd7db4044556ddc4e815bb76a835cc30e20b6a47ec3cdef2d61c9124e397a328965b38ec72a5433ad7199d3931294cf8724e2bb6430fc9fe562d8a8d4ed2c21", 0xf8}], 0x1, &(0x7f0000001900)=[{0x100, 0x10e, 0x6, "5f94fc1a42d1bfbaf27f3b0c6058b7b8d09d7f57d97f21f091a4813d5272ba978ebfb3324317320dfe83cdb4219c71398be17cc1d20d8e6e5b7b929b571fa4914f0f3a1595752a22b5c12c9b3c6593c4074e4831ed190cfa5cd2d30c8ca85df051f1acd075fc56e7c6a7384eb1d532e78212f041e00c91529c14b7f9b3b24aedc01f8762aeb033c5b512c935bf8f1edc42e4c3737762cfcb5b74970bbd064d31bb32dfcddb08530105631268b6a3bdbf11d0bdb008aa0df96f2455af558319b0ec2061d17758e285482f3a152671cf6f76a5df5ce5f58bd10d119e250b7ca8450f8238c91f965988d29ded"}], 0x100, 0x880}, 0x1}, {{&(0x7f0000001a00)=@ax25={0x3, {"dd1b46d8f5be88"}, 0x8}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001a80)="e6d3fedaf5b34585f122f2d180407ed94928af4616", 0x15}, {&(0x7f0000001ac0)="2af31a6bfe17ce186ea705b36b42b3d4fb2443d4bcde2c4db3cfbefacc835457e4c0fbbff357d9ff880e4498dec195fd02e01823da6e9232eec47b2ec725d91db698e1588458f6da97cfb677a6ba8210606a67de67539b1ec5931c89e33d2ced021a065a7807305a3d374e94a6900da9bde757a1d9f6e92d7183c4ef91f43a095d6ff0e776a2f349bd7ca97d0e7598dbe250bdb77da9eebe", 0x98}, {&(0x7f0000001b80)="82807dcd9aad5c11598bd8fdde6c6eb1585d7427d359eb4eb3ec14340b3e434e1c0835adfa603e52790a46e89f594ed8d9b0cc161c2798688fc937fba7104bef4d77b9e36371514082292366bac0efdec110a5ed8fac49dc9724e599729dc4552b296bb64334a13d5ca64e958e61357dc7ec7d3643ea623c4154e630a134cbfc6e2f089fef246eceb855688c6550306f33eff66b68b72f8c95e8ec159bc7001a32daaa7351dae96174143e1d4052ede043b63a277d90d686", 0xb8}, {&(0x7f0000001c40)="af5ed718cb297437b5f82d3da7ee2a1b10aa6acd2bc416e93d04da9d278efc831c4a14bec998b2e130feafb23a0cf792b66e6b144f2745f08ace5acecd64bd381964bc00441a4f7c8a9b1ef5cb33416a88f2a645a61d5fbbce2fa3cc95de2449cd", 0x61}, {&(0x7f0000001cc0)="70bf0ac5105628da1e47", 0xa}, {&(0x7f0000001d00)="3a4ec2e43e03f860e63ef43d183d80373d7ebe4b6e24aa4c70bb891d6959539b6e971303fb1251525fe070862130621140da2b10c7ba5e0317bffa70a95c36fcf8f65cf155230d85653f912812a417e23c03348a1932428f661189b3ec3071bf791e05c7fabd9e9a5bbc049c52", 0x6d}, {&(0x7f0000001d80)="8e73912c6abc74ef4c4f35cf602740dd98fc9fb1feb0add4190ccf5eb8d7cc0c5346957e9b1a9c15908acdc3c0a883f0f135797e7745bfd0dcdf7968cd2861ebc2e7f93df71d9deabee36c925cbe5e224defdaf54a9ccc0d3190a2c5fcb1935330d20049a05ad8cb550d1564eb1167aebc4291103f54cffa92f5370dac7e603311a8bd23116cd8c2a743f8fb1da6e69b399c50fd1347a80e9f6ca064d197059e4d463137f056c2c7e8f2db78fd9a882d68aee0720809ebce285be654", 0xbc}, {&(0x7f0000001e40)="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", 0xff}], 0x8, &(0x7f0000002040)=[{0xc8, 0x111, 0x4, "f7044a3132fb80930bbfcb78781450a0ffd047b2c157d3bba1482957893e2312a019b19b09654a70d411409e2e042654af50532fe79c5ca1e87010b2833e7baee599970a9ff02ed20b79c128643d69f6c4c540a64fa3bdc0dde913a7b89e4dbfebad6fd7e000cff8da886672d18b3e3d16ec243771f765b6d6663e121326c9139774fddd94a43e63dd2d146fe1dc89bce91bbc88f7848dd257dd1b0217d91f0f84aefd8a69e3f1aaeb03266a1fd00bb63abccc"}, {0x108, 0x1ff, 0x0, "3b78b289d288ea17aee7da5a23acb0bb8dac3f2f72485f4b448e27eed21977a491f76782d2fa4a310188e911eb92956601aa5fd5cf314d55f7240ad315cdd6ab47ad79bc87f79251f04247b73082c0a483ab6443a43db71c2ba33a1f57489b1c772d4efbf323b8b590d16528abc47672b1b73957ab7ba8c468026616f601cdacebdb5c504a3c13f079fc80ab9a62034a985120aa094758dcd476bd350d9771e2a973303d8dfb7976678cba74168c533f0966e70211fcfa75bd0ab2e74651770853895594218a586340301e0682464148bf529dcf9cb42af340ff7af730c8dc5f084f06dd36661d4437b63817ca5bd5ff5800616b61"}, {0xe0, 0x10e, 0x6, "16e096a4092922cd5cf29ca4d967600018203df76138a29d5af015da3fa2153ef783c7805be6a8ee73d15e01a321eec131dcec73bcd870067cb887d0edef86354c15b1c743bf72eae332418c634a60cb6ddf4b8828285fba5c6e8679ff1fe70bf8f036b466f764a8595b93e6049f1b3461ac106e50da877491702c55f815148d7e56b46a5b6018f404e60a1f89b6381477ea20c2d25cd9863d9d37cb5e92664d7bca4ca03e150623544d8a0dd50d68b8946bca03f82e43a2cef1cbde86b6a605da13cb3173e60e3a14eb0ed8"}, {0x110, 0x118, 0x9, "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"}, {0xf0, 0x117, 0x0, "09a28da6948b6fee49fa7465976f09fcb8b2782972094c13fb830262d9da497b5fd73790359680bf168bb7bea6636a1229f512abbe3b122e5db2cc2d6080fed2d3740e775a1cf986b344d091fe779cacf9b99bb07b7d60318531a6b78733fe677387c621cdcc3fbc70f7fb7929a174d9e62728ecad062265d9e3a3c3b4bade6250f4c33338e38628e7fea8c0bf2bd74f3cb758bc8217c955b4b19affb712074d3ceed2f77fb87a90a4b4b57a9582ee87ee3d7589183ceabbd9a28841844b70086ec2c82be9a66f430e939a425a9b1c6a4d2bcf5f0d79cfd01a1f"}, {0x40, 0x10b, 0x5, "9475e8429e8b8e5b76718172a58b8bf651b698ae267544a08a128cb68aa7ae717fc5d8c611ae5c489b8aba131d1a78"}, {0x88, 0x13b, 0x71, "134861191fd84fece7b056e4186ca25b398faf03b959a98a84ea20b92fd02577f0aef83c98c7b83b38bcf4749ead499d0b5202811d5a9300982c048cd10bfaf3461f075e714d4bf36b21f4f68f8d1f149169530ca2e3ebcdaf782be22afe61eddf695e74fc903c7b35164a1d3ef94b0b343e66b848df"}, {0xe8, 0x11d, 0xc63a, "cd57a9300b0eb5c100d40b2e5468a5402513931657da89104af65a9297701324cb18d398b4c16407a8e86ba08fdcb621404278d3aae96fefc82a8ae21028c14200fa240462aae366f9d8913b2aebd50cd8c176edc61fd154bad9b951a43723f0c7b8719f09cdc186daf61b6e8ed62abd166888ea1c93df0b1f6e11c27b9198bc6704b1eed24cff0f5267f03e934ce668bcce3e2180c4fe4f08195f4193d62d8ec30126e64911ece590ee9dcaa3b3d642ba3f13c597014442d50dfa9cfcf682f1030a94e4b604fb7e043f5a1b8b61d327263de781cb2e"}], 0x660, 0x8000}, 0x3ff}, {{&(0x7f00000026c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x1, 0x2, 0x2, 0x3, {0xa, 0x4e20, 0xfffffffffffffffd, @empty, 0x181}}}, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000001fc0)="838d3f907c2650e1cee29aec793d7fc737166d5c34753a33c7deaa7a238d78f59dea2e11539f379c754d1791b58b03", 0x2f}, {&(0x7f0000007480)="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", 0x1000}, {&(0x7f0000002740)="96c78dc0361debd70dbd97d636e43b58ddfa41e100abad8f9639dbf49f190db26a5f1b91fa1f0abaad64cc73ffce73d39dfc674f823782e00962fc8fcab78e5b963dbfe031ecf94c73d141149db003a0c19c0faedd3360", 0x57}, {&(0x7f00000027c0)="f6af8a521f4b2753ff73d808cc7faaa84e0293080b077878f4116b1bf3960c0ad67e54188d16bc48667ecee2939d78969a3e5dd5c6c1a6f906eef96752f80edce736ef459d226a3afba9911636fe222475ec8af1251c4421cb614d82b6394aecc745af774e130153230bfc8e54dfc1", 0x6f}, {&(0x7f0000002840)="b544e98680", 0x5}, {&(0x7f0000002880)="7c3306a830da8bc4a06f6d3561a231fd26f3b411f3f46ea8584459c48e2317ba20a598", 0x23}, {&(0x7f00000028c0)="dcaacfb816fd3b11ae1d8d4e0d5a0a76402241d3c945ea4efad4d8ff9c7f3c50f6c8cbd5a3f04d9d6469588afb3ebb3932fb64fb39a261202f67e28cc728b00005634e75f7f5114bef3ab52380a5686e835aaddb12c46ca02270f6ed772cd2fdfb35b28a53198529ac44f78bde9d51d0a41bbfaa6348707e11b4f5e0927e850fc9132bb9cf8e562a65e0291e8497be439fb85869ebc0d6ccc46d83aa1d3144e64ccef57ecad79e83b25af7d07c995f8cc1bc4fe0", 0xb4}, {&(0x7f0000002980)="0842a3bd3fd163ce31040b2b0628ad2ac35688f58a3d857a17b330f804158d7386ed15dba2d73965e3154004116b8e", 0x2f}, {&(0x7f00000029c0)="e89fd732032b5ee9b06fc2d56ac21bbfee725f78692293dcde9235b25863e46318927655be2f7e7a86a40827e59739b46bce5a30d546848ab5750e16b6aee34d17f924028e3c0c0bcdd7f59bac85d7554f49726b90d969ef6e1941e6527cdae4cfae9e127f7f6454f03d1a0fb0ab16c2a0d416d304e496eb41508343acbf65229cf7b83883adae49bed409f24a6189fec082893e396cdf49ff603a559a9f02627d307c1310718c9e90c97677f72cce5dc9fe03dc906e07ce4024a81a55f9b57765285aab428b", 0xc6}, {&(0x7f0000008480)="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", 0x1000}], 0xa, &(0x7f0000009480)=[{0x58, 0x84, 0x8, "864d62ce1df5a8a2018967162c0a4e305fa2d58ed4b1caf3d75198f62b18bfff10410ad8847a7afbffe80bdd2220eac438dd4de1b1ec177e52f7d3f80021244d031f90"}, {0x1010, 0x105, 0x3f, "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"}, {0x50, 0x0, 0x0, "3000bb58dc2b80f30eb57f30cce2ebdb66f77fc19ff5b5fd625204a5479bd70d7fff9bce01e6dc80080e374cafb8fb06d3c7d882744e6bf5ad34eda7a3a8"}, {0xb8, 0x10d, 0x10001, "e78965949adbe49255bf34487418ce137591d0ea578aa85b915d1bd164b1a5495db17d1df816c04b106a72dab1505b2112baa8deb1accd33d8cd0692877b560cacaf283b3f1b443ec2bf8a01cd52610f23fea71c297950c3dc7a3bfd6c7b2fa9664349ed6a237b320984fcef034e391eb286eafe8626f986960ebc1e093903847ab741a3771aa987805938f81b88564e28bc00ddd991e3fb96a609aaf068b0d0726706ed"}, {0xa0, 0x11d, 0x3, "dda49954d1b89910c3c32ccead32a63af5ad667e9055a09b81feb76eea48ea0d6d9a03d3258d21c00d8c1606c5aa48965a0aebe38fc612189e7818be9aea4ae280230348dc43dc30f6fe1b3f50388e454d380972c658e914d6685dc7420fbb4d10764bc264caf76e302f1f291eb6816e1797f1a5db129387c60d756d2699c992d06e8cab3dcda6798c1838f7"}], 0x1210, 0x4000}, 0x8}], 0x7, 0x80) 2018/03/29 16:07:30 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x0, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:30 executing program 4: setitimer(0x3, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x7530}}, &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x1, 0xffffffffffffffff, 0x0, 0x80000001, 0x8000) timerfd_create(0x7, 0x800) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x7, 0x200) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$sock_netrom_TIOCOUTQ(r2, 0x5411, &(0x7f0000000140)) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000040)) 2018/03/29 16:07:30 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={0xffffffffffffffff, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:30 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355", 0x17}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:30 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x0]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:30 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e1", 0x1b}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x0, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:30 executing program 2: r0 = socket$inet6(0xa, 0x80007, 0x3c) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) process_vm_writev(r1, &(0x7f0000000240)=[{&(0x7f0000000080)=""/31, 0x1f}, {&(0x7f00000000c0)=""/217, 0xd9}], 0x2, &(0x7f0000001580)=[{&(0x7f0000000280)=""/236, 0xec}, {&(0x7f0000000380)=""/113, 0x71}, {&(0x7f0000000400)=""/35, 0x23}, {&(0x7f0000000440)=""/229, 0xe5}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001640)=""/240, 0xf0}, {&(0x7f0000001740)=""/200, 0xc8}, {&(0x7f0000001540)=""/36, 0x24}], 0x8, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040)=0x100000000000007, 0x4) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001840)='/proc/self/net/pfkey\x00', 0x101000, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f00000018c0)='/dev/dmmidi#\x00', 0x5, 0x80000) linkat(r2, &(0x7f0000001880)='./file0\x00', r3, &(0x7f0000001900)='./file0\x00', 0x1400) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000001980)=&(0x7f0000001940)) sendmsg(r0, &(0x7f0000001600)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f0000001540), 0x0, &(0x7f0000000000)}, 0x0) 2018/03/29 16:07:30 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:30 executing program 7 (fault-call:5 fault-nth:0): unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:30 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000001180)) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x80104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, @perf_config_ext={0xf02, 0x4}}, 0x0, 0x0, r0, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x1, 0x0, 0x84000b) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000100)="b9c2cf89e411c6937c401c16dea5ec0437a75a721e18f7c03ad7e817e04d27c094a61b6190b4a074910f29f6ba055c9fbb055693f7c2812a344288a9ad9b21c8dadd730f984ebc2c4d21ce1e709c138c5baeae0106c4ddd5e90578c1e0ed7380a0ef413cb17b3f5703d783fee804a581dec10d", &(0x7f0000000180)=""/4096}, 0x18) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7) 2018/03/29 16:07:30 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aa9eaaaaaaaae7d0882a850000dd60f8379600082b00fe8000000000000000070000000000000080000000400000000000b5deea4008221e3800000890c38caf315ea91eadfd515e453903216373602f18c83c6079cf1ca5bc094f30effb3f98f88b2906bc4895248b8562fce0ae85cd3620940cf21d06848c3ffa218d6299c339ebd2ffe30d05cb5297146f8467d361aafc7504e7053530874d1323cbbeddb5d7ad21f17b02151d1280d3801d510b555e44862cc5714074d7f784e5e10fde09d153a5da82afa6e4094eb29ea5ea47dc8a8b3de0ae8886d8b2d15dbd2662a3c1b95a629f4d94dc00d851f064c129b4095e"], &(0x7f0000000000)) 2018/03/29 16:07:30 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x40b0000080044dff, &(0x7f0000000080)=0x8002) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)="5d740b59c0c371899d82fb3053f8715db0547392e437a5fd6f3fe241ee24fba6e396f7cb18951ebd98b5c14589ee25160bb030c4d2df7195a5baaeabd0aba3972b2bba3ed04220572dcac7ce03661e64b03cfb9e6dd1357d2d941ab5c6bed2feb96760980a14fe93aa3b6f68862d84305e361a9de9ef110ca0ce7d5b", 0x7c, 0x0) r2 = request_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)='@vmnet0wlan1loeth1vboxnet1em0\x00', 0x0) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000540)="8c9a44bc3e9be5ee0128c88ba1ff8f066af70e74c8bc4b641b22b1b0b0a3e74d1c4141deb2a083f7586c8c75aeb0dea34ea30fe9afaaf3aaf33571d48832a8794c290b4b12100e3c4d2f5c58089263a8d713ab1d05cdf09c10be4afae7feaa146183934281b4e7f17b079d917a2ac9130c07131904ccb32444adc409c8da65e154506a5e0e36a2d6d9192092843380a7bb9d7e7a962cdb", 0x97, r2) r3 = request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000002c0)='/dev/dsp\x00', 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, r2, r3}, &(0x7f0000000340)=""/43, 0x2b, &(0x7f0000000440)={&(0x7f0000000380)={'sha1-avx2\x00'}, &(0x7f00000003c0)="e9f3b0ea92c9d0908e143a919d2aec16527c2f3e39f7c0a0dad2454bf44d98c547142f6412c9d59c0881ddee8325c2610d54fb1f85e5eae536adfd170492425c0bb0cbd94531ee8c0207cdbc03626bda24d33d", 0x53}) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000480), 0x4) [ 70.322940] FAULT_INJECTION: forcing a failure. [ 70.322940] name failslab, interval 1, probability 0, space 0, times 0 [ 70.334291] CPU: 1 PID: 9387 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #5 [ 70.341390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.350734] Call Trace: [ 70.353306] dump_stack+0x194/0x24d [ 70.356915] ? arch_local_irq_restore+0x53/0x53 [ 70.361573] should_fail+0x8c0/0xa40 [ 70.365265] ? trace_hardirqs_off+0x10/0x10 [ 70.369565] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 70.374640] ? trace_hardirqs_off+0x10/0x10 [ 70.378937] ? get_pid_task+0xbc/0x140 [ 70.382803] ? proc_fail_nth_write+0x9b/0x1d0 [ 70.387272] ? map_files_get_link+0x3a0/0x3a0 [ 70.391747] ? handle_mm_fault+0x35b/0xb10 [ 70.395960] ? find_held_lock+0x35/0x1d0 [ 70.400027] ? check_same_owner+0x320/0x320 [ 70.404330] ? rcu_note_context_switch+0x710/0x710 [ 70.409250] should_failslab+0xec/0x120 [ 70.413203] kmem_cache_alloc+0x47/0x760 [ 70.417236] ? vfs_write+0x224/0x510 [ 70.420934] getname_flags+0xcb/0x580 [ 70.424710] ? SyS_read+0x220/0x220 [ 70.428316] SyS_execveat+0x38/0x60 [ 70.431917] ? SyS_execve+0x50/0x50 [ 70.435522] do_syscall_64+0x281/0x940 [ 70.439380] ? __do_page_fault+0xc90/0xc90 [ 70.443588] ? _raw_spin_unlock_irq+0x27/0x70 [ 70.448060] ? finish_task_switch+0x1c1/0x7e0 [ 70.452531] ? syscall_return_slowpath+0x550/0x550 [ 70.457436] ? syscall_return_slowpath+0x2ac/0x550 [ 70.462344] ? prepare_exit_to_usermode+0x350/0x350 [ 70.467340] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 70.472684] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 70.477511] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 70.482677] RIP: 0033:0x4548b9 [ 70.485839] RSP: 002b:00007f5371b77c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 70.493519] RAX: ffffffffffffffda RBX: 00007f5371b786d4 RCX: 00000000004548b9 [ 70.500761] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000000000014 [ 70.508005] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 70.515259] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000015 2018/03/29 16:07:31 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000280)={{0xa, 0x4e23, 0x8, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, {0xa, 0x4e20, 0x2, @empty, 0x2}, 0x850, [0x7, 0x23, 0x100, 0xffffffffffffff80, 0x800, 0x1f, 0x20, 0x7ff]}, 0x5c) r3 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x3, 0x40) fallocate(r3, 0x11, 0x0, 0x4000b) getsockopt$inet6_buf(r2, 0x29, 0x14, &(0x7f0000000140)=""/215, &(0x7f0000000240)=0xd7) 2018/03/29 16:07:31 executing program 2: pipe2(&(0x7f0000edeff8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) vmsplice(r0, &(0x7f0000de4000)=[{&(0x7f0000663000)='F', 0x1}], 0x1, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00ffffffff007910"], &(0x7f0000000640)="47504c00bc3047629662c71f3f5f26c0b48bec3e7ba6eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x7, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) tkill(r3, 0x1000000000016) dup2(r0, r2) 2018/03/29 16:07:31 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 70.522500] R13: 0000000000000078 R14: 00000000006f2be0 R15: 0000000000000000 2018/03/29 16:07:31 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e1", 0x1b}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:31 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000016ff8)='keyring\x00', &(0x7f000000b000)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x80004) keyctl$join(0x1, &(0x7f0000019ffb)={0x73, 0x79, 0x7a, 0x0}) keyctl$join(0x1, &(0x7f0000017000)={0x73, 0x79, 0x7a, 0x0}) 2018/03/29 16:07:31 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:31 executing program 6 (fault-call:11 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:31 executing program 7 (fault-call:5 fault-nth:1): unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) r2 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000340)={r0, r0, 0x40000}) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000200)={@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0xffffffffffffff00, 0x2, "bea02ea700bae6984cc394871451263e980c7693dda9f291c665731521710a0edf74c1f07cc63bca7fb1766f922a373168f712f4bb5bda6eee83d964599100", 0x2f}, {&(0x7f0000000100)=""/142, 0x8e}, &(0x7f00000001c0)}, 0xa0) fallocate(r3, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}}, 0x0, 0x0, 0x0, 0x401}}, &(0x7f00000002c0)=0xb0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000000040)={0x2, 0x800, 0x3, 0x23, 0x8, 0xfffffffffffffff7}) prlimit64(0x0, 0x0, &(0x7f0000000000)={0x79}, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)) 2018/03/29 16:07:31 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:31 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) [ 70.700331] FAULT_INJECTION: forcing a failure. [ 70.700331] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 70.712168] CPU: 1 PID: 9428 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #5 [ 70.719268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.728625] Call Trace: [ 70.731224] dump_stack+0x194/0x24d [ 70.734863] ? arch_local_irq_restore+0x53/0x53 [ 70.739566] should_fail+0x8c0/0xa40 [ 70.743293] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 70.748411] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 70.753599] ? trace_hardirqs_off+0x10/0x10 [ 70.757907] ? _parse_integer+0x140/0x140 [ 70.762051] ? find_held_lock+0x35/0x1d0 [ 70.766116] ? get_pid_task+0x93/0x140 [ 70.770018] ? perf_trace_lock+0xd6/0x900 [ 70.774147] ? perf_trace_lock_acquire+0xe3/0x980 [ 70.778979] ? trace_event_raw_event_lock+0x340/0x340 [ 70.784149] ? perf_trace_lock+0x900/0x900 [ 70.788369] ? should_fail+0x23b/0xa40 [ 70.792232] ? trace_hardirqs_off+0x10/0x10 [ 70.796550] __alloc_pages_nodemask+0x327/0xdd0 [ 70.801192] ? get_pid_task+0xbc/0x140 [ 70.805070] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 70.810068] ? handle_mm_fault+0x35b/0xb10 [ 70.814290] ? find_held_lock+0x35/0x1d0 [ 70.818382] ? check_same_owner+0x320/0x320 [ 70.822704] cache_grow_begin+0x72/0x640 [ 70.826760] kmem_cache_alloc+0x400/0x760 [ 70.830884] ? vfs_write+0x224/0x510 [ 70.834599] getname_flags+0xcb/0x580 [ 70.838379] ? SyS_read+0x220/0x220 [ 70.841999] SyS_execveat+0x38/0x60 [ 70.845611] ? SyS_execve+0x50/0x50 [ 70.849225] do_syscall_64+0x281/0x940 [ 70.853090] ? __do_page_fault+0xc90/0xc90 [ 70.857308] ? _raw_spin_unlock_irq+0x27/0x70 [ 70.861785] ? finish_task_switch+0x1c1/0x7e0 [ 70.866264] ? syscall_return_slowpath+0x550/0x550 [ 70.871177] ? syscall_return_slowpath+0x2ac/0x550 [ 70.876089] ? prepare_exit_to_usermode+0x350/0x350 [ 70.881092] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 70.886448] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 70.891299] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 70.896467] RIP: 0033:0x4548b9 2018/03/29 16:07:31 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e1", 0x1b}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) pipe(&(0x7f0000000100)) fallocate(r1, 0x11, 0x0, 0x4000b) [ 70.899641] RSP: 002b:00007f5371b77c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 70.907328] RAX: ffffffffffffffda RBX: 00007f5371b786d4 RCX: 00000000004548b9 [ 70.914578] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000000000014 [ 70.921829] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 70.929075] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000015 [ 70.936321] R13: 0000000000000078 R14: 00000000006f2be0 R15: 0000000000000001 2018/03/29 16:07:31 executing program 4: ioprio_get$pid(0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, &(0x7f0000b4bff8), 0x100000002) r2 = getpgid(0x0) sendfile(r1, r0, &(0x7f0000000000), 0x4) tkill(r2, 0x1000000000016) r3 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001200)) geteuid() fstat(0xffffffffffffff9c, &(0x7f0000001240)) recvmsg(0xffffffffffffff9c, &(0x7f0000001500)={&(0x7f00000012c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000001340)=""/103, 0x67}, {&(0x7f00000013c0)=""/8, 0x8}], 0x2, &(0x7f0000001440)=""/155, 0x9b, 0x80000001}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000001700)) syz_fuseblk_mount(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='./file0\x00', 0x4000, 0x0, 0xffffffffffffffff, 0x3ff, 0x1, 0x21) getpgrp(0xffffffffffffffff) getegid() sendmmsg$unix(r3, &(0x7f0000001ac0)=[{&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000011c0)=[{&(0x7f00000000c0)="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", 0x1000}], 0x1, &(0x7f00000010c0)=ANY=[@ANYBLOB="0000000020000000000000000100000001000000aea4ae0100008000000000fa8cacd22859fa18ea5c5b83b4cbe62a7f997d86c4f3b9564aae2077c6de639bc192579f791a1aaf55dddf31e92b51874cd18934922d44d643d1a9b81f5e0299b11a4a2ecc4f2d46"], 0x14, 0x20000000}], 0x1, 0x0) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f00000017c0)=0xaf8, 0x4) 2018/03/29 16:07:31 executing program 7 (fault-call:5 fault-nth:2): unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:31 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x0, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:31 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 71.033138] FAULT_INJECTION: forcing a failure. [ 71.033138] name failslab, interval 1, probability 0, space 0, times 0 [ 71.044494] CPU: 1 PID: 9452 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #5 [ 71.051586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.060920] Call Trace: [ 71.063487] dump_stack+0x194/0x24d [ 71.067097] ? arch_local_irq_restore+0x53/0x53 [ 71.071743] ? trace_hardirqs_off+0x10/0x10 [ 71.076053] should_fail+0x8c0/0xa40 [ 71.079747] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 71.084828] ? find_held_lock+0x35/0x1d0 [ 71.088874] ? is_bpf_text_address+0x7b/0x120 [ 71.093348] ? find_held_lock+0x35/0x1d0 [ 71.097411] ? check_same_owner+0x320/0x320 [ 71.101705] ? kernel_text_address+0x102/0x140 [ 71.106261] ? rcu_note_context_switch+0x710/0x710 [ 71.111163] ? __kernel_text_address+0xd/0x40 [ 71.115641] should_failslab+0xec/0x120 [ 71.119592] kmem_cache_alloc_trace+0x4b/0x740 [ 71.124147] ? SyS_unshare+0xfa0/0xfa0 [ 71.128027] do_execveat_common.isra.30+0x3ea/0x23c0 [ 71.133103] ? getname_flags+0xcb/0x580 [ 71.137048] ? SyS_execveat+0x38/0x60 [ 71.140824] ? do_syscall_64+0x281/0x940 [ 71.144872] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 71.150219] ? prepare_bprm_creds+0x110/0x110 [ 71.154691] ? check_stack_object+0x68/0x140 [ 71.159077] ? __check_object_size+0x8b/0x530 [ 71.163549] ? usercopy_abort+0xd0/0xd0 [ 71.167501] ? do_raw_spin_trylock+0x190/0x190 [ 71.172057] ? check_same_owner+0x320/0x320 [ 71.176353] ? rcu_pm_notify+0xc0/0xc0 [ 71.180220] ? strncpy_from_user+0x323/0x430 [ 71.184608] ? mpi_resize+0x200/0x200 [ 71.188379] ? vfs_write+0x224/0x510 [ 71.192080] ? getname_flags+0x256/0x580 [ 71.196113] ? SyS_read+0x220/0x220 [ 71.199721] SyS_execveat+0x4f/0x60 [ 71.203323] ? SyS_execve+0x50/0x50 [ 71.206925] do_syscall_64+0x281/0x940 [ 71.210785] ? __do_page_fault+0xc90/0xc90 [ 71.214997] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 71.220514] ? syscall_return_slowpath+0x550/0x550 [ 71.225418] ? syscall_return_slowpath+0x2ac/0x550 [ 71.230326] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 71.235669] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 71.240495] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 71.245659] RIP: 0033:0x4548b9 [ 71.248822] RSP: 002b:00007f5371b77c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 71.256503] RAX: ffffffffffffffda RBX: 00007f5371b786d4 RCX: 00000000004548b9 [ 71.263745] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000000000014 [ 71.270988] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 71.278241] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000015 [ 71.285483] R13: 0000000000000078 R14: 00000000006f2be0 R15: 0000000000000002 2018/03/29 16:07:32 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70", 0x1d}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:32 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x0, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:32 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) sendmsg$kcm(r2, &(0x7f00000006c0)={&(0x7f00000001c0)=@can={0x1d, r4}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="1bf30e407ac2d5d8df18b5fc0174bcfd5870002dff40f5bc9ccb1c5e5d2c5633727ca1f8550db22c2de8909348286881ace091d27063ecb4740203e079cdf45ca5787d538b4ddfeda33561388de029354d75a6418a772537c126d238aafc3887c3ea037a366a02468d15553c6fcae2151f829ac757fe2f0a0eae393249ed94517fa95256f51a407ff90a55ba658ad5faf033ba82256d8aa1e88a4558583f041350fcc3daf8801e", 0xa7}], 0x1, &(0x7f00000004c0)=[{0x48, 0x197, 0x401, "5dc70e508053e63be1119e6c1932814bf07ce4a35cb08f3eabf0300d21bb0d4cfa701f2f7377d6dd0615b53ff15ffb506c3bdfd07f"}, {0xb8, 0x10b, 0x7, "2e622e25ca89217d228e8c6a0ff7085c78b69c150ddeaf962cd021a2751b0404023fa458d6c5f76a5864880cd0b0e576fd842e4ede97055700d62f02bb77147b149dc0e925a40f6f0ba86291ad263e2190d3ae27977a6560b68da302c8fb85656ab9192b8cc6b7f0f140ae94453afb3bcbc87c0bbf45eabfd554116516d06218ddefed47d0192142716f8ab9577f3bdf334a93c1570a462968fa383828597ccd7983df35"}], 0x100, 0x800}, 0x20000001) 2018/03/29 16:07:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x8) bind$alg(r1, &(0x7f00000002c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00005b1fd0), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) 2018/03/29 16:07:32 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:32 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x3) mount(&(0x7f0000df7000)='./file0/file0\x00', &(0x7f0000c7f000)='./file0\x00', &(0x7f0000df9000)='nfs4\x00', 0x0, &(0x7f0000000000)='v3') 2018/03/29 16:07:32 executing program 1: socket$netlink(0x10, 0x3, 0x17) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000100)={0x5, 0x7, 0x80000001, 0xfffffffffffffffe, [], [], [], 0x4, 0x4388, 0x5, 0xffffffffffffffd6, "a311633b7cdd0b5d9d59ad46e2694946"}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000340)={&(0x7f0000000300)=[0x400, 0x0], 0x2, 0x100000001, 0x3f, 0x3ff, 0x7, 0x6, {0x8000, 0x2, 0x2, 0x40, 0xfffffffffffffffa, 0x40, 0x1, 0x4, 0x3, 0x5, 0x8, 0x5fe3, 0xffffffff, 0x9, "9ea8a5a46a284b72b5e8b85c4890a98f1ae76d5bc1f40aa58b1426404215fa27"}}) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000000240)=""/114, &(0x7f00000002c0)=0x72) 2018/03/29 16:07:32 executing program 7 (fault-call:5 fault-nth:3): unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:32 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x90800, 0x0) syz_open_pts(r1, 0x200000) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') stat(&(0x7f0000000400)='./control/file1\x00', &(0x7f0000000440)) chown(&(0x7f00000003c0)='./control\x00', 0x0, 0x0) close(r2) 2018/03/29 16:07:32 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x0, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) [ 71.456982] FAULT_INJECTION: forcing a failure. [ 71.456982] name failslab, interval 1, probability 0, space 0, times 0 [ 71.468489] CPU: 0 PID: 9481 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #5 [ 71.475578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.484920] Call Trace: [ 71.487509] dump_stack+0x194/0x24d [ 71.491149] ? arch_local_irq_restore+0x53/0x53 [ 71.495803] ? __might_sleep+0x95/0x190 [ 71.499766] ? prepare_bprm_creds+0x53/0x110 [ 71.504171] should_fail+0x8c0/0xa40 [ 71.507872] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 71.512957] ? mutex_lock_io_nested+0x1900/0x1900 [ 71.517784] ? __save_stack_trace+0x7e/0xd0 [ 71.522110] ? find_held_lock+0x35/0x1d0 [ 71.526161] ? __lock_is_held+0xb6/0x140 [ 71.530227] ? check_same_owner+0x320/0x320 [ 71.534532] ? rcu_note_context_switch+0x710/0x710 [ 71.539458] should_failslab+0xec/0x120 [ 71.543414] kmem_cache_alloc+0x47/0x760 [ 71.547458] ? check_same_owner+0x320/0x320 [ 71.551762] ? rcu_pm_notify+0xc0/0xc0 [ 71.555641] prepare_creds+0x78/0x360 [ 71.559421] ? abort_creds+0x130/0x130 [ 71.563288] ? do_execveat_common.isra.30+0x3ea/0x23c0 [ 71.568541] ? rcu_read_lock_sched_held+0x108/0x120 [ 71.573538] ? kmem_cache_alloc_trace+0x459/0x740 [ 71.578355] ? SyS_unshare+0xfa0/0xfa0 [ 71.582230] prepare_exec_creds+0x11/0xf0 [ 71.586360] prepare_bprm_creds+0x67/0x110 [ 71.590577] do_execveat_common.isra.30+0x40a/0x23c0 [ 71.595654] ? getname_flags+0xcb/0x580 [ 71.599606] ? SyS_execveat+0x38/0x60 [ 71.603381] ? do_syscall_64+0x281/0x940 [ 71.607427] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 71.612788] ? prepare_bprm_creds+0x110/0x110 [ 71.617263] ? check_stack_object+0x68/0x140 [ 71.621659] ? __check_object_size+0x8b/0x530 [ 71.626139] ? usercopy_abort+0xd0/0xd0 [ 71.630098] ? do_raw_spin_trylock+0x190/0x190 [ 71.634661] ? check_same_owner+0x320/0x320 [ 71.638963] ? rcu_pm_notify+0xc0/0xc0 [ 71.642840] ? strncpy_from_user+0x323/0x430 [ 71.647241] ? mpi_resize+0x200/0x200 [ 71.651022] ? vfs_write+0x224/0x510 [ 71.654740] ? getname_flags+0x256/0x580 [ 71.658777] ? SyS_read+0x220/0x220 [ 71.662389] SyS_execveat+0x4f/0x60 [ 71.665993] ? SyS_execve+0x50/0x50 [ 71.669605] do_syscall_64+0x281/0x940 [ 71.673470] ? __do_page_fault+0xc90/0xc90 [ 71.677680] ? _raw_spin_unlock_irq+0x27/0x70 [ 71.682153] ? finish_task_switch+0x1c1/0x7e0 [ 71.686628] ? syscall_return_slowpath+0x550/0x550 [ 71.691537] ? syscall_return_slowpath+0x2ac/0x550 [ 71.696445] ? prepare_exit_to_usermode+0x350/0x350 [ 71.701441] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 71.706791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 71.711625] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 71.716791] RIP: 0033:0x4548b9 [ 71.719955] RSP: 002b:00007f5371b77c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 71.727644] RAX: ffffffffffffffda RBX: 00007f5371b786d4 RCX: 00000000004548b9 [ 71.734889] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000000000014 [ 71.742136] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 71.749380] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000015 [ 71.756624] R13: 0000000000000078 R14: 00000000006f2be0 R15: 0000000000000003 2018/03/29 16:07:32 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x0, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:32 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000140), 0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), 0x4) 2018/03/29 16:07:32 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[]}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:32 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pread64(r0, &(0x7f0000000280)=""/239, 0xef, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:32 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x4012}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000100)=ANY=[@ANYBLOB="00005b01aaaaaaaaaabbaaaaaaaaaabb0000000000000180c2000000aaaaaaaaaa06aaaaaaaaaa00ffffffffffffaaaaaaaaaaaafffffeffffffaaaaaaaaaaaa"]) 2018/03/29 16:07:32 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:32 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) connect$vsock_dgram(r0, &(0x7f0000000100)={0x28, 0x0, 0x2711, @reserved=0x1}, 0x10) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x80}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000001c0)={r2}, &(0x7f0000000200)=0x8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)=0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1, 0x100000000}, 0x8) fcntl$setown(r1, 0x8, r3) r4 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r4, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:32 executing program 7 (fault-call:5 fault-nth:4): unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) [ 71.927602] FAULT_INJECTION: forcing a failure. [ 71.927602] name failslab, interval 1, probability 0, space 0, times 0 [ 71.938916] CPU: 0 PID: 9508 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #5 [ 71.946007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.955353] Call Trace: [ 71.957941] dump_stack+0x194/0x24d [ 71.961585] ? arch_local_irq_restore+0x53/0x53 [ 71.966248] ? __lock_acquire+0x664/0x3e00 [ 71.970488] should_fail+0x8c0/0xa40 [ 71.974193] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 71.979270] ? lock_pin_lock+0x360/0x360 [ 71.983306] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 71.988474] ? trace_hardirqs_off+0x10/0x10 [ 71.992773] ? print_irqtrace_events+0x270/0x270 [ 71.997505] ? find_held_lock+0x35/0x1d0 [ 72.001545] ? __lock_is_held+0xb6/0x140 [ 72.005596] ? check_same_owner+0x320/0x320 [ 72.009893] ? rcu_note_context_switch+0x710/0x710 [ 72.014808] should_failslab+0xec/0x120 [ 72.018761] kmem_cache_alloc+0x47/0x760 [ 72.022795] ? is_bpf_text_address+0x7b/0x120 [ 72.027265] ? print_irqtrace_events+0x270/0x270 [ 72.032001] get_empty_filp+0xfb/0x4f0 [ 72.035867] ? proc_nr_files+0x60/0x60 [ 72.039733] ? rcutorture_record_progress+0x10/0x10 [ 72.044736] ? __lock_acquire+0x664/0x3e00 [ 72.048944] ? kernel_text_address+0x102/0x140 [ 72.053500] ? __kernel_text_address+0xd/0x40 [ 72.057972] path_openat+0xed/0x3530 [ 72.061664] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 72.066832] ? path_lookupat+0xba0/0xba0 [ 72.070865] ? save_stack+0x43/0xd0 [ 72.074467] ? kasan_kmalloc+0xad/0xe0 [ 72.078324] ? kasan_slab_alloc+0x12/0x20 [ 72.082446] ? prepare_creds+0x78/0x360 [ 72.086392] ? prepare_exec_creds+0x11/0xf0 [ 72.090685] ? prepare_bprm_creds+0x67/0x110 [ 72.095067] ? do_execveat_common.isra.30+0x40a/0x23c0 [ 72.100313] ? SyS_execveat+0x4f/0x60 [ 72.104087] ? do_syscall_64+0x281/0x940 [ 72.108121] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 72.113464] ? percpu_ref_put_many+0x11a/0x220 [ 72.118022] ? lock_downgrade+0x980/0x980 [ 72.122147] ? lock_release+0xa40/0xa40 [ 72.126094] ? print_irqtrace_events+0x270/0x270 [ 72.130825] ? trace_hardirqs_off+0x10/0x10 [ 72.135118] ? __lock_is_held+0xb6/0x140 [ 72.139160] ? trace_hardirqs_off+0x10/0x10 [ 72.143458] do_filp_open+0x25b/0x3b0 [ 72.147237] ? may_open_dev+0xe0/0xe0 [ 72.151038] ? do_execveat_common.isra.30+0x8cc/0x23c0 [ 72.156293] ? lock_downgrade+0x980/0x980 [ 72.160421] do_open_execat+0x1b9/0x5c0 [ 72.164366] ? do_open_execat+0x1b9/0x5c0 [ 72.168489] ? unregister_binfmt+0x280/0x280 [ 72.172882] do_execveat_common.isra.30+0x90c/0x23c0 [ 72.177956] ? getname_flags+0xcb/0x580 [ 72.181902] ? SyS_execveat+0x38/0x60 [ 72.185693] ? prepare_bprm_creds+0x110/0x110 [ 72.190167] ? check_stack_object+0x68/0x140 [ 72.194552] ? __check_object_size+0x8b/0x530 [ 72.199028] ? usercopy_abort+0xd0/0xd0 [ 72.202981] ? do_raw_spin_trylock+0x190/0x190 [ 72.207540] ? check_same_owner+0x320/0x320 [ 72.211838] ? rcu_pm_notify+0xc0/0xc0 [ 72.215708] ? strncpy_from_user+0x323/0x430 [ 72.220095] ? mpi_resize+0x200/0x200 [ 72.223868] ? vfs_write+0x224/0x510 [ 72.227566] ? getname_flags+0x256/0x580 [ 72.231599] ? SyS_read+0x220/0x220 [ 72.235204] SyS_execveat+0x4f/0x60 [ 72.238807] ? SyS_execve+0x50/0x50 [ 72.242410] do_syscall_64+0x281/0x940 [ 72.246269] ? __do_page_fault+0xc90/0xc90 [ 72.250476] ? _raw_spin_unlock_irq+0x27/0x70 [ 72.254943] ? finish_task_switch+0x1c1/0x7e0 [ 72.259412] ? syscall_return_slowpath+0x550/0x550 [ 72.264317] ? syscall_return_slowpath+0x2ac/0x550 [ 72.269222] ? prepare_exit_to_usermode+0x350/0x350 [ 72.274213] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 72.279556] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 72.284382] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 72.289543] RIP: 0033:0x4548b9 [ 72.292705] RSP: 002b:00007f5371b77c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 72.300389] RAX: ffffffffffffffda RBX: 00007f5371b786d4 RCX: 00000000004548b9 [ 72.307631] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000000000014 [ 72.314875] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 72.322119] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000015 2018/03/29 16:07:32 executing program 4: getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040), &(0x7f00000001c0)=0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101940, 0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000200)=0x3, &(0x7f00000002c0)=0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140)="1dbfb9596c94f49780388b97450b3e2675dc81870047943b2ed2bf99a9b768c42bc055be87d12d9f30f4d7f33e1b136d6450c664a46e0ac5eaf8dd7b1d138d0d11"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000180), &(0x7f00000003c0)=""/128}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f00000001c0), &(0x7f00000000c0)=""/50}, 0x18) 2018/03/29 16:07:32 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[]}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:32 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:32 executing program 4: r0 = memfd_create(&(0x7f00000014c0)='keyringvboxnet0nodev:)\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000001500)={0x8, 0x9, 0x0, 0x6, 0x18c00, 0xae, 0x7, 0x4, 0x0}, &(0x7f0000001540)=0x20) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000001580)={r1, 0xfc7}, 0x8) keyctl$reject(0x13, 0x0, 0x0, 0x204, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = geteuid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0]) lchown(&(0x7f0000000080)='./file0\x00', r3, r4) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x78) seccomp(0x0, 0x0, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[{0x6e, 0xddb, 0x8, 0x4}, {0x8, 0x8a, 0x0, 0xffff}, {0x0, 0x10000, 0x9, 0x7}, {0x8, 0x0, 0x5, 0x4}]}) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000040)={0x4}, 0x4) 2018/03/29 16:07:32 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101005, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000000)=""/231) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f0000f65000)=[{&(0x7f000024ffb9)="80fd0f883b16", 0x6}], 0x1, 0x0) 2018/03/29 16:07:32 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c72bd4c05005fe54fe4b84755d366744ab407000000cc839c6d3d0b00000000000000c3c9a38407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0xd8) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:32 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 72.329360] R13: 0000000000000078 R14: 00000000006f2be0 R15: 0000000000000004 2018/03/29 16:07:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x501002, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:33 executing program 7 (fault-call:5 fault-nth:5): unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:33 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) fallocate(r0, 0x3, 0x3ff, 0x3) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x143440, 0x0) 2018/03/29 16:07:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:33 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[]}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f00000000c0)={0x2, 0x2, 0x10000, 0x3f, 0x8, 0x1}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = fcntl$getown(r0, 0x9) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000180)=r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) sendmsg$kcm(r1, &(0x7f0000000740)={&(0x7f0000000300)=@hci={0x1f, r4, 0x3}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000380)="4064b91f1562c77002921718cc00ac83ddcf70640764cca6c610b3e97cb7b669666a0eeeacffcbff53cbbf8ba02076619fe59bf5a450987f3f68cb785ca4ebe5d4f358b41fe93f5189d8f7c24dd33d1438cfbd6b2fda7a1e0d658e16acf483fe36107ed890d7433dc1", 0x69}, {&(0x7f0000000400)="d9b1e2ee045f630291de66a60b100070f02dbedbd36fe3adaa8c60de38116b7f6929cb8903acca172e18ba4a810968544245f1ff76db975fb4535374e879c63cedce3198f56322e7ec052b05ecb0da07513306f93efab9d495128645556a1490c923394312d921fd5f47969254f10daf5c6fe05f1921e83425e57c704c2db04fc277e6153754a44397", 0x89}, {&(0x7f00000004c0)="535317c2e4f548f811eebf25ad2ff2c19541c96f939406fc87db3d40cef4cbbdd2da58133924dcc46f0c6ce9b03dffdd29", 0x31}], 0x3, &(0x7f0000000540)=[{0xa0, 0x88, 0xaf, "25ed16a431ace0c6c9ca9b8b798ac61039f11cc51dc0da483b943d16a945a23deb394b37e7a3ed898488c6ff1702d24e12477fcac46bca3f086b1256b21ad19a15c918f65dd57aecb52837f11e31040a4d1acadfe08a41d58bdb0489deecf9242385ffa3596b5b8b642f480bb1a1ae2f456dd041dff0f51fa78da6a1dd1c36911d7e81dfab4602b1b6"}, {0xa0, 0x116, 0x1, "cf88cfceeaf1a7fa63d3f13d8a582b13193a0dc64f3795119b577a3c8e4e4bc39e035360d34d8eccd93efcb1bab3858c716ee64f3ce16f43155489fd2ce85448fe4213fa3dbe3aa61409d13f52528e87681411f984e764fc4a95bbef701adb5b97c8a4396a98d966c2a31c4e0b788d817cb545fd6e51849a9e317df30b490d90f7db6e9992ca5fc82d6f1a41"}, {0x90, 0x0, 0xb6bb, "6265b89fb2aa4dc9ffbbb98a310ba4cf8867d9b2dfee45db785546f7bed479c0c0097e9ae1c86bc21d611b0c2b89d6d7b927a95ae59a0948ab039d7a77c0d97d36a0180d63d6897c512ea85fa14481da6f0ddd09bf8cdea66e07a1132a8bdcb15cf5c76861bb43d1351fb493a53d27cd29185209fd4fa78c4079"}], 0x1d0, 0x4000}, 0x4000000) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(rfc4309(pcrypt(authencesn(crc32c-generic,salsa20-asm))))'}, 0x58) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x3ff, {0x8, 0xfffffffffffffffd, 0xffffffff, 0x5, 0x7, 0x1c00000000}, 0x1, 0x1ff}, 0xe) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r2}) 2018/03/29 16:07:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="ea3cf3035ac65e1b61"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) getsockname$packet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) connect$packet(r0, &(0x7f0000000180)={0x11, 0x2, r2, 0x1, 0x401, 0x6, @random="8338c9756c92"}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8000000001, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000080)=@can={{0x0, 0x40, 0x401, 0x3}, 0x4, 0x1, 0x0, 0x0, "f416353a1a6473a0"}, 0x10}, 0x1, 0x0, 0x0, 0x2000c000}, 0x801) 2018/03/29 16:07:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='security.selinux\x00') ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000002c0)={'yam0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) accept$packet(r0, &(0x7f0000000180), &(0x7f00000001c0)=0x14) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:33 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f0000000040)=0x0) socketpair(0xa, 0xa, 0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r2, 0x43f, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x4, r1, &(0x7f00000001c0)="245e9d2552dbd0b691a3b81feeda9e0c036f8fbff096140a751a873bbd49563076728d03610324977efa3d778d80c567b7dc911e800e841dce6b90b9b23b4a2e6bb085f918a2e42ae5a8b603609eca609a76aab8c922f33e31b88d691f20738c52589abe2c69dbb33126a15b83adbd1f258889504971ae0f0d25803ef783f60a90805819184c21d4dcca975b59d134656cd3dd3031cd1605d89250a204", 0x0, 0x1, 0x0, 0x1, r3}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x9, r3, &(0x7f00000002c0)="45565f12ed483efe58daa098d3bfbda48df2d57e38a83160075127293bf1acc233a9c02d6bc7da959598848350d2c70ed1bda7f761a8968b394ba883b550073629171ab49e53c7", 0x0, 0x0, 0x0, 0x1, r4}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x23a, r0, &(0x7f0000000380)="51ce25cb053d8e305761001baaced1df455d0ed3c60cf36f53062eeb2f2e567878417cd5863b76f54471e4727be0a4ae90f7ac37cd9b87e9303608cc84d8133efca664bee82265e43cca71", 0x0, 0x5, 0x0, 0x0, r4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x80, r0, &(0x7f0000000440)="6e15807a8e4a07dd25db356b907c996bcdd9a4f04304d926893bd78484a9aa5cbe5bef69ea8a8da5c21d4dc32517b2d426fe7b62317289c9e07c640af3b72a6f0b28702caa95236649e507f06244fcc00f7285cec593cc2f2b5ad7e15205a709b6471b2c7a5d2026f3011756faca2611fac32b9badb2514f5ae485cc9b8a75262d9d6e5708265a7dcaa2fcaed6447200aab7c6a3e089088b92f1b236c261ec1735", 0x0, 0x4a8, 0x0, 0x1, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0xc7e1, r1, &(0x7f0000000540)="9d9458a63ccc1aae635fbe1188e3133e50e8434bd810", 0x0, 0x1, 0x0, 0x1, r3}]) 2018/03/29 16:07:33 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) r4 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x6, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000280)={{0x653, 0xa7}, 'port0\x00', 0x1, 0x10, 0xffffffffffffffff, 0x4, 0x7, 0x9, 0x487, 0x0, 0x5, 0x22c0}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:33 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58), 0x0, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:33 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000080)={0x80, 0x3, 0x1, 0x5, 0xffffffff, 0x4d0a, 0x8001, 0x9, 0x5}) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000040)={0x9, 0xffffffff80000001, 0xc930, 0x87000, 0x4, 0x8}) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='task\x00') getdents(r2, &(0x7f0000000ea9)=""/407, 0x197) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000240), &(0x7f00000001c0)=0xffffffffffffffac) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000380)={'filter\x00', 0x7, 0x4, 0x4a0, 0x140, 0x278, 0x0, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @broadcast=0xffffffff, @multicast1=0xe0000001, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0xffffffffffffff23, 0x6}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @empty, @multicast2=0xe0000002, @rand_addr=0xfffffffffffffff9, 0x6, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4f0) fcntl$getflags(r0, 0x1) 2018/03/29 16:07:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58), 0x0, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:33 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208204) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb5fb7a2896acb95f6323d797b945673cfa285f1079cc08223aac7c080a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c6d26be4535bc444e5e5d68727242ace12b7ea2cda96dc502cda425abf2dc0d9ee0bd75fef42fbef4e0df154f64079cc3076784145aff019251feca5d144e457c2219c766436c5432880288f6fa8fa620d3c23d29c4ad1b849e7bb91e5658708471e07abfc1824d2fc55fc00c033004e97dfdae175b61a9a5bb"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000040)) 2018/03/29 16:07:33 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = socket(0x20000000000d, 0x2, 0x0) write(r0, &(0x7f0000000380)="240000002a007f0000000000adc90c00000000ff0100000000002000ffffffff65000000", 0x24) 2018/03/29 16:07:33 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) socketpair$inet(0x2, 0x5, 0x800, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000340)) r2 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) r3 = socket(0x11, 0x100000802, 0x0) r4 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000000180)=0xff) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000001480)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}}, &(0x7f0000001540)=0x90) ioctl$TUNSETLINK(r4, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000280)={{0x2, 0x4e20, @rand_addr=0x9}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x48, {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 'erspan0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000321000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000a66ff8)=0x215, 0x435, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x200000, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x1e9) getsockopt$inet_tcp_buf(r3, 0x6, 0x8000000000000037, &(0x7f00000001c0)=""/25, &(0x7f0000000200)=0x19) sendto$inet6(r0, &(0x7f0000000380)="15", 0xfffffffffffffd52, 0x2000000000000010, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x5}, 0x1c) geteuid() connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000040)=@sco, 0x80, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1}, 0x0) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000000680), 0x3ba, &(0x7f0000000200)=ANY=[@ANYBLOB="1f0000000000000029000000010000004dbc87115e9b517d492f6c42715204bc0500000000000000dfe11530429c9e97168bb5ab4b06e06b190f8f7314ddef33cb5cd04a97f0cca9f485f3b2caa2e22c9d39e7be4e86c9dd5cd6887e72539817fb0cc82000abc4e7a827d162a0b6d8077fdf472de893eb422878d06c1513047df23ec898958d3c6a33c09895b04397b99ac9737f073d062ac7e3fe0bbd787ae67e75d308fcdff0dfd135cabe3cb1dfa28a3b82acce9e4acc9192c9f1f414e77bffee6d8bfba06761e954da29a7f40122433e98590cefaa52cc5cb2053c71760a2ca643541fd902e8750a3720ead2e4cae90000"], 0x10}}], 0x2, 0x8000) 2018/03/29 16:07:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000140)=""/221) fallocate(r1, 0x11, 0x0, 0x4000b) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000100)={0x0, 0x4, 0xfff}) 2018/03/29 16:07:33 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58), 0x0, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:33 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) write$cgroup_type(r2, &(0x7f0000000040)='threaded\x00', 0x9) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000840)=ANY=[], &(0x7f00000008c0)) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={0x0, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:33 executing program 4: r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000505000)='/dev/sg#\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000440)=0x3) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x5}, &(0x7f00000000c0)=0x8) openat$cgroup_int(r1, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000240)={0x5, 0xfffffffffffffffd, 0x0, 'queue1\x00', 0x7f}) inotify_init1(0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000140)={0x8001, 0x0, 0x0, 0x81}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x8, 0xffffffffcbebbf1c, 0x5}]}, 0x10) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000300)={{0xffffffffffffffff, 0x3, 0x80000001, 0x0, 0xffffffff}, 0x6, 0x81}) sync() socket$packet(0x11, 0x0, 0x300) r2 = memfd_create(&(0x7f0000000100)=']\x00', 0x0) clone(0x0, &(0x7f0000000200)="17dd6280de3693223b6fdbc70650db5722605e7d4cfec7dee9e7ca3a83bd750a10fca3bdd2c2fde305012a95b619af30af684bba6e9e2031b1eec7e667e9c22c674d6eb942b78258369909dc14f2f5bd60202d6a38d497b47baf3e89fbca89a91e4706f3efdb55b9e9857fa2e05fdd62de157a7f60228f2c807e86ce264193d1206f5402c6f095c94a510e0c705386635a3f1a5970fd087434c0bf52f98bc0c951", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000300)="f74dda86") gettid() epoll_wait(r2, &(0x7f00000003c0)=[{}, {}, {}, {}, {}], 0x5, 0x0) getsockname$inet6(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) epoll_wait(r2, &(0x7f0000000340)=[{}], 0x1, 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f0000000500)={&(0x7f0000000640)=ANY=[@ANYBLOB="9c0000"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000000)=r3) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000580), &(0x7f00000005c0)=0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a3c000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000400)={'ipddp0\x00', 0xbb}) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000380)) 2018/03/29 16:07:33 executing program 2: unshare(0x80008282) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x8) fchmod(0xffffffffffffffff, 0x8) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) prctl$setendian(0x14, 0x1) io_setup(0x1, &(0x7f00000002c0)=0x0) io_getevents(r0, 0x0, 0x2, &(0x7f0000000300)=[{}, {}], &(0x7f0000000340)={0x0, 0x989680}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f00000000c0)=0x2, 0x4) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0x10080) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x8000) pause() ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x1}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = dup(r3) io_setup(0x4, &(0x7f0000000280)=0x0) io_destroy(r5) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000180)={0x5, 0x0, [{0x618, 0x0, 0x0, 0x0, @adapter={0x8001, 0xe838, 0x8, 0x974, 0x1}}, {0x7, 0x3, 0x0, 0x0, @sint={0x4, 0x1ff}}, {0x1, 0x1, 0x0, 0x0, @sint={0xff, 0x17e0}}, {0x8, 0x3, 0x0, 0x0, @irqchip={0xfffffffffffffff8, 0x3}}, {0x7, 0x1, 0x0, 0x0, @adapter={0x2, 0x4, 0xf7, 0x7, 0x1}}]}) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000004000)=0x1000, 0x4) ioctl$KDADDIO(r4, 0x4b34, 0x3) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000003ff0)={&(0x7f0000011000/0x3000)=nil, 0x400000}) write$rdma_cm(r4, &(0x7f0000000300)=ANY=[], 0x5) 2018/03/29 16:07:33 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r4, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x22) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x5b) 2018/03/29 16:07:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x5b) 2018/03/29 16:07:33 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x0) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x1a, &(0x7f0000000180)=0x1, 0x4) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe1db}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:33 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x2000000001, 0xffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac6344000000004713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c934c5f3612ef827cffd3a272339ccf234f4f8aaa73dc6d70800a12d1d4d4bcb1d82ca1c2eb17947d00000000000000000000"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x5}, &(0x7f0000002540)=0xd05d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:33 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r0, 0x2, 0x1) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x60000009}) epoll_wait(r1, &(0x7f0000000080)=[{}], 0x0, 0xcd7c) 2018/03/29 16:07:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x14) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) sendmsg$nl_route(r0, &(0x7f0000006b40)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000006b00)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000001500050000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="080008000000004056f884baf4703f3025f4e43076185a6fd14cb3d161d3c8748b2d54ea1fa46a9bf8dbdc27d8cc59ee515dccaffaf80a791344a3a506ed03087287131bf1d3b3fe1ad0e95e6bdd67efa86ffb132a7cb0fa1906dc7991e3a05bcd17cc6eeaed7add0ba264eedf45792de9065e69f6654300000000000000000000000000000000"], 0x34}, 0x1}, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 2018/03/29 16:07:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x5b) 2018/03/29 16:07:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0x50, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r2, 0x4) [ 72.984903] netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. 2018/03/29 16:07:33 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x0) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 2: unshare(0x40600) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) sendmmsg(r0, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@ll={0x11, 0xf7, r1, 0x1, 0xf5, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80, &(0x7f0000000280)=[{&(0x7f00000001c0)="4a265501a903f823980f3352c2b98bf1009d29d6219545b700ef5c03e84ab6bbc08b5dbb27fcc9934b711ab4ae59c7d584397952986eb725065b9d3c4dff54bd821846cec7c4ab47f4a759ed05d097cef5e5e3424cf3f8ce397263f2c315e63b3f4b6a38bbb7dc92a7ceae931d32d69ed58febf44a7382884e3b5638fb17c8e1a0a2a1f400dfa1f0b861c97b2b6def145f02e0fd4120d59365e950c59a1989cb42dc1e083b41afd5f96a1209", 0xac}], 0x1, &(0x7f00000002c0)=[{0x30, 0x104, 0x40, "930ebb98ec717896e0cdb233a2f59d6a1db2f8c6cc660ea0c644df1f76ce5482"}, {0xf0, 0x11, 0x1, "68a5756532cddd7f34f2ae285a20bd259add0dc800f069a97ebff40281da4bce5f02452d74540be87373ce8dbfb5ab55e3cd7b8f826ef7a00c1242a18bc1bcbfdadab5c3208139adbdfb4eb5dc4884b27f71a2a2fcb701d76dba1b10431bb0ade06e53bab2f6be60678de6a0cbb07087137382795c10c37fc732f0ed45a20519d0b62616ddb21176e0edddc3b63a2d0a590fa96bb09db577d16e0e4fb6803edca46b35764d9915d4bc02d8a3fc4bcfc82d9a859a70e98b94deb6ffbb12ecb55576c3539eed54a434f817260a59ccce98173484aa332692e335"}, {0x80, 0x1ff, 0x0, "f0545a06670ae3e66cc1a6cf93c76ca8d82eb7fb6d43dae148904f5389f4aafe57bc74cd5be0051fe2425cabdf731628f8c85530bc777ea2f57e7b60c81b399412c829a7d9a75c6adbede38f6791a73b73c2f33c2ed7b7c64d8c22e155f7df9a0cb4730274b813f6a295ce4fba"}], 0x1a0, 0x4000000}, 0x9}, {{&(0x7f0000000480)=@ipx={0x4, 0x3ff, 0xffffffff80000001, "85b84d15d7c6", 0x6}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000500)="f6d189ec7cdf46402ef0f14c6ccddea16e7ac838937e77c58ac6800b72fffb0f", 0x20}, {&(0x7f0000001a80)="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", 0x1052}, {&(0x7f0000001540)="df88233e16eb6fe7ffce5e3e2d71a7da21ca20fb16b7f8df92b3016255641efd2529df8c5028096f485379aedd3f144e2effc9a2cf327cf6e66feaf20c0cbf99fb2c3fd9d0f738d1b44bc460a9d35a803783f1e0a1d78f9f44a4", 0xfffffffffffffd80}, {&(0x7f00000015c0)="31c472e5609adc06f936b64a59a5b63279a21d7ac99d2359d539fb17ad96d2975ca18799d963b52d380bd025759e8accbb231b022599713d4df2a7aa358b62a43d9b2f1355f00714fcc3175d937ce04b21422c33a1ffe293a21319e09648e1e03e459ae0132ceef51a3cc6a288a5e78ec1416d59de47f481035059aef00bd57c0aa6cafceda8295381ce5686128b820fd4b8dcaa523ee3d937c4344f013ba7569ed7981d35d310a723bde8a885bd8df81c1a187ed34f889ef0f354296bf7157bf285ea5905fdf05982162fc7b3f3817c6f890d795562", 0xd6}, {&(0x7f00000016c0)="f4aeeeb29520e36f2bd52a067d8b267d98593c99afedd07061aedf0c799a2f0d2e9649ca137d778f103eed3c79251a1c70486effcd2a049c00123c625f6bf6d0fcb03175ec35c3659e21ecf8a5961c3624c3be328876416480d7795abf47553a92947e3d34164dbf518e1e63f5e35fb38ab5953f762de63a6b5f3981466477ef4c02d5e5ad88d2db9b042d5e8557c4a9e92d655e0b7cbbb962a1126325c111a23e3911", 0xa3}], 0x5, 0x0, 0x0, 0x48800}, 0x5}, {{&(0x7f0000001800)=@l2={0x1f, 0x5, {0x7ff, 0x6, 0x7, 0x8001, 0x80, 0x9}, 0x4, 0xffffffffffff8fc2}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001880)="5f8b798647ea58b05abf986defc5e3edd5e7a3419ffaa2049ba9bcb8727b997f0c2725a15f37a7d3c1293b75aacf889c881f431340e618c6b2970283e70d22ea7683c392d169c609bf959cd846f99e7e489872bca500b7190e07992130d3692800b2ce8d5a011f10628b3ff747f905207ac965e4a0a4b36f1bf76f39ec68a0b9a5a272684d713f707486ff202531ca663389f876f793ab0f55e6e7c3018b1954d9e48c0417ffdd44991b226b7126034c2e8a63ba4c7db87ef6fba9b099e2e54513f5dd13185be93bebc7dbef49ad0e5e863922fb51a8feb8a0f145c9f8", 0xdd}], 0x1, 0x0, 0x0, 0x4000}, 0x7}], 0x3, 0x0) 2018/03/29 16:07:33 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) open_by_handle_at(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r2 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) r3 = socket(0x11, 0x100000802, 0x0) r4 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x4e21, 0x6, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0xcd}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x19}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e21, 0xdbf, @dev={0xfe, 0x80, [], 0x13}, 0xfffffffffffffff8}, @in={0x2, 0x4e20}], 0x68) ioctl$TUNSETLINK(r4, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r1, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:33 executing program 7: unshare(0x10000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000040)="23d5b455a02535ce4ae38415f43e0c276870fd2b947f71cfaf0ee2bfc937d1ce3e830e2a8dbe22", &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:33 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 73.033092] netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. 2018/03/29 16:07:33 executing program 2: r0 = creat(&(0x7f00000006c0)='./file0\x00', 0x0) r1 = epoll_create1(0x80000) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000480)=""/212) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x7, 0x2040) r2 = epoll_create1(0x80000) ioctl$fiemap(r2, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYPTR64=&(0x7f00000007c0)=ANY=[@ANYRES16=r0, @ANYPTR64, @ANYBLOB="9298aa347617135225ff0d15ad6e04d89dc3c79ab1177f35fc86a8a9a7a4f5", @ANYRES32, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYBLOB="44dd0f1d3bc83a4dc7ea40aeeeaf2beb111e0bf8f3a3470230dbf3344afde30f9966c49be2ecf6e8b7b59bacd50f76ceb9eca61eecd146a539699272e3cafc514ce90fb60c4fbc7b947ab10188863580e8887b0103334af9182104e928042a3c3fa40411f36721587838644dc8586e6ab1238d18dfd45da118cd8a364293efd444fb", @ANYRES64=r1]]]) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r3, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r4, 0x0, &(0x7f0000000100)) shmdt(0x0) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r5 = epoll_create1(0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x12}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) r6 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r7 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r7, &(0x7f00000005c0)='./file1\x00', 0x0) sendfile(0xffffffffffffffff, r8, &(0x7f00006dbff8), 0x0) r9 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r6, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r9) dup3(r5, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) 2018/03/29 16:07:33 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x81, 0x11) r1 = dup2(r0, r0) r2 = mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x81010, r1, 0x30) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f00000001c0)={r2}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000100)={@nfc_llcp={0x27, 0x1, 0x1, 0x0, 0x100, 0x4, "cc27d120d90805ddbedb5e69a2f1333df078b4637714b75e40768d8575d9426027f860938a7e58dc23e8412c4b397d905563cb4c5acc45564e415d36a10664", 0x39}, {&(0x7f0000000040)=""/77, 0x4d}, &(0x7f00000000c0), 0x2}, 0xa0) getsockopt(r0, 0x2000000000010d, 0xc, &(0x7f0000999000)=""/4, &(0x7f0000000000)=0x4) ioctl$TIOCSCTTY(r1, 0x540e, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xffff}}, [0x3, 0x6d, 0x0, 0x34a, 0x8000, 0x4, 0x100000001, 0x4, 0x3ff, 0x8, 0x200, 0xfffffffffffffffa, 0x3, 0x7, 0x100000000]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000380)={r3, 0x16, 0x20}, 0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000003c0)={r3, 0x1}, &(0x7f0000000400)=0x8) socket$inet_tcp(0x2, 0x1, 0x0) 2018/03/29 16:07:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x0) 2018/03/29 16:07:33 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000600)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000580)='self\x00'], &(0x7f0000000400), 0x0) ptrace$peek(0x10000000000003, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) prlimit64(r1, 0x0, &(0x7f0000000480)={0x5e, 0x7}, &(0x7f0000000540)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000640)=ANY=[@ANYBLOB="02010000040001048904ff0701040700ac0f27bd788f9f479caf1e12d16d4feed3aa0f7dc8f7e8b8daa1c253d30621b4dd3fe9c5f569f6b8f7a4258444a9a101e208b24bd5"], &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r3}) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000300)) 2018/03/29 16:07:33 executing program 1: ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x7fff}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0x0, 0x4000b) restart_syscall() 2018/03/29 16:07:33 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x0) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000180)="15", 0xffffffffffffff72, 0x200488d6, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x7}, 0xfffffffffffffe2f) 2018/03/29 16:07:33 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r2, 0x0) syz_open_pts(r2, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 4: sync() socket$packet(0x11, 0x0, 0x300) r0 = memfd_create(&(0x7f0000000100)=']\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r2, &(0x7f0000000100)=ANY=[], 0x1023c) fadvise64(r1, 0x0, 0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x0) r3 = inotify_init1(0x0) r4 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r5 = dup2(r3, r4) clone(0x0, &(0x7f0000000200)="17dd6280de3693223b6fdbc70650db5722605e7d4cfec7dee9e7ca3a83bd750a10fca3bdd2c2fde305012a95b619af30af684bba6e9e2031b1eec7e667e9c22c674d6eb942b78258369909dc14f2f5bd60202d6a38d497b47baf3e89fbca89a91e4706f3efdb55b9e9857fa2e05fdd62de157a7f60228f2c80", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000300)="f74dda") epoll_wait(r0, &(0x7f00000003c0)=[{}, {}, {}, {}, {}], 0x9ef4b7ca31e6aff, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f0000000500)={&(0x7f0000000640)=ANY=[@ANYBLOB="9c000000"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x0) getpeername$unix(r5, &(0x7f0000000340), &(0x7f00000002c0)=0x6e) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000000)) getresgid(&(0x7f0000000280), &(0x7f0000000440)=0x0, &(0x7f0000000480)) getresgid(&(0x7f00000004c0), &(0x7f0000000680), &(0x7f00000006c0)=0x0) setregid(r6, r7) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000580), &(0x7f00000005c0)=0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a3c000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000400)={'ipddp0\x00'}) 2018/03/29 16:07:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000005, 0x8, 0xa, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x8000000000004, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x8000004, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000100)) fallocate(r1, 0x1, 0x0, 0x9) 2018/03/29 16:07:33 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(0xffffffffffffffff, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x0) 2018/03/29 16:07:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000100), &(0x7f0000000000)=0x4) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e22, 0x3ff, @loopback={0x0, 0x1}, 0xc19}, {0xa, 0x4e24, 0x1, @ipv4={[], [0xff, 0xff], @rand_addr=0x4}, 0x7fffffff}, 0x7, [0x0, 0x0, 0x100000001, 0x9, 0x4, 0x6, 0x80]}, 0x5c) 2018/03/29 16:07:33 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000180)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)=""/70, 0x46}, {&(0x7f0000000300)=""/184, 0xb8}], 0x2, &(0x7f00000003c0)=""/41, 0x29, 0x2}, 0x8c3a90959e7f9ef2) setsockopt$inet_tcp_buf(r2, 0x6, 0x1e, &(0x7f0000000440)="42d60b3ba38b78ca787046f52170779cb61e1aebebe5272d5f956619833839d4f27496d9bc80601d5f539b0664c52bfce04a455326af2b5f19211098dab3b42606ab63b8006bdddf", 0x48) r3 = socket(0x11, 0x100000802, 0x0) r4 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:33 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x0) 2018/03/29 16:07:33 executing program 2: prctl$getreaper(0x29, &(0x7f0000064ff8)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000240)=0x7) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000080)={'bond0\x00', @ifru_ivalue}) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000000)=0x1) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) iopl(0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)="3cc60f5700959382a5b7d0c3a23a45b2759270d7f8aeecbb273c8051ef2a06f9f4301bbc2c25444c900610e186e7fc05ed3ac32ded6da7893e4f8eef229c31d79c72facbf092432a243b9ecbe3fc59ec6d41d2419e48ee6d0cdd85a993c60547741646ba3ff384b4d36049cbfa53", 0x6e}], 0x1) socket$nl_route(0x10, 0x3, 0x0) 2018/03/29 16:07:33 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r2, 0x0) syz_open_pts(r2, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(0xffffffffffffffff, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000140)={0x0, 0x0, 0x9ccd}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000180)={r1, r2}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:33 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000500)={0xf0001, 0x0, [0x2, 0x30f, 0x7, 0x4, 0x7fffffff, 0x6, 0x7fff, 0x2]}) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:34 executing program 7: unshare(0x20020400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r0 = getpid() unshare(0x40a4000) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r0, &(0x7f00000004c0)) r2 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c6163423f9d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e9b431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000002500)={r3, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={0xffffffffffffffff, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:34 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f00000002c0)=0xde84, 0x4) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000180)=0x4) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f00000001c0)={0x0}) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x80, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000340)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000280)={r4, r6}) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000140)) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000000c0)='ip6gre0\x00') r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) socket$inet6(0xa, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000002c0)={0x0, 0x6}, 0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x10000, 0x200000) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0x3f) getsockopt$netrom_NETROM_T4(r5, 0x103, 0x6, &(0x7f0000000040)=0x7c, &(0x7f0000000080)=0x4) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) setsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000200)=0x9bb, 0x2) ioctl$BINDER_THREAD_EXIT(r5, 0x40046208, 0x0) getsockopt$inet_int(r5, 0x0, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) sendto$inet6(r3, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0x6, 0x7, 0x200, 0x2, 0x2, 0x4, 0x8, 0x6, 0x2}, 0xb) epoll_wait(r5, &(0x7f0000000100)=[{}], 0x1, 0xfffffffffffffffe) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f00000000c0)='syzkaller1\x00') close(r4) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x2, 0xc00) 2018/03/29 16:07:34 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r2, 0x0) syz_open_pts(r2, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:34 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(0xffffffffffffffff, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000d4fd4)={0x5, 0x1, 0x4, 0x9}, 0x2c) exit_group(0x3) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000500)=""/235, 0xeb}], 0x1) setrlimit(0x5, &(0x7f0000000000)={0x200, 0x3}) 2018/03/29 16:07:34 executing program 3 (fault-call:1 fault-nth:0): r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:34 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001140)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@broadcast}}, &(0x7f0000001240)=0xe8) sendto$packet(r0, &(0x7f0000000100)="54119e55e312573b8d7c83f3efba829c364ec99f39edfaa641914c67017753106c7141855c4e0a13109b440c27849a202077c26dbb47da9b54c76efb4c39320ed0b35cd139f4609412ef0f45a7f1e4debf3e754727e40dc95c2122893fec1481f326082da5bcc15e51761ae72446a70413d16bddd7baf37614811e884f2a86b41d3de780aa589e0a7bb261a8c2337c93465a9b12feb6195c65d3d3e81d087f62543f6a592bad8767f9018355969b3fffe2ceff5fa341df6396f8056bf5b86f9d3a34fdba1926ada550bb7d7b2c897ca0a9f1d65b5d458b9b8913d55a38926780bd66024ca3f77f75415d92a2fddc3308b246f9f3567e4a51f2e1ca7db2ee8f169bfb883ecb5b64bc5f9a33378f174589f9f8bdc4291dac2e16ef96053d1becc6b0485c278ae7665f4d5723ac5074cc4f7116752e9d913d65d8f49f1ed9fc5ca1cac19f768d62f96bd4da40a177c9c45ae715cac2416fb911ee80752c9d499ef7a3f25f488ed762bb52c4b8ecbe3a3df1c3a54206339b21090d6f46789940e0d0cbf5ed1d4ea89c490aec38d030738930c0e0839afc23fc780fdcf13a929a60c7dd478be80c8b6e383dcd69955df65601005999b466a146a139507c3ae2b342b5a9cc9b14c7052e203f084d0779070a79c7fac08bed0ec4fa936738838f771ee0817bffbc52c2d17a1519d701badf60eb769f3bf63a0f1917836691a7a546accefc2110172571b5e0b7ec9313116b68756119b65014b6eb36e4f06cd46e85312e46d8647383989976c3fce6472da71bb2f1b5cc478463f882ac7ee2d5a2197e07a79db3fa1df713d76064d2136bb67cd8de10aec9a67bdf07df3fbb856e05b3196b866baed498ab478d717364e71fe5d4466d919836897ea34c9f2bb963124ba963052b9e543eae31a4527c6dfc346101478d62a9642944f11179e7850a62825ae31cb1bc8f5cb80f671f22992b77782005538fb2cc1a54cb595f56a98171784a2808863f71270098175338a0808ab7558615a973cfba7c42a25e909c31ffbb28b6af7a6ae48b183fadf40ffbb70b0b643a1d8efe726c1e364ee901f40a3a41b52ae0f966a4c277131806bc2743e4468e9dfc80b35804d54cd9bd5889cb8108a3a95ed3d076c25b3bf1616b995eeb26db201d33c1b90e34238a99561fd99527d818f402703e03d93adf3e21e0b2d521314ea0900a78674806b82be28402facd17d3664e7a240a373fa112764a9cb48eac11294b94cb81c7c2372477b080d3e6961ca3941c7f9ce9cbfb6f4c7c2e3062bcbfd933c83092a486264370556a59d52cc2e603ef0c5e9419cb521b5f4fcfbc6a6faedff32c496ea68fdc4bc0e2c96f1c12659b1d8a2fd5a78f114c15e3bf633bef6a0eb9da92310d085dcbd2e1615b824b7333f81b6b04872edb2fc010bb307c08394a768ee003281c9f2ea29518d2e8acc5059a89e1a45b03b87f5feb603b420ec4955f07eb63b06494419fda869af05b381147b98725155426c4d190d5fbd09d6aeac0de3abdeea22ae4fa107ccba8561fda86848a89493c629b11fe3a809e7754ea3c80581a5ca171e6c7275ea41d525fb8b67c2e4800f24c3ef4ef6b6f2e3189b6633010411b2f0ee7e5d0cee3d585759cce2d65f78bbe1d6ba5589c86d74be9ea187f781f954ade45ee95ac38095a73d350c0436a04ebf857dc0ce731b33c71b0a96beb65745887d7896402e827f0da5cb48bd790fb18024133dfc89eb589a4fdd2a708d32147bbcaaf282f69c6401a0863f889c4d56084cbc8064263a310ad1d9821605d15001660392393151499baf6d9d346f06a473f385a190e38d83c3b78d2b4deadfdbb5a6101d163ab644a9503068708837b049c35c12992dc200605abe00236c9c773e5c3f6d14cfeb27f18d5ce4cf77a6ae3b1259c061be105c5e41e4cf2a3c1d7333e56a54b40efab7e70ba8ffff76c32635d982aac6ded421ad21310ba517a21bd4bd50976f80e198c05592d268b4b337c9ba745d0f7a903f2b93756dd61888224143d453a7f749fcb4e59291b58b2fed46cbef7c4b6de86aaeb7e4cb8084a232fce7c5ad6d9ff041a8aebd4b4a22b0786cfd2733df3aff9513b6f28355399c7208fb3c207c65ebb581dc07d6e90d3ce919337f9e08aec28a073e339f69c10ea18d1da3621dc6e258a139d29f6b67929671b76af08dffd85c278ad222241ed7f4793ff1b24882a4b3ed85902018a863c0e086f45c0349e9ace594ede99b8168cd9d06e16238515279439fdc74c06bef8a2a3a6d4b201c806ecc98e63af4f2097091253bbb4d9048dcbcb7fa82e97ffc590b29d42068682fe7014cfc27a62a8d0c7a4fc73b0465e487b2b19cc97e066cf48821c66df71c9ac8477c63868e37aee5d6196b8c29ba00023cc3fbbe166abc4e4c0263b7fbb1eecf3b68bd98236b55470bb33e55569d430e562a1fa7b00093c6f6ec26cc54607308ed0ee1be4f5be5b156eb5a34220c8346fed0a9d8d2dde57e58b340b5e8d9daaa5433540f68d251eacd681cca61894479c73c4a37c60a0fce26fade61d5290aa973abd08155c2ad1b03ea5dab2f007ed601f2c39fab23c058289c6dfe3c33eb3ef3baa000ad4abcdf7d9b8987529fbdfb5d7bd46685e8d7610a4987558862825d5b1d21f27a91bbe0f02ddc967c71561c0e2a361aaa0ba68d6426c6dc9ecb140c9439d3486dc94bb1ff2b36ea5b1ebcd93741b56cafedead6cfc6626058c66644d270b1b0361a8dab50c79eeb2dd2349c459451230e24d5ea083fe9cd4a3a166e54119325fa23ede033b66717c6f679c5cad458ad1ee6818b108e6e05343abee02f8725c4cf622c68745783865d4609435e8fd14a730283bf6bdb4859bec24bbeda644e7fe15af036c22d06f8bd32c69f8fe6c5199a98cfa8a6bcd4583849f3e321ac07cacc683d0ca5fc984c01c57aa35820f72ab4064b1a183b2e3ce61ea5829d047618c937a5d95354bcda5417e96d0b0b91990dea33c602fd2982261529b539810b3e37848a547ebdbb951c7acb23972dac8d6a1d283da85b2e5a8644cd8da6d04c6a3972002fbd55d91f5f438ef1922469ebe0d18a3c38f3773a3444cb927e252b40fe08ab77ddb1389ac1ab4fa9e4bee5822c15a4a7d5ce02bef7ae40f1353bdf56250795770f43eb275d8316c3164e948c95e67ce90a17d6df8ff6dd7b12c70c0ed79be30bdae7b9726b18b261a1bc50a3db2c66b48a4ab57a92e80e40bfc2065f7221f869c8d7577213bec47872d62254da9da94c3925e502aa9bf1f1f84d8ee874ffdfdb5be5123ae57b485a0d4153b7db503f33e8ccc8fcbc84de57b239df467699b7a205626f50497965946346dd58e6beb5fe8ca41aa5b43ec24da06f1afa7b6fd5013e1fc79b0b6a8ee0f173c8d1483752b15f5d2f90ce27143edf77bef25007383c2806064d6b052acf706a6ff79e09da28bc2b4415433a7272bc32251736ada107d7b27ad9c9e230191e429bb129c579b5c15506c10d44089ab716b16013e80694d5a2547f205dca4f2b6b567951cb8509add61089f2719fab0ce9970245e1987c04310231fe3cd014bcc833abecb262b2d24d481248d16d94d2537c96ce58c7b77c2925d35cd77453d510e50484580bf099a2a491ac2a1d288a160c1c88b87ded02a04dac092461ccd650faaddf068ae059b9ea4665a45b67d13316131a07c8b38b6c531632b5d83ce7838452490a49237d4dcc1e1285284008a1b6beb3e6f5881b939cc7d87ace52246578b5834b088bbe0277ffd4ff5db09cf93e95498533f8bdf799215638ca7c5fc69272f89b2140675632ec6c0087c7c3e683392f33d33d8d7905a83d3ca78d8e5dcb33016a73a4050134a0eee3a769aa2980c345b429e8737cea233bc8779fc863941b8d4c15bee0040ceac3fddb612f77c58ffb51eb425f86e57fdd717321cf66d577d3d02dc16f8b6b3686b9df4e39e80921b4982a40640ad809bd887b5253c7e598ac62f0ad757ed82d819dd8b99fb4770a1c29df0b4484da0224b2fd33772e9291f305a177f4e97fcda2e69f7483d25fc249b20255c8132c556f1805fd2431d6e14f70bc530e30e6f60e40f687fefde306744174120ad4cfdfcce6fdab263b06815c5d233ebe00a64763ca6cc69fb35deda553165460c03d6d7b2d595b01f0b119f578b92cc576e455b634907cb63f0d190cb03d26a2d6a68c55d1a4eb0e914f69f7e5326fd1981eb9d6ff7a47eca9484692d67ba1c3cc9c401b7dd498ed72fac8fa98757935930db84a5ff747078755f422b5884db4e64177effebd4bdb9f6f6389d58aa77da39c38aa5ff43f63f48e1c1574d7f573ea653528b6d2fd80c59932e72e4deb956acbe55db613326905380980b2f7d65fd9fdf88b4becf414e62dc8d591237cd1551ecc83c46dfa1d0e20e8839b71b5b8f71b6e0a72fb5c3cc78e3c74bc64d49310256526ccbce850a0d8a53a0738287c340443cd82a4dba8e3f2775e70421dc4af766c09ea0f87b122478f49da3a25defbacaf6bc58733278a612ce42043701e5b169301c6852a9e1803db11be3c3489289d270b8e6178003a81562355d3ba746ee4b9118e21ad8cb55ff340fd6d5df37e6ff724a541aebd555edb81ab5229a44bcc614f693e71922c08344e3e912360dec463e114cc571da9fa4e9f43f5ef93f7d2bd7877b681325ed89e976d030810734bc97551dd728d3f378f868928ecf6a89b4428c0207d171188dee70116c1588f9e07add555eb960d20b5459661e7da5cc4c1f656bd1c7bea76292ac0e382f3c6d4ec3df6f62d60f27604b8a15ce141142d9217e9b1353445f932d4aefcd8ef7b29e2fda21f00a0464985083ab4bda7445185e1a63c34801ffe1e913d7b86929eb1ab2ef71d86a653c44a84eb523f1f4ec94f960b4a1b15775caaeee6860b833aa075bb07c3b96c7509435bde013a65701e9b6802166065f330f5979777ee8f344eb1900f2947d88346bc50742c2b5ea9b5c3b1917be1620b42f42ea7ffc2f9e1a9379e98c430725335fdbd075b66aa55248a98819172861ab2f70edc6aa8b64a74288f2d52c52271b8c073c9cce4a03f3d22c8ff99ca2bd575ca65f22afca982f8a6c20d690de011ea73775c8a5c546637d857a51c6d62fbf1436acde426de2bc4b4b0b3a288abdb4e0ffea5685126800f7f3c22365a21ef0e9b899096d0dba6595658ead741fadd78e051128a9243bb5077a900e47805e84fca3800111497a54cdcd1ceaa512abdd8c3afc4aa5ceba15b356f8cf13a84d74c47d606a10b262abcd3c2915786e293b3c16753cb192bb8afd73277f0245a351a435a93f68d6e79b3ec1e1cedbf44686a9f65d9a53c8e05a048abaf96ea6a201290869aaa0b170b59219948d4936bd338272462181e2e0084bb0e13c35258762e57bbf93be48f377c300909f991bd0770d65ce286df07aaf385b6b0daef8a826509bde117b053102661c80aae472f7aa10765c81bcf4865f4381ff07f0b29e84628b2088ffb2b28ca28ed23fc3a075d4a808760bd881ea0e94d2c7734d4d77469e56cf1bd88c4725974c109a4b399597e9514b27d9d8966ea72267967ee5373bc6fe177e3e311d1b30e5cfefc8a75269d956099f7fb615c6733338edb163ba0d7039483479e13b08d893c65ba523d0adbf4f932f7e22f43ccd4bd73c68bdcdbc68860542caa94459b9d795178907aa3ba228e1f41adc1c00f95825a416dcf42770bccd16047db3fa0cf4fb9264d4e3e7aa78bd8c9b959e05aef2ce363fa1ab88e271daa7dab58de764fb2d1dd2", 0x1000, 0x4000, &(0x7f0000001280)={0x11, 0x3, r1, 0x1, 0x7, 0x6}, 0x14) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f00000012c0)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x10008, 0x9, 0x8582, 0x100000000, 0x8, 0x2, 0x2}, {0x6, 0x3, 0x8391, 0x5, 0x9, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0xffffffffffffffff, 0x5, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x0, 0x4, 0x2, 0x4, 0x9, 0xffffffff, 0x4, 0x7f, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000000c0)={0x1, 0x2}, 0x2) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x11, 0x0, 0x4000b) ioctl$int_out(r2, 0x5462, &(0x7f0000000080)) [ 73.543598] FAULT_INJECTION: forcing a failure. [ 73.543598] name failslab, interval 1, probability 0, space 0, times 0 [ 73.555088] CPU: 1 PID: 9795 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #5 [ 73.562182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.571510] Call Trace: [ 73.574081] dump_stack+0x194/0x24d [ 73.577689] ? arch_local_irq_restore+0x53/0x53 [ 73.582336] ? __lock_acquire+0x664/0x3e00 [ 73.586559] should_fail+0x8c0/0xa40 [ 73.590255] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 73.595338] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 73.600509] ? trace_hardirqs_off+0x10/0x10 [ 73.604807] ? check_same_owner+0x320/0x320 [ 73.609127] ? find_held_lock+0x35/0x1d0 [ 73.613172] ? __fget+0x342/0x5b0 [ 73.616602] ? lock_downgrade+0x980/0x980 [ 73.620731] ? trace_hardirqs_off+0x10/0x10 [ 73.625032] ? trace_hardirqs_off+0x10/0x10 [ 73.629332] ? __lock_is_held+0xb6/0x140 [ 73.633376] should_failslab+0xec/0x120 [ 73.637329] kmem_cache_alloc_trace+0x4b/0x740 [ 73.641891] ? print_irqtrace_events+0x270/0x270 [ 73.646631] tipc_group_create+0x14b/0x980 [ 73.650847] ? tipc_group_size+0x50/0x50 [ 73.654897] ? mark_held_locks+0xaf/0x100 [ 73.659025] ? do_raw_spin_trylock+0x190/0x190 [ 73.663586] ? __local_bh_enable_ip+0x121/0x230 [ 73.668233] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 73.673227] ? lock_sock_nested+0x91/0x110 [ 73.677434] ? trace_hardirqs_on+0xd/0x10 [ 73.681556] ? __local_bh_enable_ip+0x121/0x230 [ 73.686209] tipc_setsockopt+0x28a/0xcf0 [ 73.690253] ? tipc_sk_leave+0x200/0x200 [ 73.694304] ? __fdget+0x18/0x20 [ 73.697649] ? security_socket_setsockopt+0x89/0xb0 [ 73.702647] SyS_setsockopt+0x189/0x360 [ 73.706602] ? SyS_recv+0x40/0x40 [ 73.710035] ? SyS_write+0x184/0x220 [ 73.713727] ? SyS_read+0x220/0x220 [ 73.717333] ? do_syscall_64+0xb7/0x940 [ 73.721283] ? SyS_recv+0x40/0x40 [ 73.724716] do_syscall_64+0x281/0x940 [ 73.728584] ? __do_page_fault+0xc90/0xc90 [ 73.732794] ? _raw_spin_unlock_irq+0x27/0x70 [ 73.737270] ? finish_task_switch+0x1c1/0x7e0 [ 73.741741] ? syscall_return_slowpath+0x550/0x550 [ 73.746649] ? syscall_return_slowpath+0x2ac/0x550 [ 73.751556] ? prepare_exit_to_usermode+0x350/0x350 [ 73.756548] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 73.761892] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 73.766718] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 73.771880] RIP: 0033:0x4548b9 [ 73.775043] RSP: 002b:00007f850ab27c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 73.782727] RAX: ffffffffffffffda RBX: 00007f850ab286d4 RCX: 00000000004548b9 2018/03/29 16:07:34 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) read(0xffffffffffffffff, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 73.789971] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000013 [ 73.797213] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 73.804455] R10: 0000000020540ff0 R11: 0000000000000246 R12: 0000000000000014 [ 73.811696] R13: 00000000000005ee R14: 00000000006faef0 R15: 0000000000000000 2018/03/29 16:07:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="00bcf0ab1b0cfd62d77278ba") fchdir(r0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f00000000c0)=0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='.'}, 0x10) recvfrom$inet6(r0, &(0x7f0000000140)=""/176, 0xb0, 0x40000041, &(0x7f0000000040)={0xa, 0x4e22, 0x6, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x3}, 0x1c) 2018/03/29 16:07:34 executing program 3 (fault-call:1 fault-nth:1): r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:34 executing program 7: unshare(0x8000000) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/sequencer2\x00', 0x10000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x10003, 0xfffffffffffffffe, 0x4, 0x0, r0}, 0x2c) pselect6(0x40, &(0x7f0000001e40)={0x81, 0x20, 0x8, 0x6, 0x4, 0x2, 0xffffffff7fffffff, 0x1}, &(0x7f0000001e80)={0x2, 0x7f, 0x9, 0x2, 0x8, 0x91d, 0x4, 0x4}, &(0x7f0000001ec0)={0x400, 0x0, 0xfffffffffffffffe, 0xa, 0x8, 0xfffffffffffffff5, 0x100000000, 0x2f9}, &(0x7f0000001f00)={0x77359400}, &(0x7f0000001f80)={&(0x7f0000001f40)={0x1}, 0x8}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) sendmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000040)="a60a884d29b6b2b4164114134128d13720dcabb4e3fb179cf29620f52b288807448c19234f", 0x25}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="5f962ef582e361923e5256fed612278e4c0dbb3f320a817e4ef68a5ed6c8746e8905f0fffdd63c6e3edd9dc00698b05030931fb85508640c4614a61fb5870aca375444b41441171a11f5c835630fbe982d4452fbd2d628c301c7aca0551e38cf9de648472414725b6089d264354eac420f6e2b0223891d7f", 0x78}, {&(0x7f0000002580)="20d32e81eb9509be3dc8a8746402c10afea46b16999eedf4e98df120ce281f583ba28ff8f729d16c60f55b2373fcf4fa5672949e347715f5d081d9f0e288fee38111d5fc4658e31dda3d9e5fac6a9727eafc3b50dbf84b03ab0a9c289f57ea1ecb6b6d5b084ae8a0ebbd349b24b0a251adaeb5c6c071d2de5341581bb39ed1b99dd53a34d6c80ee485e71c52370c5d8794019a9d54c279dcc9a5744f3d3b16a03e4e2e067e2060a3af143ad04e043e4a08d8e96e0770530f78dfb357f611e06241c1ab57f52e3f8ebfc6fea8f454986b9fd26c9b1251e5d9b92b271bc88e3892a42ed791aaec14f5e24459c7d19860b84139cb96650ddd23d4be288ea81742109654feed6ae5cf037a35f0f40e066ad40661eefc94ce33c513cb4a3f206a3fe0f983e1e8cf84ddab75bfe56c9644b5778f3829873243067049e97c98608da1f3f8e8cf0f2903f015cbb8f1b97f38fc4c33497a8a4cad36f0549d18622aff6c7bb7380703e26778101059d8c0820ea72559c6074c6601cc20b29f06bd7b3a01427c46edb3d8ee03eea0f67853d2bfc7088023ee658a7b05b02a42e79ec8cd5cd83c5d14915e84e67261880a43b895841f7fcd40d51e919f84781d57b79961fa15d13e6bb58330d7cdea12572ec71a2c4620958a4e603c2481bc3132d42214237f724bbbd91372e713ce3b0f88ae06e18f907a41ff20f6fad034144eda45208fea1618014004ee13ce22d29565fde6f4e0d09cedaf3d9a78efbbd03d5500541b11f4bce9f9c6cb237879270d615a325f07165c92a080fcc830a747950e30970c6117e5576257cf2a4eb76dfdeef4c11774572d377b5138721c17ef410e39ad861c1f61cb6520556b74b8fd117c64eb096a20224fa1a2d05c629e0279a6e9a267e3c8e9beff75386d2c160dc379b9703457b411e4212aeee4d36f7ae65bdcd0a24819561f34bd6e99dfeec9a193095ff547d478adf08aa987927dfdb1aa9ba2b3508bed29481f06318a41adb87b673bb2a7c386042c26550f2a0e432e0bcd99d4c91b5ac960176e20a968d88469e07f9cb8810de9109c8c4eb1b9438b4cc3c4a720debf81bf1f809aa9e56fe59cdf846b97c3ff8709b057fe8badd5298c76dd4936a17bf4e2dd7d2938b6ba7932aa99bfbae36157fb4baba5dda3a043d5f093c40435edee3d8c95f2ab74010f66a6904f4d9be27bbc6f35f2fe0de0fca60636d1adc8561ba161203bed5208e44f15a3818c7e0e5e5f34541a7e3f033d32e6a3cc02ee010b1e257f7cd121836e0feb9f19f61bf170f0427ca8b71592a523075b632d4084200d251b03b08b60346693d81dd59293e16ce2f45eee7d062ccc9276daac80dc7c905702ba98eb55be33b942c80d16923a8f4aeb27e429476b33b5697e2feeb039dd1b2944b020879600ca94a154ec0abf54dc1c1f4aec50774c373d58d816959f479483ffb03ac38743e248e427ed1e959f51be0413c73c267efdd9993cd62fb50a3a8725e89d0504f1a7a22369cb2bca551e02fee56ae88f9b46cd1832069f3a6b6d32bf7419b328f1dbd223557f76ec0e34866627c0c2db5587367b66659d227faa820315d1a345fa8dfb17a24ab505583cd910f7bd8f5de4a430b476496808242b58cc93a64c65986446abe25f80a18b1beeaf2419b6919ea6f70131dc7353c8c06ccb6025138099e51ecfba5b7700714697381aa0cd6f6d1319f53c375df901c14d6817ec8f8391b79ce1facfcf7d1e61b364599a64fca7d6202691f6d491b0c7b8183df1edc125a4e9c13341d2d264cb00fdb32b07e272d16dddbbab0c3f7dc275fc0e148de381ab2c842d51c38529f11b157caeeb6e22e6959970141667b4a6834946c07fb78ebab0815dc3da5cdb604ab2332bcc10d18a7b6c3fc4958ce2c43eac67beee526f1ae3869940efafd6f7bce478b8a500ecb682f2011400360c8fce304b96a55ebbdaf2cd3f66eca6d3d7a80eb1eafa2fbcd7d631b81e3e98e3d66612c6b136c1077d64eb98d7a06453cfd1367034e922552b294be0d04dbe2e210d9a2325281d382ff6459c13572fc3fdb36bd84022b987d0b6cb98107619619281858a22841c841195a6744a95bc2e55dccca81a29c16a35849fcffcdaeea39edd8585dc0974e746ef17428267c5d42c70702ed09610c880071702b761e0f77fceb08914606d764bee426f4f8c78217121637a15405a76f886d80509cd54dd2cacb301d26c1e2865afa2af024fa6b1a0cd67738e2bb36df839e06f0dfdb87705a4fad2bac2ccdb662ccf584a83e968ffe38998b7363a8aad73bc9c2fe037435af76d1e3c3fe8e2359baadf1fa9a087ca94e1f788bd245c94742fa36e1bf7e05bfc91acb6eeebd65efb40fce4e994b6e5d54b7caf40d208d49696f137110bd1868e454f245ddbfd284e7fca57bc5cf2b587345ae6017da46eaa5dab3936d7d94601c83c7c861c4682e759154e16ce553ba37943197f68c1b5c60befdc52b9e887227073f47fc126b1e066fe509e6609924e029e3c6ea71adf4720f3b5d6308641f8d095415130f6e650c2727ab7d3268fb7e8505683ce8190402a7acc498e3a6fd9394f0998d11212d981a7d587ecb59191054e66ce14f5498b40998494ff6e6ab90b58604f505757b96c2242df618378025726da9d359e4843e77b658901acdefbf19d269bb8e6b632a00d60b50a285f70741b09aa61ce78ce0bbff6865e460a14daa177404cdf0d15d1f37ecaf7572a0d30bd78c7c07652ca3b059171cb58f5913c0a6a02b0eceb5b30d7e1e7e8038e6a06fdf4244991801a4f94cb8dc9ecc0e6d3cbff44bc58973ce9c398df09af8255b2b237ab42f41db3a07754e6f9a5bb4d6a2a7ada86e625a05ee39040a589b9bd92a55c16d5ed50fcc1364c0ecd87162c7227c759a7d71124e3344be49a2d39acd111b7fbd800adb2e9d3e8931866a814420bd57308df1737b475108977e3173c815379ca030696b1a87e82c32a8b931716e157dab65be460cdc2014a682cdedae7dcef7117d15f6ebb238422d7e151288b6b864714808c8bb33707ddaa72ce427606de8012b06c8f37a9dbb49336d41371478828d3c67e1b7e0e0e9d38ff14728769cd2bae4418ed85def03642fdfb25e0ea7f45a226a2222385897bd9ca3c7e2af441a58c5d5fa7f75fb7182a43fbfb89423ddd077f2d2afa6f3d6c149480a1de5b8924a051ccc6e058df8fbf64ab140169a12282a1ef5eaf8561e89ddf7a07ca196b4ce35b7cbc9196f59c122c18fe0db6023814fd3bcfc718f3a800820e4b86582945fe16816ecf1d6a23bee02f01e94d97d4425ae806c737e9b7e9530921575b8a3d34bda5222791c8ca71fe0687af76d33bf0b4e7fcb0f81de8ccbcda95b55350fef595a30554829931d0a924af70292d1f67fe2221e036db574966993a79e2ef54c9a4c1b70580809517194c07927f9fb0922589ee370c31c76924c7da61d8159d1d1c52beb502a20d0ba2b820cae7b81e8305fd8410c7be52b9ba00534bba88b5e3eb6a8a9d880e8a27b8c62e1c5090f98b438f00b45715c14189b36f1793ed9eac7f4e38e9f1f59cb31fa85b43559cd503ae669db95f22d7e6ea72dbd17a306299d46c2b6341f62c419270b712341c1b38ceb7ad93737ddea0a0961efc02db4cca95188b6393a5bc94c069e117869de59d95526b3267fc73d24135e1b420f8d9c8600d887e1c1ee25ca5a1734cd1361124595d0406b7d26d532abb982c0b8da92841b1a832fc07ea6fe3e84cbd7dadf7d607ba873aa066335f0956f5c02724052014b00bf4c9c9f3bef27bdb454e55f734e0db762d1509f7792f55ce5b0b49a3b629d6316cb9d05b53fc3bdebcb8b2ccf8027d1f81b64c0b3aea7d9ffcb958d0f0e274b9a894ea96330be38cbfd2019c3670761dc1a466b9fcf6fa3c35fad1a2a9f8d3c7aa900ba8f8169d25b6a0bbc0652a9acc46f88e2d9bc8912fc410804a191c9cec7caa9565d4e11052c651c0d3893bf68fb1ecbdd0f77d119bac53d9a8799876af0d4b8ba8219b9c20613adfe2cbf7c012faa1ffba501562473da0aa3e36695c33c312f6bcd87e55374b56437a7ab8bebd0ddf05bbc1d6ac6b8db71d196da116ef9bfb54e49a6b29c94f2f43a2a6631079c026a5076d7e2f6fa5e7c2ab0d57758aa4a4c325138f0a3f4257fb6760081b7843dd80b247c714d236d08c89b4d9030307f5e07bf67fb604442e473a579e25872a89a29c182d92f1310cb7a8619b08d2a11ae81cb55e99edc829d9c0ce120354ef83eb33fdcc465c6eae27cb40f7287b9d413a7ed348fd8cbbd4aa64c732e60ad4db5875cdc0f0fefdcc3dd9ddb7e84fcee80699d053e85c177d2f034f17a0acb33bfc4f1fd5345c0c4e07a3bef4c59318bf77e588bdab2dec3c4c65ec09992b06220dcd32d40bb4b34fd88c61192faa03ef3db3daf970a59dda76aeec9d071592e6e9dda74a5a27b27bb8dc4fe7e322ff030c464d328ebfa0a9d356e8244ea96219d9f485318a26cb2a7b0e37beef740c66e23ac8d65f46f542cc5f4160c3a8f1a01896664971bf5f3a30c4c76e919a9461c0dc58e93b60a46de1b0e312de09bada6333a6b218e310d2d76f7c09465883317411800179506edf048daf1c224272084d48260b535914ed2ffad57f1df81db977a92678a88babc4a55bab1c6d5591a739b3ad291758980578618d9e6452c4a437ab72099eacb7b09836db5ad669061bf440834df3e416704d1fe6c3d149409dd12f5b0361f32e0eea3d14341187387e7973db82f9e128bddff65dbfd043bb12cb05e4cff9c2546e103eb6fce675a2921dd97b6c2835b61e2490ca888a83bf284bbebeb79c2079724f42174577940fbcd303c45ecd3a137a524cef5ed35bf4eec1fa8f2151ec60ab0c4605f8d1e9150c20334f2a1e9de7a08103c99d9487bae85df114bc81bc15a2b5ab7c862b9f79991d82b30554c918c1874f52f90279040ebefd9fcf7b671254747ed38c82077e2939e18faf701f37318a12e525a6c6e7362e61d7314b95b010548f03f0f761d69e6cbe713a4ade5c374e5a35ae20754a71232f33642e5c86df40cfffb3258edc66414fd804fbd0b96e58fad1e42c7884ee37a99e1c3abc0eef301c32e918c0cc2cd1cefca160cfa256d92b343cb0afc973fc4cbcd80eb5b6d222a72843caa41f138898c5d4cef68e9248edf59f4cb45ea82bee2c63c840b2e62174a76b343dbebc776b93f313a96f80160e36ddd98f5486a15cc16f8cb9775fdf3e55888ada7d01bcf4cf9bd6043c39376e6034a2d5d953bffb2cc0cfbb775e4e6da1d0b2266ea4c5043b6ee33337ce7f059360a92ba286e06bb541c4f572ec186f73a0a36592dd03432e2af647918e62ac3dc2018f6d616301b8eff666620391cc73a9cd9867ffcc94ab48f0abd0e1d51bfd948a8cc3967ac4a8ad9bee4c3ee8316c13b7da4fada5c9e14b473e2e5e4ebcd9460ca9c05078c15152546aafbdfc0816f4269f81d1365eb4f1764fa93eea059b50e1367a43d5f747a42d0b9347b18548a29142570226a975d330a6bb2e34b0468c968e4856befaa2648185a627c82448cc0952d052e8af3b2048deb0ff05073878b475db90ebd36ef4e742b75abd2a434865120ecefa7cdebb50b47756563cfe26cc45ed4907a0c4c85d2a734c77ee6b46aa4467f72c3b6755f586d99cee19f62b54724eb96284bbd88f5da68710964b0af5b8e7768aa4ca837bd76fc53807ce47fb985354d893657f1657f29ed467a40eac179c8e94b22bd68dde06e3075a6907308881c4", 0x1000}, {&(0x7f0000001580)="512c04054e868d51a229330426e0192dc9fd76b3b0d38d3a2b6e8cbce90eab45995db35a93a3dd22495c4d8bd2f9320771c2718b9b3acfe12dbdba0dd5af330e8f00872660fdcdedf592b1b7d4e602473192838943e1a2e6336818dcb47a325a0da330b786fbfe34636c1b72f589a696ff9d353af3ff229a0875458d4108fb87cc76dc57cee01b37f1513981a1ac5fe874cec489989186f166f3f82e850b1ab755ed71068799fe7e7fc8caeb5875e2cd7592bfecbdbb3a6d8db8fb09ed92e5599e2f95a76cfb1096842b69122ec625f677cf82ffddbc9546742499493f89d24c", 0xe0}, {&(0x7f0000001680)="3df2374e038e905822799a1049a72e3b835390290d359c47e3856a5c89c173fb91043c5450a92b1b2d9e2d47c92d4f34603cd3cd8b20b14b54d68a064bce6f8df2e89fc94301dbcfd31f9aed52d96f8fa444e9f6501a", 0x56}, {&(0x7f0000001700)="ebbbec35faeaf76728d38f2c06428afb55220da144df567fab58083519cb82801e744e4faaaaf4cc81cfc72c130ef9eb43688a5a4314a655e25e16d5b8d77a7015dbc36d4bf7e95308e4f8", 0x4b}, {&(0x7f0000000240)="398e2e14c75f78", 0x7}, {&(0x7f0000001780)="7942c58595b8e5b787d387b4c477a3a68da1da58d14916cf94f8364f31acb5908b85942c35bb4a440b1556134217708431f617661485df833a960bcb5cd642217ae70d45a77203490f39a044a31a9994eb5f113a5a9ae6d88ed937a8183a06b107650ab4498d8a01b55d9e0fc2a1b00d708c66f79f0817787b478b4a7c9797f01768826ba12a6e47d47f8e7c5890cb8406de9206c3e463d62aa7043c4d15ab1551ea6561aed8d01149d66727747280b8", 0xb0}], 0x9, &(0x7f0000004780)=ANY=[@ANYBLOB="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"], 0x11a8, 0x7b792ed6c0deb274}, 0x40) r2 = getpid() r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) kexec_load(0x0, 0x2, &(0x7f0000001b40)=[{&(0x7f0000001980)="dc709d935138ed57a5d83975905e072891d8f69ca51b0ac4594f04a6f8cd7bafd66328b947daf3d18779674a1af05d0a290c0be142a9f6c0e7325c7477c0c89f9a90c8d40464f18d899af9fb553717683e356a5be63c8c45aa89730798b1e1f61b7c829807f7fd5274556e3031f85d4266ee5dba6095ea7de7377e6342b3c1769b0c74a9ff61f65f0cfca784e0ef69f164c4c3a5c2fc313475f342", 0x9b, 0x7f, 0x5}, {&(0x7f0000001a40)="133b205fd4db05e9f2d7ca8cadd9c8fcd8b98a7a0742f2680ec873e7595d17b446ecd500aa1360964aaa32b67e7acdd91a4b6e464f2e165bb0407fbf8e4d20616ec6827e066cb76544ab4a2b70f0a7c8bbfed6ec93d0ade96082d839907dd303d110a3a42159b0661c43ae55458106a0dff9d8228c7e9ee4336c5ad292bf29b943ccbda7e5ed633266228d72495680644b6516afdf8cc63d7aae4793500bf538e6cf5edd0119414e8c3de371b372080ec0dc1d10522bfd10cca2c7276cd4823aad54004c68c78ab15c37790deb826df0a94e946b6cb32cf999e326c96b44055384353957", 0xe4, 0x9, 0xfffffffffffffff9}], 0x30000) execveat(r3, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) write$vnet(r3, &(0x7f0000001dc0)={0x1, {&(0x7f0000001c00)=""/152, 0x98, &(0x7f0000001cc0)=""/205, 0x1, 0x2}}, 0x68) ptrace$peek(0x1002, r2, &(0x7f00000004c0)) r4 = socket(0xc, 0x1, 0xfffffffffffffffb) setpgid(r2, r2) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac374400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f63230d6ec7d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a7979b4"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r3, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000002500)={r5, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r1, &(0x7f0000fce000)}, 0x10) get_mempolicy(&(0x7f0000001900), &(0x7f0000001940), 0xe4d7, &(0x7f0000ffc000/0x1000)=nil, 0x1) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000001bc0)=@assoc_value={r6, 0x6}, 0x8) 2018/03/29 16:07:34 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = syz_open_dev$sndmidi(&(0x7f0000000200)='/dev/snd/midiC#D#\x00', 0x9, 0x480) openat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r3 = socket(0x11, 0xa, 0xfffffffffffffff8) r4 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x400) ioctl$sock_netdev_private(r3, 0x89f9, &(0x7f0000000180)="3cdf49c656d153e90c36704768") ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000280)=""/219, &(0x7f00000001c0)=0xdb) ioctl$TUNSETLINK(r4, 0x400454cd, 0x303) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000005c0)={@in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xc}}}, 0x0, 0x1, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0xd8) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) [ 73.884154] FAULT_INJECTION: forcing a failure. [ 73.884154] name failslab, interval 1, probability 0, space 0, times 0 [ 73.895463] CPU: 0 PID: 9813 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #5 [ 73.902560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.911904] Call Trace: [ 73.914493] dump_stack+0x194/0x24d [ 73.918128] ? arch_local_irq_restore+0x53/0x53 [ 73.922798] ? __lock_acquire+0x664/0x3e00 [ 73.927047] should_fail+0x8c0/0xa40 [ 73.930766] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 73.935864] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 73.941043] ? is_bpf_text_address+0x7b/0x120 [ 73.945529] ? __lock_acquire+0x664/0x3e00 [ 73.949745] ? lock_release+0xa40/0xa40 [ 73.953700] ? __free_insn_slot+0x5c0/0x5c0 [ 73.958036] ? perf_trace_lock_acquire+0xe3/0x980 [ 73.962861] ? is_bpf_text_address+0xa4/0x120 [ 73.967345] ? perf_trace_lock+0x900/0x900 [ 73.971571] ? __save_stack_trace+0x7e/0xd0 [ 73.975877] ? trace_hardirqs_off+0x10/0x10 [ 73.980187] should_failslab+0xec/0x120 [ 73.984147] kmem_cache_alloc_trace+0x4b/0x740 [ 73.988705] ? save_stack+0xa3/0xd0 [ 73.992315] ? save_stack+0x43/0xd0 [ 73.995939] tipc_alloc_conn+0xc6/0x5a0 [ 73.999896] ? tipc_send_kern_top_evt+0x6e0/0x6e0 [ 74.004722] ? tipc_topsrv_kern_subscr+0x346/0x8a0 [ 74.009633] ? lock_downgrade+0x980/0x980 [ 74.013767] ? lock_release+0xa40/0xa40 [ 74.017731] ? __lock_is_held+0xb6/0x140 [ 74.021803] tipc_topsrv_kern_subscr+0x39d/0x8a0 [ 74.026550] ? tipc_receive_from_sock+0x7b0/0x7b0 [ 74.031374] ? memset+0x31/0x40 [ 74.034647] ? tipc_bcast_stop+0x350/0x350 [ 74.038884] tipc_group_create+0x6ed/0x980 [ 74.043115] ? tipc_group_size+0x50/0x50 [ 74.047177] ? mark_held_locks+0xaf/0x100 [ 74.051299] ? do_raw_spin_trylock+0x190/0x190 [ 74.055870] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 74.060866] ? lock_sock_nested+0x91/0x110 [ 74.065077] ? trace_hardirqs_on+0xd/0x10 [ 74.069201] ? __local_bh_enable_ip+0x121/0x230 [ 74.073863] tipc_setsockopt+0x28a/0xcf0 [ 74.077912] ? tipc_sk_leave+0x200/0x200 [ 74.081975] ? __fdget+0x18/0x20 [ 74.085323] ? security_socket_setsockopt+0x89/0xb0 [ 74.090325] SyS_setsockopt+0x189/0x360 [ 74.094287] ? SyS_recv+0x40/0x40 [ 74.097717] ? SyS_write+0x184/0x220 [ 74.101416] ? SyS_read+0x220/0x220 [ 74.105034] ? do_syscall_64+0xb7/0x940 [ 74.108996] ? SyS_recv+0x40/0x40 [ 74.112437] do_syscall_64+0x281/0x940 [ 74.116298] ? __do_page_fault+0xc90/0xc90 [ 74.120509] ? _raw_spin_unlock_irq+0x27/0x70 [ 74.124988] ? finish_task_switch+0x1c1/0x7e0 [ 74.129466] ? syscall_return_slowpath+0x550/0x550 [ 74.134379] ? syscall_return_slowpath+0x2ac/0x550 [ 74.139288] ? prepare_exit_to_usermode+0x350/0x350 [ 74.144286] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 74.149640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 74.154478] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 74.159647] RIP: 0033:0x4548b9 [ 74.162812] RSP: 002b:00007f850ab27c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 74.170500] RAX: ffffffffffffffda RBX: 00007f850ab286d4 RCX: 00000000004548b9 [ 74.177750] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000013 2018/03/29 16:07:34 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)="e5dc98e88ba6df2329f23d9531eacd1643cab7c2ba80626c0773e4bf92265105c30f3bb148a8640be2cd3efe406be89e39953f8a5b8b7b3063764e1a5241e2c4a922b1879e0f11fdeced7ff8d62e223015f1ba39f08433bca62e38571c55037f52371b33a7d30d7c757e39a89a331c783b91635acaba6843679778cb7920c6bf1fe51cc9fbc7c94104389c5a0a12be3c1012ec6288029555ec6e9bb99f2bec6ea397dee536d2d12b1f34b3a1699ac9010000004aa2dacfe9aa1304666b93c4c66ff611372a73eafa363bcb0f6f16910c") pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x811, 0x0, 0x4000b) 2018/03/29 16:07:34 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000), 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:34 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) r1 = semget$private(0x0, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) semtimedop(r1, &(0x7f0000000140), 0x0, &(0x7f0000000280)={r2, r3+10000000}) r4 = getpid() ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000002c0)={0x108, @time={0x77359400}, 0x0, {0x7, 0x100}, 0xe49, 0x2, 0x5bafcb8b}) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x69, 0x72297462, 0xfffffffffffffffd, 0x2, 0x0, 0x9, 0x20000, 0x5, 0x200, 0x0, 0x80000000, 0x7ff, 0x9, 0xffffffff, 0x9349, 0x1, 0x2, 0x52c5, 0x4, 0x2, 0x8, 0x2, 0x5, 0x8, 0x8, 0x2, 0x1366, 0xfffffffffffffff8, 0xff, 0xa6, 0x100000001, 0x8, 0x1315d0ad, 0x5d9, 0x10001, 0xc6cc, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x1, 0x5, 0x63, 0x7, 0x3, 0x401, 0x1b1}, r4, 0x2, r0, 0x9) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x2000, 0x4) fallocate(r5, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:34 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4100, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x1f, 0x3, 0x5}, &(0x7f00000001c0)=0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x28}, 0x1}, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x101441) setsockopt$inet6_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000080)="b43651ff8154c93892536ea0c3879afd3a54ab48ee1b9b01cdbfad0ee35fc5b989500929109ddfdf76695e4abcacba89e2ff5f7a7d30df39bc474c80c7cc9ed4", 0x40) recvfrom$llc(r3, &(0x7f0000000040)=""/29, 0x1d, 0x2, 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) [ 74.184998] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 74.192248] R10: 0000000020540ff0 R11: 0000000000000246 R12: 0000000000000014 [ 74.199494] R13: 00000000000005ee R14: 00000000006faef0 R15: 0000000000000001 2018/03/29 16:07:34 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) read(0xffffffffffffffff, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 74.258711] IPVS: length: 219 != 24 [ 74.285257] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 74.298343] netlink: 'syz-executor2': attribute type 3 has an invalid length. [ 74.318638] netlink: 'syz-executor2': attribute type 3 has an invalid length. [ 74.332913] IPVS: length: 219 != 24 2018/03/29 16:07:34 executing program 3 (fault-call:1 fault-nth:2): r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:34 executing program 2: r0 = perf_event_open(&(0x7f0000271000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000017000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd2(0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000358fe0)={r3}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000c68000)={r3, 0x0, 0x2000000003}) request_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='cgroup\'\x00', 0xfffffffffffffff9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000140)={0x8, 0x100, 0x4, 'queue0\x00', 0x1}) getpid() write(r2, &(0x7f0000000940)="37fec4c533426c1327e9b41bed9e11b3a416e91a71b7410eb301f2367eef32e41035e21ffcef3042c99b11be4793f1c472ad427ce508bb1c9d281492ef7df4dca259cb1f4c18938529aa647d5cb823b17189bb42fb7d7fb4a3b378899ab2a7e56a26cea36ff6d51cf0b6464ce80e421c458e74db9e233b212b263518f4d1a1803bb1ef4f7c7a110dab1b9ce917837262437da7095fe6ae5e3ab0ff5d8d3fd56d7fc5faa8da238cf2939bccb381d765657dd3bac1dcaa563f490963d8b3a32c8acfb1a56688bf6cae745922fee4bbbe4db878bb3a17d53c5b060495f2d9", 0xdd) connect$unix(r4, &(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e) r5 = getegid() sendmmsg$unix(r4, &(0x7f0000000c80)=[{&(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000700)=[{&(0x7f00000002c0)="9d9f0ec4b6d11b8b8bd7e75fd71513a26186e7cd80fda1c586f70b18a86a8dace6d431734d55b3aada35b630d12e289138f529830656e8a069f6eb4de6395738d2f6a6c7753f26a2fd0110370aad7975212a46f26c941fe3a219640582cf3d1d77bda2a5154f3a5ed2cb57e74b45f904b9d4eecb74a767599e83aa1d7716be9efe8dca1652455ff31a9f8391bd52c6d6d023737508", 0x95}, {&(0x7f0000000400)="08b4a7fffdc717386296474ace1d9d2391232c1bab68980c2562316e5f20971327a55e814a2cb170b3308333e022740fb612363f7860d304777a23b20d7cbdc46ba9225e44d714908d8717258ff5e6d230fd3f8137bbfdbc21e396c59761ca9244cd54be037a3356fa8951d05a055b61436bb35c202c80d8bdd1c62d5cbf21d013cc551dcec2cafa77b271df98af8a5add916f213853df881b4a7f8325418c0d9346ccd9e73eb455ca54ce254781dc216c9d4bf478544f3ebbbfe07f15256bcaaa40687b50153c42887a3018c6adbe1b27d4c3ad1b0cd927", 0xd8}, {&(0x7f00000005c0)="76db41944370c0cc0bafbc1f580ed1b5a0cffd03401bf6", 0x17}], 0x3, 0x0, 0x0, 0x14}, {&(0x7f0000000780)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000880)=[{&(0x7f0000000800)="b3e0", 0x2}], 0x1, &(0x7f0000000d40)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r1, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="000000f81700000000000000010000000100000044f77b3c265ef1a8c12233a400e71b3d9c5644ec297c2f61387a0fb4f4ec4f97d419086300313d1edb783b6c16e6f32f12910629bc5d7ecd26deb7b0a75d7e49435e95c53970e09ae4d6523c82185bc2303c689098fb52a725ff676fbaef9a848e2bf44b3a9482fe029063c26392cf446bc08ee0f22b3af1b8d25d319d870d8ca918aae2ff7a9496465676202aad814738945c8eeb7ad37ec66b2b986a90bf06d2777da6bf3d09cfda93b0c2", @ANYBLOB="00aff22ae4dcd0461346000002200000000000000001000000755e137a4b09b2a21a343dc9860200b55e465e8bea889a511128711fb9b074f44a2f9be6c569b986b81f0f63aa1866ba0000000000000005aeabab47aaca0fe158ca2439ae72647911c58a7ce9d7527b106859b5bbbadb7672b7351cde93eae1c52819d75d6cc0d5b126ae57b014bd0173a46237d4968fb0afb30ff75d71f69febb0c7111eb242cd610453fe83c20289bf31055851a5f22542ea97c146a9cc", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r1], 0x122}, {&(0x7f0000000a80)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000b00)="02515f99776d023d2a73aa610460a8efba1e3200a18eee358833f2fdaceb29f36af58c983a2f03aeb86e987f4bc988e7737c45317ca530173b61ac887b67f32b2c12c4e753d73a8888802c3d8c6d5ffadb698b3a683ad20a6b4eef68949f2c2d218db256d0437939b24f0e7f6aac9bff311d743200329f5267853aa8f82a98b634ad690debb1a936647c7be559cb38468dced9f3b7546eba5bae8a284977fb12077f22d2317249564b5651de041f972b7101ff31b6fe10c95d2a1b68eca26484ee23309c67159fca17115becddc3a6f07b190e7cbf1bd24b94871e5e137a817480", 0xe1}], 0x1, &(0x7f0000000c40), 0x0, 0x20000080}], 0x3, 0x4000010) keyctl$revoke(0x3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r4, r4, 0x6, 0x3}, 0x10) fstat(r2, &(0x7f00000008c0)) 2018/03/29 16:07:34 executing program 4: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00005c3ff0)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}]}, &(0x7f0000f91ffc)=0x10) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000d6dfdc)="2400000052001f0014f9f40700090400020007fc10000100ffffffff0800000000000000", 0x24) bpf$PROG_LOAD(0x5, &(0x7f00001a3000)={0x1, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@alu={0x1, 0x0, 0x1006, 0x0, 0x1, 0x24}], {0x95}}, &(0x7f000035fff6)="73597a6b618f6c65000d", 0x8, 0xfffffffffffffd31, &(0x7f0000f72000)=""/4096, 0x20000000}, 0x159) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfff, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000040)={0x7fff, 0x6, 0x9, 0x4, 0x20, 0x4}) 2018/03/29 16:07:34 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x1300, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000180)={'erspan0\x00', 0x5734}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) r4 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x400000c89, 0x20000) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r4, 0xc008551a, &(0x7f00000002c0)={0x1, 0x20, [0x3, 0x3, 0x2, 0x101, 0x9, 0x6, 0x6, 0x6]}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000001c0)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)=0x0) setpgid(r5, r6) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:34 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) read(0xffffffffffffffff, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:34 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000), 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:34 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x11, 0xfffffffffffffffd, 0x4000b) [ 74.393282] FAULT_INJECTION: forcing a failure. [ 74.393282] name failslab, interval 1, probability 0, space 0, times 0 [ 74.404787] CPU: 0 PID: 9854 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #5 [ 74.411880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.421215] Call Trace: [ 74.423784] dump_stack+0x194/0x24d [ 74.427395] ? arch_local_irq_restore+0x53/0x53 [ 74.432056] should_fail+0x8c0/0xa40 [ 74.435754] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 74.440850] ? print_irqtrace_events+0x270/0x270 [ 74.445596] ? lock_pin_lock+0x360/0x360 [ 74.449634] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 74.454802] ? print_irqtrace_events+0x270/0x270 [ 74.459567] should_failslab+0xec/0x120 [ 74.463519] kmem_cache_alloc+0x47/0x760 [ 74.467571] radix_tree_node_alloc.constprop.19+0x5e/0x2d0 [ 74.473179] radix_tree_extend+0x2bb/0x550 [ 74.477393] ? radix_tree_node_alloc.constprop.19+0x2d0/0x2d0 [ 74.483252] ? is_bpf_text_address+0x7b/0x120 [ 74.487725] ? __lock_acquire+0x664/0x3e00 [ 74.491935] ? lock_release+0xa40/0xa40 [ 74.495885] ? __free_insn_slot+0x5c0/0x5c0 [ 74.500186] idr_get_free+0xad1/0xfd0 [ 74.503980] ? radix_tree_clear_tags+0xb0/0xb0 [ 74.508539] ? print_irqtrace_events+0x270/0x270 [ 74.513281] ? __debug_object_init+0x235/0x1040 [ 74.517926] ? lock_downgrade+0x980/0x980 [ 74.522048] ? lock_downgrade+0x980/0x980 [ 74.526175] ? lock_release+0xa40/0xa40 [ 74.530129] ? mark_held_locks+0xaf/0x100 [ 74.534256] ? _raw_spin_unlock_irqrestore+0x31/0xc0 [ 74.539333] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 74.544324] ? trace_hardirqs_on+0xd/0x10 [ 74.548457] ? __debug_object_init+0x235/0x1040 [ 74.553104] ? print_irqtrace_events+0x270/0x270 [ 74.557846] idr_alloc_u32+0x1b2/0x390 [ 74.561714] ? __fprop_inc_percpu_max+0x2a0/0x2a0 [ 74.566534] ? lock_acquire+0x1d5/0x580 [ 74.570503] idr_alloc+0xf5/0x180 [ 74.573937] ? idr_alloc_u32+0x390/0x390 [ 74.577975] ? tipc_alloc_conn+0x392/0x5a0 [ 74.582193] tipc_alloc_conn+0x3a7/0x5a0 [ 74.586233] ? tipc_send_kern_top_evt+0x6e0/0x6e0 [ 74.591053] ? tipc_topsrv_kern_subscr+0x346/0x8a0 [ 74.595955] ? lock_downgrade+0x980/0x980 [ 74.600082] ? lock_release+0xa40/0xa40 [ 74.604506] ? __lock_is_held+0xb6/0x140 [ 74.608563] tipc_topsrv_kern_subscr+0x39d/0x8a0 [ 74.613301] ? tipc_receive_from_sock+0x7b0/0x7b0 [ 74.618120] ? memset+0x31/0x40 [ 74.621380] ? tipc_bcast_stop+0x350/0x350 [ 74.625602] tipc_group_create+0x6ed/0x980 [ 74.629823] ? tipc_group_size+0x50/0x50 [ 74.633870] ? mark_held_locks+0xaf/0x100 [ 74.637991] ? do_raw_spin_trylock+0x190/0x190 [ 74.642557] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 74.647546] ? lock_sock_nested+0x91/0x110 [ 74.651759] ? trace_hardirqs_on+0xd/0x10 [ 74.655881] ? __local_bh_enable_ip+0x121/0x230 [ 74.660533] tipc_setsockopt+0x28a/0xcf0 [ 74.664573] ? tipc_sk_leave+0x200/0x200 [ 74.668622] ? __fdget+0x18/0x20 [ 74.671963] ? security_socket_setsockopt+0x89/0xb0 [ 74.676960] SyS_setsockopt+0x189/0x360 [ 74.680916] ? SyS_recv+0x40/0x40 [ 74.684345] ? SyS_write+0x184/0x220 [ 74.688038] ? SyS_read+0x220/0x220 [ 74.691646] ? do_syscall_64+0xb7/0x940 [ 74.695597] ? SyS_recv+0x40/0x40 [ 74.699029] do_syscall_64+0x281/0x940 [ 74.702892] ? __do_page_fault+0xc90/0xc90 [ 74.707101] ? _raw_spin_unlock_irq+0x27/0x70 [ 74.711584] ? finish_task_switch+0x1c1/0x7e0 [ 74.716054] ? syscall_return_slowpath+0x550/0x550 [ 74.720959] ? syscall_return_slowpath+0x2ac/0x550 [ 74.725864] ? prepare_exit_to_usermode+0x350/0x350 [ 74.730857] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 74.736203] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/29 16:07:35 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) pread64(r0, &(0x7f0000000580)=""/166, 0xa6, 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x4e23, @broadcast=0xffffffff}}) getsockopt$inet_dccp_buf(r3, 0x21, 0x80, &(0x7f0000000500)=""/117, &(0x7f0000000240)=0x75) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) [ 74.741035] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 74.746199] RIP: 0033:0x4548b9 [ 74.749363] RSP: 002b:00007f850ab27c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 74.757045] RAX: ffffffffffffffda RBX: 00007f850ab286d4 RCX: 00000000004548b9 [ 74.764293] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000013 [ 74.771539] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 74.778782] R10: 0000000020540ff0 R11: 0000000000000246 R12: 0000000000000014 [ 74.786028] R13: 00000000000005ee R14: 00000000006faef0 R15: 0000000000000002 2018/03/29 16:07:35 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:35 executing program 4: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000040)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x102) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000a80)={"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"}) 2018/03/29 16:07:35 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x100000002, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) ioctl$KDENABIO(r1, 0x4b36) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:35 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000), 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:35 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000040), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/29 16:07:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = shmget$private(0x0, 0x4000, 0x12fc, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/03/29 16:07:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000140)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000000)={0xd000, 0x5000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000340)={0x6, 0x0, [{0x0, 0x7f, 0x5, 0x10001, 0x5}, {0x80000001, 0x6, 0x8001, 0x3, 0x5}, {0x80000000, 0x70, 0x100, 0x5, 0x2}, {0x2, 0xfffffffffffffffa, 0x9, 0xffffffffffff26d3, 0x100000001}, {0x80000019, 0x7ff, 0x4, 0xfff, 0xa6d}, {0x8000000d, 0xfff, 0x1, 0x7, 0x1f}]}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r5 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x40, 0x0) connect$vsock_stream(r5, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) dup2(r0, r4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x9, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x3}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000280)={r6, 0x3, 0x1, 0x3}, &(0x7f00000002c0)=0x10) dup3(r0, r1, 0x80000) 2018/03/29 16:07:35 executing program 3 (fault-call:1 fault-nth:3): r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:35 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:35 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x80000, 0x104) fallocate(r1, 0xbfc4d15879a7c518, 0x0, 0x4000b) 2018/03/29 16:07:35 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) pipe2(&(0x7f0000000040), 0x800) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f180000000000000000008c6d0900381200d5beb3b74713b0d076c616343d79d4f700ecb51b7a28426c1aa56323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c94a868a85c1531a889d42bc2a58ed2956b4d998be569393f13014d229599956fc71042f13b1fea28f8"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x6) [ 74.972777] FAULT_INJECTION: forcing a failure. [ 74.972777] name failslab, interval 1, probability 0, space 0, times 0 [ 74.984081] CPU: 1 PID: 9909 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #5 [ 74.991180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.000528] Call Trace: [ 75.003242] dump_stack+0x194/0x24d [ 75.006856] ? arch_local_irq_restore+0x53/0x53 [ 75.011504] ? lock_release+0xa40/0xa40 [ 75.015467] should_fail+0x8c0/0xa40 [ 75.019163] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 75.024246] ? radix_tree_delete+0x30/0x30 [ 75.028456] ? node_tag_clear+0xf2/0x180 [ 75.032502] ? print_irqtrace_events+0x270/0x270 [ 75.037235] ? find_held_lock+0x35/0x1d0 [ 75.041284] ? tipc_alloc_conn+0x41b/0x5a0 [ 75.045511] ? mark_held_locks+0xaf/0x100 [ 75.049633] ? idr_alloc+0x127/0x180 [ 75.053322] ? __local_bh_enable_ip+0x121/0x230 [ 75.057970] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 75.062963] ? tipc_alloc_conn+0x41b/0x5a0 [ 75.067183] should_failslab+0xec/0x120 [ 75.071135] kmem_cache_alloc_trace+0x4b/0x740 [ 75.075692] ? tipc_alloc_conn+0x448/0x5a0 [ 75.079906] ? tipc_send_kern_top_evt+0x6e0/0x6e0 [ 75.084729] ? tipc_topsrv_kern_subscr+0x346/0x8a0 [ 75.089644] tipc_subscrb_connect_cb+0xaa/0x270 [ 75.094291] ? tipc_subscrb_put+0x30/0x30 [ 75.098421] ? __lock_is_held+0xb6/0x140 [ 75.102477] tipc_topsrv_kern_subscr+0x465/0x8a0 [ 75.107212] ? tipc_receive_from_sock+0x7b0/0x7b0 [ 75.112039] ? memset+0x31/0x40 [ 75.115301] ? tipc_bcast_stop+0x350/0x350 [ 75.119528] tipc_group_create+0x6ed/0x980 [ 75.123746] ? tipc_group_size+0x50/0x50 [ 75.128058] ? mark_held_locks+0xaf/0x100 [ 75.132181] ? do_raw_spin_trylock+0x190/0x190 [ 75.136745] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 75.141735] ? lock_sock_nested+0x91/0x110 [ 75.145980] ? trace_hardirqs_on+0xd/0x10 [ 75.150107] ? __local_bh_enable_ip+0x121/0x230 [ 75.154769] tipc_setsockopt+0x28a/0xcf0 [ 75.158813] ? tipc_sk_leave+0x200/0x200 [ 75.162865] ? __fdget+0x18/0x20 [ 75.166207] ? security_socket_setsockopt+0x89/0xb0 [ 75.171233] SyS_setsockopt+0x189/0x360 [ 75.175198] ? SyS_recv+0x40/0x40 [ 75.178625] ? SyS_write+0x184/0x220 [ 75.182320] ? SyS_read+0x220/0x220 [ 75.185926] ? do_syscall_64+0xb7/0x940 [ 75.189883] ? SyS_recv+0x40/0x40 [ 75.193316] do_syscall_64+0x281/0x940 [ 75.197179] ? __do_page_fault+0xc90/0xc90 [ 75.201389] ? _raw_spin_unlock_irq+0x27/0x70 [ 75.205860] ? finish_task_switch+0x1c1/0x7e0 [ 75.210331] ? syscall_return_slowpath+0x550/0x550 [ 75.215240] ? syscall_return_slowpath+0x2ac/0x550 [ 75.220149] ? prepare_exit_to_usermode+0x350/0x350 [ 75.225147] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 75.230494] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 75.235325] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 75.240493] RIP: 0033:0x4548b9 [ 75.243655] RSP: 002b:00007f850ab27c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 75.251337] RAX: ffffffffffffffda RBX: 00007f850ab286d4 RCX: 00000000004548b9 [ 75.258583] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000013 [ 75.265825] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 75.273067] R10: 0000000020540ff0 R11: 0000000000000246 R12: 0000000000000014 [ 75.280312] R13: 00000000000005ee R14: 00000000006faef0 R15: 0000000000000003 [ 75.287974] Subscriber rejected, no memory 2018/03/29 16:07:35 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000016000)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f00000001c0)={0x14, 0x16, 0x301}, 0x14}, 0x1}, 0x0) r1 = dup2(r0, r0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000000)={0x1, 0x8, [@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x17}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @random="1e56821e4438", @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, @empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x13}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]]}) 2018/03/29 16:07:35 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:35 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x6, 0x0, 0x1, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0x8, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x28042, 0x21) fallocate(r1, 0x11, 0x0, 0x4000b) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000100)={0x2, 0x100, 0x1f, 0x84, 0x40}) 2018/03/29 16:07:35 executing program 3 (fault-call:1 fault-nth:4): r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='oom_score_adj\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4c, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001800)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x2, &(0x7f0000001280)=[{}, {}], &(0x7f0000002040)=""/4096}, &(0x7f00000013c0)=0x78) ioprio_get$pid(0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000240)) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffc) ftruncate(r1, 0x7fff) truncate(&(0x7f0000001180)='./bus\x00', 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x200000008100ffe, 0x0) sendfile(r2, r1, &(0x7f00000010c0), 0x10000065) r3 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r3, 0x10000002284, &(0x7f0000b3bfff)) sendfile(r0, r1, &(0x7f0000000000), 0x4) tkill(0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='teql0\x00', 0x1) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000200)=0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000001500)={&(0x7f00000012c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0xfdc8, &(0x7f00000001c0), 0x0, &(0x7f0000001440)=""/155, 0x9b}, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001640)={0x1ff, {0x2, 0x4e21}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e20, @multicast2=0xe0000002}, 0x0, 0x9, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000001240)='teql0\x00', 0x0, 0x80}) inotify_rm_watch(0xffffffffffffffff, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xffffffa4) getgroups(0x1, &(0x7f0000000180)=[r7]) inotify_add_watch(r1, &(0x7f0000001100)='./file0\x00', 0x140) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001700)) syz_fuseblk_mount(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='./file0\x00', 0x9ffe, r6, r8, 0x100, 0x2, 0x0) getpgrp(r5) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001880), 0x0, 0x0) readv(r0, &(0x7f000004ffe0), 0x0) 2018/03/29 16:07:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x304) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000440)=0xc) sched_getaffinity(r3, 0x8, &(0x7f00000004c0)) r4 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000002c0)='ipvs\x00', 0xfffffffffffffffd) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000700)={&(0x7f00000006c0)='./file0\x00', r0}, 0x10) r5 = request_key(&(0x7f0000000380)='.dead\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000400)=')\x00', 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000340)=[{&(0x7f0000000300)}], 0x1, r5) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vga_arbiter\x00', 0x208002, 0x0) openat$cgroup_int(r6, &(0x7f0000000880)='memory.high\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) r7 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) ioctl$DRM_IOCTL_AGP_ALLOC(r7, 0xc0206434, &(0x7f0000000740)={0x9, 0x0, 0x1, 0x45e2344c}) ioctl$DRM_IOCTL_SG_ALLOC(r7, 0xc0106438, &(0x7f0000000780)={0x6, r8}) creat(&(0x7f0000000800)='./file0\x00', 0x21) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000007c0)={0x8001, 0x1, 0x9, 0x5, 0x6, 0xcfe7, 0xe0, 0x9, 0x8, 0x200, 0x4c}, 0xb) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000180)={'ipvs\x00'}, &(0x7f00000001c0)=0x1e) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f0000000580)) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000540)) 2018/03/29 16:07:35 executing program 7: unshare(0xbfffb) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08143aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4cb72433354dc465e3d00b035451ecc188e04de9e89ecb71cef3bf4b3a76af4f8fead0fb57e9abf2f253889dd60f"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) [ 75.390494] FAULT_INJECTION: forcing a failure. [ 75.390494] name failslab, interval 1, probability 0, space 0, times 0 [ 75.401826] CPU: 1 PID: 9937 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #5 [ 75.408934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.418284] Call Trace: [ 75.420860] dump_stack+0x194/0x24d [ 75.424477] ? arch_local_irq_restore+0x53/0x53 [ 75.429150] should_fail+0x8c0/0xa40 [ 75.432853] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 75.438655] ? save_stack+0xa3/0xd0 [ 75.442264] ? trace_hardirqs_off+0x10/0x10 [ 75.446559] ? save_stack+0x43/0xd0 [ 75.450162] ? kasan_kmalloc+0xad/0xe0 [ 75.454032] ? kmem_cache_alloc_trace+0x136/0x740 [ 75.458852] ? tipc_subscrb_connect_cb+0xaa/0x270 [ 75.463669] ? tipc_topsrv_kern_subscr+0x465/0x8a0 [ 75.468573] ? tipc_group_create+0x6ed/0x980 [ 75.472960] ? tipc_setsockopt+0x28a/0xcf0 [ 75.477169] ? SyS_setsockopt+0x189/0x360 [ 75.481297] ? do_syscall_64+0x281/0x940 [ 75.485335] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 75.490700] ? find_held_lock+0x35/0x1d0 [ 75.494756] ? tipc_subscrb_rcv_cb+0x25a/0xa40 [ 75.499318] ? lock_downgrade+0x980/0x980 [ 75.503439] ? lock_downgrade+0x980/0x980 [ 75.507581] should_failslab+0xec/0x120 [ 75.511536] kmem_cache_alloc_trace+0x4b/0x740 [ 75.516121] tipc_subscrb_rcv_cb+0x398/0xa40 [ 75.520519] ? tipc_subscrb_release_cb+0x30/0x30 [ 75.525257] ? lockdep_init_map+0x9/0x10 [ 75.529294] ? __raw_spin_lock_init+0x2d/0x100 [ 75.533858] ? tipc_subscrb_connect_cb+0x1bd/0x270 [ 75.538769] ? tipc_subscrb_put+0x30/0x30 [ 75.542903] ? __lock_is_held+0xb6/0x140 [ 75.546967] ? tipc_subscrb_release_cb+0x30/0x30 [ 75.551702] tipc_topsrv_kern_subscr+0x555/0x8a0 [ 75.556445] ? tipc_receive_from_sock+0x7b0/0x7b0 [ 75.561269] ? memset+0x31/0x40 [ 75.564540] ? tipc_bcast_stop+0x350/0x350 [ 75.568773] tipc_group_create+0x6ed/0x980 [ 75.573001] ? tipc_group_size+0x50/0x50 [ 75.577070] ? mark_held_locks+0xaf/0x100 [ 75.581196] ? do_raw_spin_trylock+0x190/0x190 [ 75.585766] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 75.590759] ? lock_sock_nested+0x91/0x110 [ 75.594979] ? trace_hardirqs_on+0xd/0x10 [ 75.599104] ? __local_bh_enable_ip+0x121/0x230 [ 75.603767] tipc_setsockopt+0x28a/0xcf0 [ 75.607815] ? tipc_sk_leave+0x200/0x200 [ 75.611874] ? __fdget+0x18/0x20 [ 75.615220] ? security_socket_setsockopt+0x89/0xb0 [ 75.620223] SyS_setsockopt+0x189/0x360 [ 75.624183] ? SyS_recv+0x40/0x40 [ 75.627611] ? SyS_write+0x184/0x220 [ 75.631312] ? SyS_read+0x220/0x220 [ 75.634925] ? do_syscall_64+0xb7/0x940 [ 75.638882] ? SyS_recv+0x40/0x40 [ 75.642322] do_syscall_64+0x281/0x940 [ 75.646183] ? __do_page_fault+0xc90/0xc90 [ 75.650393] ? _raw_spin_unlock_irq+0x27/0x70 [ 75.654869] ? finish_task_switch+0x1c1/0x7e0 [ 75.659345] ? syscall_return_slowpath+0x550/0x550 [ 75.664255] ? syscall_return_slowpath+0x2ac/0x550 [ 75.669167] ? prepare_exit_to_usermode+0x350/0x350 [ 75.674164] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 75.679520] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 75.684358] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 16:07:36 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(0xffffffffffffffff, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xdcc, 0x24000) r2 = syz_open_dev$dspn(&(0x7f0000001440)='/dev/dsp#\x00', 0x4000000000004, 0x400000) readv(r2, &(0x7f0000003fd0)=[{&(0x7f0000001700)=""/249, 0x2df}], 0x1) fcntl$setstatus(r2, 0x4, 0x800) readv(r2, &(0x7f0000a6fff0), 0x0) ioctl$int_in(r2, 0x80000000005001, &(0x7f0000003ff8)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001300)=ANY=[@ANYRES32=0x0], &(0x7f00000001c0)=0x1) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r3, &(0x7f0000000240)=0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="580000001400192340834b80040d8c5602062200010400000000000000005800004824ca944f64009400050028825a003b5fbe907902008000f0fffefffffe03edf8fef5dd00000005000100000c0900fcff4d00040e05a5", 0x58}], 0x1) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000001340)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000001380)={r4}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000013c0)}) r5 = socket$inet6(0xa, 0x0, 0x2000000009) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000140)=0xce6, 0x4) listen(0xffffffffffffffff, 0x40000000000005) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000100)={'vlan0\x00', {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}) r6 = socket$inet6(0xa, 0x6, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000014c0)) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe38}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x2, 0x10) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000002c0)) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) setsockopt$inet6_int(r6, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001500)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001600)=0xe8) sendmmsg(r6, &(0x7f0000008c80)=[{{&(0x7f0000001640)=@hci={0x1f, r7, 0x2}, 0x80, &(0x7f00000018c0)=[{&(0x7f00000016c0)="01c5180c5cae2226c794715892475960621c", 0x12}], 0x1, &(0x7f0000001940), 0x0, 0x80}, 0x7}], 0x1, 0x80) connect$inet6(r6, &(0x7f000000cfe4)={0xa, 0x4e20, 0x80a, @empty, 0xf8b6}, 0x1c) socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x26d, 0x2, 0x1, 0x2, 0xaa6, 0x1, 0x7}, &(0x7f0000000080)=0x20) 2018/03/29 16:07:36 executing program 7: unshare(0x23ffd) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42ac634400000000000000381200d5beb3b74713b0d076c616343d79d4f7d8ecb51b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) [ 75.689522] RIP: 0033:0x4548b9 [ 75.692687] RSP: 002b:00007f850ab27c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 75.700374] RAX: ffffffffffffffda RBX: 00007f850ab286d4 RCX: 00000000004548b9 [ 75.707620] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000013 [ 75.714867] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 75.722113] R10: 0000000020540ff0 R11: 0000000000000246 R12: 0000000000000014 [ 75.729359] R13: 00000000000005ee R14: 00000000006faef0 R15: 0000000000000004 [ 75.736820] Subscription rejected, no memory 2018/03/29 16:07:36 executing program 3 (fault-call:1 fault-nth:5): r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r3 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x3, [0xc, 0x8, 0x2663]}, &(0x7f00000000c0)=0xe) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x1, 0xfffffffffffffff7}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0x0, &(0x7f0000847000), 0x0, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000f3ff58)=[{0x0, 0x0, &(0x7f0000511000), 0x0, &(0x7f0000131000)}], 0x1, 0x0) ftruncate(r1, 0x5b) 2018/03/29 16:07:36 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:36 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) read(r2, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(0xffffffffffffffff, 0x400) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) 2018/03/29 16:07:36 executing program 7: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000480)}, 0x20) r1 = getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x208200) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)="76626f786e65743125626465766d696d655f74797065766d6e657430d900", &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='eth0-\x00', &(0x7f0000000280)='self\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='!(\x00', &(0x7f0000000340)='{vboxnet1\x00', &(0x7f0000000380)="6574683073797374656d2d70726f63872f00", &(0x7f00000003c0)='\x00'], 0x0) ptrace$peek(0x1002, r1, &(0x7f00000004c0)) r3 = socket(0xc, 0x1, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="3f42acf910b8e3c7634400000000381200d5beb3b74713b0d076c616343d79d4f7d8ec921b7a2896acb95f6323d797b945673cea285f1079cc08223aaca6460a505e7c431aa1d8d88a89cecbb6c0337a791b4b8c2d4c"], &(0x7f00000024c0)=0x2) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000040)) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000480)) perf_event_open(&(0x7f0000000500)={0x4, 0x70, 0x6, 0x21ab, 0x7fffffff, 0x24000000, 0x0, 0xba8d, 0x8, 0x4, 0xffffffff80000000, 0x3, 0x7, 0xda, 0x101, 0x1, 0x9, 0x0, 0x3, 0xff, 0x5, 0x2, 0x8c, 0x9, 0x1000, 0x2, 0x4, 0x5, 0xffffffff, 0xf09, 0x9, 0x5, 0x3, 0x8, 0x80000000, 0x6, 0x10001, 0x6, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000240)}, 0x100, 0x7, 0x4, 0x3, 0x8001, 0x200, 0x6}, r1, 0x6, r2, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002500)={r4, 0x7, 0xffffffff, 0x3ff}, &(0x7f0000002540)=0x10) sched_setattr(r1, &(0x7f00000000c0)={0x30, 0x0, 0x1, 0x9, 0x4, 0x9, 0x101, 0x7}, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000600)={0x2, &(0x7f0000000100)=[{}, {}]}) [ 75.810079] FAULT_INJECTION: forcing a failure. [ 75.810079] name failslab, interval 1, probability 0, space 0, times 0 [ 75.821647] CPU: 1 PID: 9963 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #5 [ 75.828745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.838096] Call Trace: [ 75.840689] dump_stack+0x194/0x24d [ 75.844329] ? arch_local_irq_restore+0x53/0x53 [ 75.849018] should_fail+0x8c0/0xa40 [ 75.852743] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 75.857865] ? trace_hardirqs_off+0x10/0x10 [ 75.862194] ? is_bpf_text_address+0x7b/0x120 [ 75.866685] ? __lock_acquire+0x664/0x3e00 [ 75.870899] ? lock_release+0xa40/0xa40 [ 75.874853] ? find_held_lock+0x35/0x1d0 [ 75.878899] ? nametbl_find_seq+0x1d0/0x580 [ 75.883194] ? lock_downgrade+0x980/0x980 [ 75.887319] ? lock_release+0xa40/0xa40 [ 75.891276] should_failslab+0xec/0x120 [ 75.895226] kmem_cache_alloc_trace+0x4b/0x740 [ 75.899789] ? nametbl_find_seq+0x3dd/0x580 [ 75.904093] tipc_nameseq_create+0xad/0x540 [ 75.908387] ? lock_release+0xa40/0xa40 [ 75.912335] ? __tipc_nl_add_monitor+0xf80/0xf80 [ 75.917083] tipc_nametbl_subscribe+0x968/0xcb0 [ 75.921741] ? tipc_nametbl_withdraw+0x6e0/0x6e0 [ 75.926471] ? tipc_subscrb_rcv_cb+0x54f/0xa40 [ 75.931034] ? __lock_is_held+0xb6/0x140 [ 75.935074] ? lock_release+0xa40/0xa40 [ 75.939031] ? tipc_subscrb_rcv_cb+0x398/0xa40 [ 75.943589] ? rcu_read_lock_sched_held+0x108/0x120 [ 75.948580] ? kmem_cache_alloc_trace+0x459/0x740 [ 75.953400] ? tipc_subscrb_rcv_cb+0x54f/0xa40 [ 75.957966] tipc_subscrb_rcv_cb+0x67e/0xa40 [ 75.962354] ? tipc_subscrb_release_cb+0x30/0x30 [ 75.967087] ? lockdep_init_map+0x9/0x10 [ 75.971121] ? __raw_spin_lock_init+0x2d/0x100 [ 75.975681] ? tipc_subscrb_connect_cb+0x1bd/0x270 [ 75.980587] ? tipc_subscrb_put+0x30/0x30 [ 75.984715] ? __lock_is_held+0xb6/0x140 [ 75.988764] ? tipc_subscrb_release_cb+0x30/0x30 [ 75.993495] tipc_topsrv_kern_subscr+0x555/0x8a0 [ 75.998229] ? tipc_receive_from_sock+0x7b0/0x7b0 [ 76.003046] ? memset+0x31/0x40 [ 76.006307] ? tipc_bcast_stop+0x350/0x350 [ 76.010527] tipc_group_create+0x6ed/0x980 [ 76.014743] ? tipc_group_size+0x50/0x50 [ 76.018785] ? mark_held_locks+0xaf/0x100 [ 76.022907] ? do_raw_spin_trylock+0x190/0x190 [ 76.027465] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 76.032458] ? lock_sock_nested+0x91/0x110 [ 76.036665] ? trace_hardirqs_on+0xd/0x10 [ 76.040787] ? __local_bh_enable_ip+0x121/0x230 [ 76.045437] tipc_setsockopt+0x28a/0xcf0 [ 76.049481] ? tipc_sk_leave+0x200/0x200 [ 76.053527] ? __fdget+0x18/0x20 [ 76.056873] ? security_socket_setsockopt+0x89/0xb0 [ 76.061870] SyS_setsockopt+0x189/0x360 [ 76.065824] ? SyS_recv+0x40/0x40 [ 76.069249] ? SyS_write+0x184/0x220 [ 76.072940] ? SyS_read+0x220/0x220 [ 76.076557] ? do_syscall_64+0xb7/0x940 [ 76.080507] ? SyS_recv+0x40/0x40 [ 76.083936] do_syscall_64+0x281/0x940 [ 76.087795] ? __do_page_fault+0xc90/0xc90 [ 76.092004] ? _raw_spin_unlock_irq+0x27/0x70 [ 76.096481] ? finish_task_switch+0x1c1/0x7e0 [ 76.100953] ? syscall_return_slowpath+0x550/0x550 [ 76.105856] ? syscall_return_slowpath+0x2ac/0x550 [ 76.110766] ? prepare_exit_to_usermode+0x350/0x350 [ 76.115758] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 76.121110] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 76.125935] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 76.131099] RIP: 0033:0x4548b9 [ 76.134262] RSP: 002b:00007f850ab27c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 76.141945] RAX: ffffffffffffffda RBX: 00007f850ab286d4 RCX: 00000000004548b9 [ 76.149187] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000013 2018/03/29 16:07:36 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0xffff, 0x1f, 0x400, 0x80000001, 0x4, 0x8, 0x9, 0x8582, 0x100000000, 0x7, 0x2}, {0x6, 0x4, 0x8391, 0x5, 0x7, 0x2, 0xffffffff, 0xfbf6, 0x1395, 0x91, 0x0, 0x3, 0x3}, {0xf9, 0x59fb, 0x7ff, 0xfffffffffffff626, 0x2, 0x4, 0x2, 0xb, 0x9, 0xffffffff, 0x4, 0x81, 0x7f80000000}], 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000300)={0x200, 0x1ff}) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x0, 0x3, 0x6, 0x0, &(0x7f0000000140)=[{}, {}, {}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) fallocate(r1, 0x11, 0x0, 0x4000b) 2018/03/29 16:07:36 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f000072d000)='smaps\x00') readv(r1, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r2, 0x400) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r5 = dup3(r3, r2, 0x0) sendmmsg(r1, &(0x7f00000027c0)=[{{&(0x7f00000004c0)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r1, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000400)={'icmp\x00'}, &(0x7f0000000440)=0x1e) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x77, 0x0, 0x5e7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x15}, 0x4}}}, &(0x7f00000002c0)=0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) [ 76.156428] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 76.163673] R10: 0000000020540ff0 R11: 0000000000000246 R12: 0000000000000014 [ 76.170918] R13: 00000000000005ee R14: 00000000006faef0 R15: 0000000000000005 [ 76.178241] Name sequence creation failed, no memory [ 76.183355] Failed to create subscription for {1020,0,4294967295} [ 76.232975] list_del corruption. prev->next should be 000000007d968438, but was 000000003d9aa02b [ 76.242315] ------------[ cut here ]------------ [ 76.247062] kernel BUG at lib/list_debug.c:53! [ 76.251670] invalid opcode: 0000 [#1] SMP KASAN [ 76.256323] Dumping ftrace buffer: [ 76.259852] (ftrace buffer empty) [ 76.263547] Modules linked in: [ 76.266729] CPU: 1 PID: 9963 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #5 [ 76.273808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.283144] RIP: 0010:__list_del_entry_valid+0xef/0x150 [ 76.288479] RSP: 0018:ffff8801cdbd6ae8 EFLAGS: 00010286 [ 76.293819] RAX: 0000000000000054 RBX: ffffea00075cb240 RCX: 0000000000000000 [ 76.301062] RDX: 0000000000000054 RSI: 1ffff10039b7ad12 RDI: ffffed0039b7ad51 [ 76.308306] RBP: ffff8801cdbd6b00 R08: 1ffff10039b7aca9 R09: 0000000000000000 [ 76.315549] R10: ffff8801cdbd69c8 R11: 0000000000000000 R12: ffffea00075cb200 [ 76.322792] R13: ffff8801cdbd6ca0 R14: ffff8801b16baa60 R15: ffff8801b4357480 [ 76.330037] FS: 00007f850ab28700(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000 [ 76.338238] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 76.344091] CR2: 0000000000465550 CR3: 0000000007a22004 CR4: 00000000001606e0 [ 76.351337] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 76.358582] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 76.365824] Call Trace: [ 76.368388] ? _raw_spin_lock_bh+0x39/0x40 [ 76.372599] tipc_nametbl_unsubscribe+0x318/0x990 [ 76.377418] ? trace_hardirqs_off+0x10/0x10 [ 76.381719] ? tipc_nametbl_subscribe+0xcb0/0xcb0 [ 76.386541] ? lock_acquire+0x1d5/0x580 [ 76.390489] ? lock_acquire+0x1d5/0x580 [ 76.394440] ? tipc_subscrb_subscrp_delete+0x8f/0x460 [ 76.399616] ? lock_release+0xa40/0xa40 [ 76.403565] ? find_held_lock+0x35/0x1d0 [ 76.407613] ? tipc_conn_lookup+0x78/0x90 [ 76.411738] ? tipc_subscrb_subscrp_delete+0x8f/0x460 [ 76.416913] tipc_subscrb_subscrp_delete+0x1e9/0x460 [ 76.421989] ? mark_held_locks+0xaf/0x100 [ 76.426115] ? __local_bh_enable_ip+0x121/0x230 [ 76.430762] ? tipc_subscrp_put+0x360/0x360 [ 76.435065] ? tipc_conn_lookup+0x78/0x90 [ 76.439186] ? trace_hardirqs_on+0xd/0x10 [ 76.443310] ? __local_bh_enable_ip+0x121/0x230 [ 76.447961] ? tipc_subscrb_subscrp_delete+0x460/0x460 [ 76.453216] tipc_subscrb_release_cb+0x17/0x30 [ 76.457773] tipc_topsrv_kern_unsubscr+0x2c3/0x430 [ 76.462676] ? tipc_dest_del+0x350/0x350 [ 76.466717] ? tipc_topsrv_kern_subscr+0x8a0/0x8a0 [ 76.471625] ? tipc_node_distr_xmit+0x212/0x2b0 [ 76.476269] ? tipc_node_xmit+0x3b0/0x3b0 [ 76.480399] tipc_group_delete+0x2c0/0x3d0 [ 76.484619] ? tipc_msg_create+0x1fc/0x280 [ 76.488842] ? tipc_group_create+0x980/0x980 [ 76.493229] ? __tipc_shutdown+0x916/0xc80 [ 76.497436] ? find_held_lock+0x35/0x1d0 [ 76.501483] ? tipc_sk_respond+0x550/0x550 [ 76.505709] tipc_sk_leave+0x10b/0x200 [ 76.509577] ? tipc_sk_withdraw+0x6b0/0x6b0 [ 76.513878] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 76.518867] ? lock_sock_nested+0x91/0x110 [ 76.523077] ? __local_bh_enable_ip+0x121/0x230 [ 76.527730] tipc_release+0x154/0xff0 [ 76.531517] ? mntput_no_expire+0x130/0xa90 [ 76.535816] ? tipc_sk_backlog_rcv+0x390/0x390 [ 76.540380] ? lock_release+0xa40/0xa40 [ 76.544331] ? __dentry_kill+0x4ae/0x700 [ 76.548377] ? check_same_owner+0x320/0x320 [ 76.552685] ? locks_remove_file+0x3fa/0x5a0 [ 76.557071] ? fcntl_setlk+0x1100/0x1100 [ 76.561106] ? fsnotify+0x7b3/0x1140 [ 76.564811] ? fsnotify_first_mark+0x2b0/0x2b0 [ 76.569378] sock_release+0x8d/0x1e0 [ 76.573071] ? sock_alloc_file+0x560/0x560 [ 76.577281] sock_close+0x16/0x20 [ 76.580711] __fput+0x327/0x7e0 [ 76.583976] ? fput+0x140/0x140 [ 76.587232] ? check_same_owner+0x320/0x320 [ 76.591526] ? _raw_spin_unlock_irq+0x27/0x70 [ 76.596011] ____fput+0x15/0x20 [ 76.599269] task_work_run+0x199/0x270 [ 76.603146] ? task_work_cancel+0x210/0x210 [ 76.607446] ? _raw_spin_unlock+0x22/0x30 [ 76.611571] ? switch_task_namespaces+0x87/0xc0 [ 76.616222] do_exit+0x9bb/0x1ad0 [ 76.619662] ? mm_update_next_owner+0x930/0x930 [ 76.624312] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 76.629476] ? __lock_acquire+0x664/0x3e00 [ 76.633696] ? trace_hardirqs_off+0x10/0x10 [ 76.637994] ? __lock_is_held+0xb6/0x140 [ 76.642041] ? trace_hardirqs_off+0x10/0x10 [ 76.646352] ? __lock_is_held+0xb6/0x140 [ 76.650389] ? __account_cfs_rq_runtime+0x600/0x600 [ 76.655392] ? find_held_lock+0x35/0x1d0 [ 76.659442] ? kprobe_flush_task+0x1a3/0x5d0 [ 76.663830] ? trace_hardirqs_off+0x10/0x10 [ 76.668121] ? lock_downgrade+0x980/0x980 [ 76.672247] ? lock_release+0xa40/0xa40 [ 76.676205] ? memset+0x31/0x40 [ 76.679468] ? find_held_lock+0x35/0x1d0 [ 76.683515] ? get_signal+0x7a9/0x16d0 [ 76.687381] ? lock_downgrade+0x980/0x980 [ 76.691520] do_group_exit+0x149/0x400 [ 76.695384] ? do_raw_spin_trylock+0x190/0x190 [ 76.699941] ? SyS_exit+0x30/0x30 [ 76.703369] ? _raw_spin_unlock_irq+0x27/0x70 [ 76.707841] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 76.712842] get_signal+0x73a/0x16d0 [ 76.716545] ? ptrace_notify+0x130/0x130 [ 76.720591] ? __schedule+0x903/0x1ec0 [ 76.724462] ? __sched_text_start+0x8/0x8 [ 76.728597] ? __fget+0x36b/0x5b0 [ 76.732039] do_signal+0x90/0x1e90 [ 76.735557] ? iterate_fd+0x3f0/0x3f0 [ 76.739341] ? __release_sock+0x360/0x360 [ 76.743471] ? setup_sigcontext+0x7d0/0x7d0 [ 76.747769] ? SyS_sendmsg+0x50/0x50 [ 76.751464] ? schedule+0xf5/0x430 [ 76.754981] ? __schedule+0x1ec0/0x1ec0 [ 76.758927] ? __fget_light+0x2b2/0x3c0 [ 76.762897] ? exit_to_usermode_loop+0x8c/0x2f0 [ 76.767552] exit_to_usermode_loop+0x258/0x2f0 [ 76.772115] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 76.777629] ? do_sys_ftruncate.constprop.14+0x112/0x5d0 [ 76.783054] ? do_syscall_64+0xb7/0x940 [ 76.787019] do_syscall_64+0x6ec/0x940 [ 76.790878] ? __do_page_fault+0xc90/0xc90 [ 76.795087] ? _raw_spin_unlock_irq+0x27/0x70 [ 76.799558] ? finish_task_switch+0x1c1/0x7e0 [ 76.804033] ? syscall_return_slowpath+0x550/0x550 [ 76.808940] ? syscall_return_slowpath+0x2ac/0x550 [ 76.813845] ? prepare_exit_to_usermode+0x350/0x350 [ 76.818842] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 76.824188] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 76.829019] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 76.834197] RIP: 0033:0x4548b9 [ 76.837364] RSP: 002b:00007f850ab27c88 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 76.845057] RAX: 0000000000000001 RBX: 00007f850ab286d4 RCX: 00000000004548b9 [ 76.852303] RDX: 0000000000000016 RSI: 0000000000000001 RDI: 000000000072becc [ 76.859546] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000036 [ 76.866789] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 76.874036] R13: 00000000000000a1 R14: 00000000006f2fb8 R15: 0000000000000000 [ 76.881307] Code: 4c 89 e2 48 c7 c7 40 8b e5 86 e8 05 d3 a7 fe 0f 0b 48 c7 c7 a0 8b e5 86 e8 f7 d2 a7 fe 0f 0b 48 c7 c7 00 8c e5 86 e8 e9 d2 a7 fe <0f> 0b 48 c7 c7 60 8c e5 86 e8 db d2 a7 fe 0f 0b 48 89 df 48 89 [ 76.900505] RIP: __list_del_entry_valid+0xef/0x150 RSP: ffff8801cdbd6ae8 [ 76.907364] ---[ end trace 8ad93e1e4a6e77c4 ]--- [ 76.912118] Kernel panic - not syncing: Fatal exception in interrupt [ 76.919012] Dumping ftrace buffer: [ 76.922526] (ftrace buffer empty) [ 76.926205] Kernel Offset: disabled [ 76.929804] Rebooting in 86400 seconds..