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", 0x1000}, {&(0x7f0000001600)="ae75b26fbf7c88527865a678629f4a1330ddfb032fa99c32a962c7d23120bd29df71434dab4daaa73e2288d6c7637a8594f17a9ed80de4eb5355e42dca2cb16846c98fe4cb3dfb6cf3b5002b1a0f46516768c5d47ea3765e2b143bd6e71ff980e75860fde24c2bae3acc7534656b9ede5aafc5ae53e115b8e37f8a74ea7620390cbe5d694f7c856da334248c54e047c6cfb6b844353985eefc47e0b85ec98d1a872911cf263079059178315a0be00c9d594f730abca78c7357b8889f38fd", 0xbe}], 0x3, &(0x7f00000016c0)=[{0x68, 0x0, 0x9, "f9fad08eb4385e0a7eee779ea8c4219c6fda20eddc1971020e173408870700693d2c4da2d6c855987a00979147c6f5d8d2d5795985fda2dac6f268dfd0f2af8ac30f2c051cece2ee9f43925d67208093fc30f5ede5"}], 0x68}, 0x4) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000440)=0x2, 0x4) 2018/03/30 07:41:45 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:45 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff", 0x19) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:45 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)=ANY=[@ANYBLOB="5000000016949d664a10ad892fa0724901d0b78bbac91c5cfdc59de3fff25c0d6db018d660aea4cbc843d41f311e4128417e7c356c318c5a6efe6b74e2ca044fca706b8b496753707684c8b590effc355a7a96d22b812e60405477aac028ee04b1d5a0c348d4b44c032edafadc2b8ad9e8f4cbc78471a8461a9807eba57abccdfcd7"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000000380)="0a0400000000000000a8040000", 0xfffffd0b) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 180.691861] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 180.719857] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 180.744243] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:45 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff", 0x19) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:45 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)=ANY=[@ANYBLOB="50b0e0f85e43f55d6265b7ab9f34020000001e000000fddbdf25023f0c00892fa0723f79350fdce0a5d7a4097082378ae8ab000000000000000000a0a1d7f4ab1122cc99e606dccecf0353dcdd370208f268d723"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x8, 0x3d24d42da501ed03) 2018/03/30 07:41:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) socket$inet(0x2, 0x200000000003, 0x2) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000089b624f4076340968ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x10}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@broadcast, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) [ 180.822646] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:45 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f5b9015bf643d1d106ec1562b543804ed09daa4ced68cc8b31119aa3de4059de49ea0aa91ccd579b3f0f07d8bd4dfad517a79ab38007dcdbe0e54de787a3f43dd4a125e155da06ca4787a60350829786a891f78d4e8d5299594a87e44d1368c6843e48c15ae7f08841d0d51d0903e6b12b01465a5f2473d155ee7f1d4b8a00141477e2a5e5e50fceab919d5b8453b043dad05dbb787a94ef6d0f7a4f04e8260eec14865bef6f5f4ac7ea0770691d3e1e8fb437b9ee714f0f2bf4971c9eb"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f446"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/03/30 07:41:46 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff", 0x19) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:46 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000e41e000000000000dff0949d1044ae029d18df"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000380)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x101000, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000400)={@loopback={0x0, 0x1}, 0x40}) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x80000, 0x0) 2018/03/30 07:41:46 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c", 0x25) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) socket$inet(0x2, 0x200000000003, 0x2) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 181.010372] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 181.017526] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 181.024742] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00'}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000380)=0x3) dup2(r3, r2) 2018/03/30 07:41:46 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c", 0x25) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x4, 0x70bd28, 0x25dfdbfc, {0x1}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f5d77a8"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/03/30 07:41:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) [ 181.193984] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 181.212644] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 181.228271] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00'}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c", 0x25) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="86c6de3216000000fddbdf25023f1000ac3c71a9664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000000380)=""/35, 0x23) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r1, 0x3, 0x4a}, 0x8) r4 = syz_open_pts(r3, 0x11) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast1, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000500)=0xe8) setfsuid(r5) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000700)={@in6={{0xa, 0x4e20, 0x100, @remote={0xfe, 0x80, [], 0xbb}, 0x7f}}, 0xfffffffffffffff7, 0x8, 0xfffffffffffffff7, "6b861c51f1407d9f38e10d1732b716c8241d64e77693ad81143f87d687b48eafbc86ada14aff0fb3963d48776abbeb2553221c826f26a397c263905b03881d03cbb9b2daf65de0e360d14a9e471514cb"}, 0xd8) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) dup2(r4, r3) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000540)=0x3, 0x4) 2018/03/30 07:41:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f38d701c06d900fd4d00097aab7bf0793d967c5ace2fb0438352ed477bd35ad5784f383b68a14b5c47d2b0bed49aa19ddb9e671907eb504cd30ef93b79f415285104767d1377e681ce020f0e5d2e7b6ff0a462b3801ecde18c431ed8104e6980ac52ff7438b9f05f1fb808e1bda74435f3fdb43bd040f5cc435fa3b6a96110007391ee66642f4"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r0, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:46 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee", 0x2b) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 181.373299] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00'}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="25000000406507387fa5ce8a00000020a076c6d1ab080c8f2800efb1172ae1cbf6cf438a2e57ed0bfcca05001f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcfd9c34f54fa98421fd916949f6221f9ca26cef7cb8e3d0af5ae0bf43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0xfffffffffffffea5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/03/30 07:41:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fd0000000000000009f0909d6689d069d9df"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 181.433474] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 181.451193] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:46 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee", 0x2b) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 181.557628] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 181.572786] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:46 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:46 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee", 0x2b) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000fa54dfc50ce329cd4710c756a50ec500007f0000010100000005000000e0000001e0"], 0x24) r3 = syz_open_pts(r2, 0x11) openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000000)=0x10000006) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/03/30 07:41:46 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 181.636098] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:46 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1", 0x2e) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 181.688502] device bcsf0 entered promiscuous mode 2018/03/30 07:41:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) r2 = syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0x2, 0x2cc1) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad895988723ff6ddfa8348265e1e764ddccf45ef3378835833f1351bd2613d4c6070abc1bee3cf1e76cde84494cc6bee72753909e699ad7b14ec42158024b2565ae5aee64b4ad13bc8e348c4427f834240497d"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) sendmsg$nl_crypto(r2, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x800200}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)=ANY=[@ANYBLOB="e80000001200000827bd7000fedbdf25736861332d323536000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b0000000000000000000000000000000000002000000020000000000000000000000800010000000000"], 0xe8}, 0x1, 0x0, 0x0, 0x1}, 0x2000c080) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) creat(&(0x7f00000007c0)='./file0\x00', 0x2) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r3, 0x11) syz_open_dev$midi(&(0x7f0000000780)='/dev/midi#\x00', 0xffffffff, 0x20000) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) r5 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x5, 0x0) sendto$inet6(r5, &(0x7f0000000480)="cce7901dc530af081c3d8256f8f6cedc2d17099590ad73efd8d764bdd3ce7d0e4862fb2e11c54c39baa3aa8301b7d6993559869d28ad48ec1edccbd54d1861097227d7988945a3fc1df7d615fca887f59f80c535d152c514201c915b97894d2beff83740ed62614498e9767a74f219ccf20803afdbe2de3aed1548853b221e33c9be49ed5a21a01d19b2859988507e60e06eff722ff75248c78790276d484696d2", 0xa1, 0x800, &(0x7f0000000340)={0xa, 0x4e23, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1ff}, 0x1c) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) dup2(r4, r3) 2018/03/30 07:41:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)="db", 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c0308000000000000000008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e09ae9966d9f7d864165a14dcc1276eaa719b1eb1182fb0b7892ca5abd5621cfaa72db055b6e38e1b55a35dbca786dee627eab05018d6a590b9d11d3b3d8ef0dfbcc4a2b0775e7f37e7e876d82fff656ff7000000000000000000"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f00000003c0)=[&(0x7f00000000c0)='clear_refs\x00', &(0x7f0000000100)='vmnet1\x00', &(0x7f00000004c0)='wlan1+[$vmnet0,bdeveth0@\x00', &(0x7f0000000180)="242be56c6f00", &(0x7f0000000440)='!\x00', &(0x7f0000000240)='clear_refs\x00', &(0x7f0000000280)='syscall\x00', &(0x7f00000002c0)='/dev/ptmx\x00', &(0x7f0000000300)='clear_refs\x00', &(0x7f0000000340)='syscall\x00']) syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) [ 181.750219] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 181.771301] device bcsf0 left promiscuous mode [ 181.797532] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 181.807008] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:47 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1", 0x2e) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)="b3d83262d0a49157d03ced47886588782260caee63d1b63b94422b9251ca2731a95b12aabf1c1f908bab8e37a594d32f4234fd4503e0c980fc40e2a85725ca8605b971d8f018146bfaf2bb5aa561a8f572d6b33771cefbc69f3421d37452a7bd459b56e3c3c7cbc78d3124f9da9be4aba5ae44ecac6162f91fe402f66e65b9af9039bd749cb6db86b1ef871ed0573c84efa8") syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x60008000, &(0x7f0000000640)="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", &(0x7f0000000340), &(0x7f0000000180), &(0x7f0000000280)="15e100291dd40dcde9c014ad4267cc8fc151fba01de79c6242f862285cb69cf20ee3990e99d955e652cfbf932619be1d7fe391c2dc4bf759e82fa646e045e9612ee5f9fe5fa27fbb9a765b8f2f0fd2c5094ca576b7b0388681f1d2385052c4149c0d1f7825b41ab340047d88a358b3011044849ca38b24df07039937a3b4d22ccf4da01f000000000039845e8b82d194da54693cecf11ab809b970ed34d7f5853a5a456748ee8b74c0740612e5d496a62e97b000008400000000000000") mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040), &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/03/30 07:41:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="5000000016000000fdd3e30ba86f59da2600096c664a10ad892fa0723f712fc4764ec75cacb58f72e635038186c1fab99da20bf66b890eea155bfa2c6d638e0ab8a21c2dcc53de3a85963da2788b93d79829124fb9e17e0047d045ba28544c9d2422641412e32028847ffe1ff03661d4c438b801825941fa757d6292b5fb62204ec641c0693c29af47fb7712cfe29f14e6ff88570c55d034bd3237196dd7ab787c83b76bbe2ce67a73fd9c7a12b7"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x6, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x8000) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f00000002c0)={0xd000, 0x6000, 0x5, 0x0, 0x5}) r4 = msgget$private(0x0, 0x20) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000400)=""/237) dup2(r3, r2) [ 181.947047] device bcsf0 entered promiscuous mode 2018/03/30 07:41:47 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000002c0)=ANY=[@ANYBLOB="50e6ffff15000000f192934f88479335f16f4b72a83ab1fddba0723fb977e2dc1dddc6bb0166e2bf5f7900000000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0xfffffffffffffffe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1", 0x2e) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 181.979123] IPVS: ftp: loaded support on port[0] = 21 2018/03/30 07:41:47 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:47 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd", 0x30) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) connect(r0, &(0x7f00000004c0)=@in6={0xa, 0x4e21, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x1}, 0x80) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000400)=""/144, 0x90}], 0x1) dup2(r3, r2) [ 182.010158] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 182.041894] device bcsf0 left promiscuous mode [ 182.048924] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd", 0x30) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) pwritev(r0, &(0x7f0000003880)=[{&(0x7f0000000400)="3401d15bb1a85c85a6171c3e0599500c1daec67c1519c821e4c682e36971434e661e9666b48c04e8ebcf44b419ffeffd3238d544eda85c861e45d9203a81138197cb1d8d86b933497d1325b19cc4f951a255ff8c14690b4d97a1b70a82e8f347db60b1ceb44dc36832481ff45733db900cfc65474212f2d0d88e56ba557804267f23902a93250074b37c4217439eee60961e4e43d5", 0x95}, {&(0x7f0000000600)="cd0cb7415614467f1d5d77d72dd338813bc873d3b7ed736c2eacb8bdc756dd84ea1fa9cf04694cb4701ea4923a22932679c32990864cf9605704d2b19164e2d0ff36448d167defe79a08dbf9dba01565b5364fc3809eea972996245b69bc57fa3d6481342310abd38eacd56138895e66f87a5b47fd5ac0f9babe46518b3d30a8a455ebd144935136752e81c2d95f36424ca1e3e57319ca4508861e2018bff5877a654e62fab07b1f3ec473f83e801757a3829558a802da96f98020232ae256edf07cb42c9288473d76d459c1bdb8fbe37e4b341bc9c2a17daa0864e82fa0", 0xde}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f00000004c0)="925356b094b177a5c80c7e82569ad479ff09ff375e84273135dd89e1324e4fd35e216754354d742c060394404a7ff8f861e4bc3a6ecaf157b00a3c806ee7d8b31bc95cbdf48576bbb952a57a19fb4343c6ae", 0x52}, {&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000002700)="b19490dbc78f9ac808319361b84d434c5e932290d0b450f240d0bfc099704c82d330513cbe395ccc4feccafdcb89efdd3b29d446b31c6262f65e17bd9866b1d5bf3741da0c81db113b970c910b4d70080c9f2ed4a901ce8741623391471ea29c25b24e34ece460119611dd9515caeca7bf59c12585bb2eda16a136f9d6a62610894b76660652668b8696e3558a6ede9cdf687d232de946d07cf00863b5c6004c3bc125c01336e147d1d843956b0fd647b260bc0373c8b167f462ecc1fc8a46aa13a5c1d715711d80f6b66f372bf7bc7f98e968b333817c47ab66fe58530eb624b97b00ffb4896ed01a784ffd563ff11d10a47edf5cf36c2e7e2c4cdb95a475fbc8520378e3f60b1231e28aac9dd5f8223095aa7abe9b291a834db0c06d338434293e85659ade7a5dbe80718ec420d3fa2b1f19102f420c66c5fdd9cba87de2d62ca0e66f38b5457b74a37fffad5d7058d4a75e657a0c1aad0ce87181e134a6a22bb5705adcd3c0f8e84e3476244b0de0168a617fc3ec6d16f67578e256b02401b450d38deeeca56218338691cd58779950322aec9d2faa78e9377c14f4f3f7fd0d918d3269e15267fa16b070cd9c3acf8567123edf18e8408c6c92680b4a918c6585c9afb6c6034bc7b96ed5873acaff71bc6cfa7b29643a410d889524f4c91709f75c225a33929790de5628d6db0aca6bf8bbf0a92216c1f4fac336c908ab249f512c851bf5781062a9fbd96b01bebbff4481944127ee2a50aefa8ebf34518196e6c6804a4dc38f456d1c107d72fe97802fbff95ea55063412b6a743f149dec468a19149b82b31657369799cbf51a2c0ecf76fbb657036229c2127ea3150d22ed658226f415d522df9f4a2ace258105354e46410f2dc501c8a80fcee671cee11068c61fb81fb8bd03c072436b458e602b899786aa514f9cc130f01ef77e2e36d0910c366e7840e50ff6c9886264fc039d3c663733386994ca2ea8f78f70386081d39cfe2240297e516a02a833f7f150e626ab4f6be4a019ecfdb3457bad4b544be722734ce1b4ebd1256312040291a980871a890ca1040f8898410cefd627458c91b9cf278a69e79a378f2f45a04f5e845c549f4ecc5d6d724e6af763b2acd161c11c97055fa8e4e0c0e525867bb4e96bff9af902c7956ef544c5701f3496b812802e7483cc766adb9128c1b43132ad90c469750808b03243a3112c3d41f1e27f12475af1c16a3445b46faf549b383db897df41c11e2f58709060b75e5359aa43bbb4e020898a84813a36d3eeb96bf9002978f662c4867ebadd8b1bc14e1cba0011f8d03bf0ccc43f40309e7c67d602de2ff6874388264dce8177abbc080627b90d96420bf43151e2ffa4cc439d504eeae3525feb8f5720f3c94c595857f8a6a1b9b49a3b1147b94d728e809ef3479b8775d4c0a2f7599d234d3a5706fbff9e3a0eb9846b5e08ff2638090fa829a5adad9ecf99e70fcaf6542d9f9a79d72db5e44e0c0a6551172426e123f2322eb11d8dcebb97c06a99eaf16856091a4f93bee1c821f52d955f254d4c6d9c4c2afe02b1ce71d796998d6a659fc7f2c96055d2ffbc4a846b811813dc3e7c7c2efbfdf02700a68981dfecbbe340432ee4a51dce247e182a8e84ad74c58da1dd2a5cebd9da03b5128671edccafecaf76e88ca5b2831a3e137816dbddb452765711db7a2a89770dae283f52f68751bed3b3898ac3676155eb9c18ab06ed19ab46d03d0d3c76ff4fa670d1f5fafaf1cd8a3e117e61b6b1030a7fa34c5ae1660db79fe6b7232f38405eec8bad08e93d9186fecc29172c94ab4239e3dd6994ecd59cbb02ff9ddaa145edbdd4f3d22dce2f9880e08a27804a9cf2d9118e1c6057d5d3916b2713db909d77ef066b0422d9269f9f7d82fc05b041087974566a0f547b5a0cabf91345fc522e9631a4e7be8e585c7374708b936a9d9862008128a1f4ce0d9219beda2e535c9851c8ee8b614735e02edacd5fb14398abe82ac4cd7bc965c9aa988f89cebf771af124f3a3b88afdc011c115fe5a097738defddbc85dd7ad63a71b3a3677ed90461c29481e81c57fb49902bdf93cd0d1fe70927498aaf601126fecc7425a47a2160acc701b964dd1099929e851f72ae06f30fa55763430c5bc44a90a7f8b2fa765cf052207386d81ce05bba1b83528087b4fb850ed4819dc0deed4cf0847231ceecb5f30acea0c9791a4c22ab9aa71e450e2ee26d5d2d29b7236d12f740bd3a98781303282e5adb02d2a8a12c9cd8f2bd98836bfb876b159c592e7180971da70e400d31279b74aac81550c493422ff80bd8d9f30ca1fc79e008519211d29630385a82cf7d555418f48e4bfcea2283a5ec1ea68ed146d8539670ee0f85a2d6ddb58168114b535d1d37f193e567051f0b4a4af504a40f0262749ea10c3c6cccbe10ed26c67406825ca77c3fded39f3c171fbc7353c255cfe42adaf96f2e4fae35953de5c4d57d8ed25e5b88cbaebc17372319bb84035a8372bfb668503c254ad3c67e01dc70463e3a7ad48ea5b8e99c942207baae3d659aec592aa80e52a2f42d730bba1afd73f06ed9096789836699c0eb90676661dc5955368cfb2fea0b9fa175421d7e920c79f5cd984b433e6260ede282bce8b13e9f3644f14e2ad41010dee1764363ea9f608375891bcff449e1d1da9c7dd3ca6668ce6688455a924d567ed3e9180725e994f601fe10f40a168c655dd963648582d2a1420b40cd3aa32c5b24ec7566d0fee9324d9e591dcfe0b6f7654cd6cec240ab12bdf2b12529c6ca31e4bd6543708cf48829abd5a9b57306a64430e5394093537325d9082d71c8d4f59c2c4b5c19e6c92de71887cf6a428928e417da229c8213db7d07e471589aa388d63568e5cf9c0a6f83cbc7b835ecbcce51a64bce624dc10474fc88320d27b2a105f4ac4c8659cd8625e95677a22fb014147c32f3959ce40195c7c5dbbf37e0bb319857692fc6b969fed92b703f6ca9a6a484e774e1e508c5ca1838f33be15cd74ad2e4dd5c3816ac26a0ab59ae36a0a893dcfb52486c3d315252d60c44668ba0be809f88927b3fe1e8b2bae0e5496b9b8cf2db755443135c296f011844b75114ed70dc8b92e05dd583fabc6d5a1395d9e3b84870fe3c04858b7c0fd9b4ed87b547627dfe6a36eb73381eb7446749bed60abea071e57cf6d4908b3de78c5bb34ef0c6f0629ea4bc47f171c5e240057eb10442bb1ca2e23a5faed5180d7241103eba5c392585f9af4bdd00ed4b767795fdd3db4a0ce4c20e7f0e24d80424f2aacdab887ccfd4e49a6880a4cb6bc1394ed26d79587e92563df8612f5874c750655541fa410871247f326d1e937497c66f03d4ed1c6ac3b3496920572957a58a406014a65167bb101f839a58bdf1ecd8858eeef5812242f7246fd6cebf0e0ca25413b45df7e8d638db063ab9ec5972ee27673125e6f164fbd0666ed3d294fc84eae0ddaa616d71de48e0e464a23f8aa5a533a7aa699dca2216a2d6d215908d7ae28740372c23006ecf8a0ea73bf42396bf5251b5463864c30541fb7d694991bdc882bf22c5c66b8a6308d2b18f480e08b10118543b85e56155fe53423f00857c60939d89a98c1b9c2487edf7e2e7fe2948857b811afb66310c6d3e9e26070230a97abb491eca99d95a282ad3de9d772b98eefe90b1bd533867c03188d24d24963eeb0ea8d562555b742500e8feb2c74079597d2c1ced9a850fec4a418fec0f4b5f45493dd2dc06ce12cd34f81f5f44524892166074b3a57c249470228acb29af798b838b42077c108d5a492d36513dccb6689fe7419d85ba4a70cdf095ab8163a9690f889f06c81e65cf3f8a540201a62b8f65c51f53428a9402f92d67ee20d78ce0069c77c5c5d0de4d53823bb3c72e2386644b89649f4d9011dcd4b3805aaf477dd2f14dd8a394a4fe04a66e5e830d4945758aa82a197ed69c67d3d9c3ff6f2d9e81f4efde663346e9f90faf99142b56545be60a97c81011aff3fdd1a7d575ee8fe7e97f853251a4447be5d29d40c116b4395bbb043790bdeaa358cb6ae92a7a99b5fef350520f706932077b12529357332db9c588449fbb22fa28e67103d77f33a5a641a2e749c0ecfd279d066395393310834ac7ae054d10f21cfc3451ef2ff42a832059a84fe4a5493b8e4c046871d704dc09d46dba08ee79a1a20da193220862e0ffc2b204fcb78f61652d61f0677e561bf352ba0187862658e1f98c42163035b72cda63621e2e6ba72f44c6a6666bd597becabcea30b50c028038561b31d7d45c345fad6a43cacbc92e266e82167893c9f2a2d473fb13d1d74b5ad37dee16ffe6f829f8525fcaf11a1354799492c538eb82a9f08cd62dbc0e902d03f6b2a68b78191b06879a10573fe1f54e94d830452e21e44847a3afb1e53f744b0943c5e70f22168eaa9990ac2290d9639a3b92ede174e8c1b80dd3ab7118009eb336f4ccd745d1146927991aed10d4aa4c5cfab4c0a1b7d3f3a70f7b233eaf470d1ff47c3f4dd4a0f82d67f4c0aa636feade2e94dc4073820000263e1b88b2e23343708fea3e6f3fe1df19c77854695e2aec9f348fde9a47b1f137091f4d7468c135a0bc28f7fa10dccebc7e35b8265bd4e42c90ba7ad25687f68e40e67248e43031e9f7179f2aeb3a4479e24263ce051c83d1cf15f9ca19e7eb11cb6164bf8a07fb160122d0bab13a433a9e25e95cf0fefd53ec1f3a3aa48c5548e85908443c0684a951b0a1588adeca29afe7c2574b378d16f214eca858969976e50ac04ca48602bb318306d578fd35a8462043c271945ec9408f293b855536f16475f690389138cd97ddbfeb1c0891f6d34b0a2c3be50792dac77f0df126192b96fc94f65a88cc44e43445d409783822f54db08f605dc15940374375655ee2c0b0c02b839dea74842d883ca282f269423da92ddb563976713a456272feeb04d942bdf96840dd6e92457622b5d4189eee6e9625a109a2045633f6f095ff6dfdc0c96a7a0a058bc91ebfc10413124b2d3fc9df3276a1561736b600fc0ce4e428ce1b944015612724e6b2cee8bbdf06af6a73308ed6bff1864131f4758acc38b06993702f65af073f330b08e99d9cb2bac0f0079dcefa92725a31108b6e42bb93d62c302028728d1f517326748a12ac61654013312edebafea6752425db597401077f918b27306fbb5ea048a9119dd520381b87ca6034db5661a91a87b077f2264e0573681e22ee8b930ae3e275958b46606b78e1d38b32c9017306289e1bad27fa1824c20b98a413a858724dc2200eef8ef351a99f1dd97d62759270fe5a90d604b345b9cc8e8d2e3348702686ec26842fc6539293a4adc82352e73df6b97b280a119d456cbe1996708571cb918e2cc5f29173ddd9f4e3aa5deaf034861322615b4b428214a9f4d6a710f4602beeb3fde036700dae305db659668159306dc04da889c0a4f7a7e5a2327a29fe96679af53eaf4ba68b4a9333dfed85db302593410ba76250820f2c8c6971d04b66a8873576189ffe3535066ede776cf08e71fdce2cd6a4d2cb36c9c10fd945dee7159cbeaf3d58ee8c263db3976dea735dadf32e088113dbf666b974b8225a73029f421bd635c7dab345a0057da7f78c3b0c2f023b7b2bc586599dedfa9489eb919b51556e1a5bf7339ff77d643771bdd32756f05404e9e1e22046970540358d8d06ec87a95fbd61e5a19620090ab77e17acf5421b1c5b49ed2c70f2ac67a8cb477ee19e1d57c22ca5ca8f62e6a7c8f730f060fd86c2ccf76bb47967c7e62792c7888c649f04792dd85e1", 0x1000}, {&(0x7f0000003700)="0fc83776f16e39d409e2fe85e7baee00bdf99472d590cbeac4ebf71ae99ac3bd6296abffe04555bce991945bc0703a1e390f198ed7b52c30adae9d901e82663327a7ddd204ac145511a68a56f5c59ed11ad5018cf951168416d558b82bcbd1af", 0x60}, {&(0x7f0000003780)="ed09b1fc606421f6cce8d835560be905788101058b41e102ed2c698d913a5d8adb8b5be2318480665e05d4054f178a41c71aed77d94424eac5a94415834631eba6535159c6", 0x45}, {&(0x7f0000003800)="fa58337a35b461dacd0934ba8478f1bebdf4a26bd86b8302fc7f6057f2d3a9d2cb7cb94d43d293afced3d13a2f365ad93fe2ed52fe57265b28036e6f496ebb64229cdb559ee37cb68f59b173fefffe", 0x4f}], 0x9, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write$cgroup_subtree(r0, &(0x7f00000002c0)={[{0x2d, 'memory', 0x20}, {0x2f, 'cpu', 0x20}, {0x2d, 'cpu', 0x20}, {0x2d, 'pids', 0x20}, {0x2d, 'io', 0x20}, {0x2b, 'memory', 0x20}]}, 0x24) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) [ 182.099161] device bcsf0 entered promiscuous mode [ 182.105482] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 182.127289] device bcsf0 left promiscuous mode 2018/03/30 07:41:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd", 0x30) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 182.173217] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(0xffffffffffffffff, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) accept(r2, 0x0, &(0x7f00000000c0)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000040)='syscall\x00') ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/03/30 07:41:47 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000380), &(0x7f00000003c0)=0x8) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5080000016000000fddbdf25023f1000ccf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000002c0)=""/48) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x4e20, @multicast1=0xe0000001}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = accept$packet(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000480)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000400)={@empty, 0x47, r4}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r5 = syz_open_pts(r2, 0x11) ioctl$int_in(r5, 0x5452, &(0x7f0000f27ff8)=0x81) write(r5, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) dup2(r5, r2) r6 = fcntl$getown(r5, 0x9) fcntl$setown(r3, 0x8, r6) 2018/03/30 07:41:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r5 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r6 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r6, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r5, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x0, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:47 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 182.262296] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 182.278677] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:47 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x5, 0x9, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@generic={0x1ff, 0x9, 0x4, 0x9}, @jmp={0x5, 0x10001, 0x6, 0x3, 0xf, 0x0, 0xfffffffffffffff0}, @map={0x18, 0x9, 0x1, 0x0, r0}], {0x95}}, &(0x7f00000004c0)='GPL\x00', 0x3, 0x65, &(0x7f0000000500)=""/101, 0x41f00, 0x1}, 0x48) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x4e24, 0x3f, @empty, 0x7f}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r0, 0x80003) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) r4 = gettid() capget(&(0x7f00000000c0)={0x39980732, r4}, &(0x7f0000000380)={0x0, 0xffffffff00000001, 0x401, 0x8, 0xfffffffffffffe00, 0x9}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000002c0)=0x7) connect$ipx(r0, &(0x7f0000000400)={0x4, 0x3, 0xfff, "68e7e826629d", 0x1}, 0x10) dup2(r3, r2) 2018/03/30 07:41:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r5 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r6 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r6, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r5, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000400)={{0xa, 0x4e20, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, {0xa, 0x4e20, 0x7, @loopback={0x0, 0x1}, 0x3}, 0x228b7c85, [0x3, 0x80, 0x5, 0x8, 0x80000000, 0x9, 0x338, 0x71]}, 0x5c) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) [ 182.441225] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 182.458225] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 182.468881] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:47 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x200) 2018/03/30 07:41:47 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00'}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r3, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)=ANY=[@ANYBLOB="5000000016000000fddb5f25023f10008cf0949d66fe4e3aeda73f57ec98c7070cd279ae4a10ad892f80723fa256655dcbd01f1cf5ba2d52d707f3662b656f001808ceacc52afe0000cbdc37926fc759cfdfc2b0bc3f56f0604c20e01b07e5f9e9bd78968ffae84b98c43cc7947c5ca8e97bd0f28a7c41e25cba063310a32a463d74994e402dee6f90a1da62c832e0e325f41d1bec6359d9420faf59c7c343449fe932de3affe5e64e0ffe47173dc895e3b9c94a58c4190bb1e615ab86ab9af47f39897b4a54141ee9ee4a56be838a529fc62cfa50bba373ce2cd4ed13e61fe96f9be9e34fe4d94c24c13b22041cf3cd30b63dec6a2c98f4ea3a266264bb5875430cc04dd73bad40f19f5cdd83b075633a692d7c48610b3b413d5829af420bc07db92e75de586aa51c704a46a107e35815ff7b94a9701c2941b9e5f345"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x0, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r5 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r6 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r6, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r5, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xec, r3, 0x0, 0x70bd25, 0x25dfdbfe, {0x6}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xe}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1=0xe0000001}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x63}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x71}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x8}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x8165487465c7b1ad}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1a}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x40001}, 0x20004000) 2018/03/30 07:41:47 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f6141538e7c1ed8b611c24b1a05fd6178fc22cc16dbeaa3113c9df2212f7de18b5915e0b23383281e7888cbb1475c0c836fe1f403b7f3099d36c6792fa025f270a842757961e5a0c2d93be6388fcc7cb999ca17ff54e37d10a685657c8acb98c4902514308e3d50d9501b3851"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000002c0), &(0x7f0000000380)=0x4) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x200) [ 182.741913] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 182.749117] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 182.762647] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:47 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000400)={0x9, 0x0, [{0xd, 0x1, 0x3, 0x2, 0x3f, 0x6, 0xea}, {0x80000007, 0x4, 0x1, 0x5, 0x1, 0x0, 0x4}, {0x80000019, 0x90, 0x3, 0x2, 0x9, 0x3f}, {0x8000000f, 0x7fffffff, 0x1, 0x400, 0x1000, 0x3f, 0xc7}, {0x80000003, 0x4, 0x1, 0x0, 0x5, 0x7ff, 0x3}, {0x8000000d, 0x6, 0x6, 0xff, 0x0, 0x5}, {0xc0000000, 0x8000, 0x1, 0x9, 0x36, 0x7f, 0x3ff}, {0x40000007, 0x60ab07ca, 0x1, 0x3, 0x6, 0x2, 0x1f}, {0xb, 0x0, 0x2, 0x259c093f, 0xfff, 0x66f, 0x1ff}]}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00'}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r3, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r5 = accept$unix(r4, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r6 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r6, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r5, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) close(r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000036c0)=ANY=[@ANYRES64=r0, @ANYBLOB="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", @ANYRES32=r2], &(0x7f00000000c0)=0x3) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000040)=0x8, 0x4) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000180)=0x3) r3 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000200)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) r5 = getegid() syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x6000, r4, r5, 0x3, 0x2000000) 2018/03/30 07:41:47 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x0, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:47 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x200) 2018/03/30 07:41:48 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:48 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000002c0)={0x8000000000000000, 0x50f7c9f2}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:48 executing program 6: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x200) 2018/03/30 07:41:48 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x0, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:48 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r5 = accept$unix(r4, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r6 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r6, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r5, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:48 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x100000007) dup2(r3, r2) [ 182.968341] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 182.987200] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 183.005155] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x4, 0x0, 0x2, 0x9}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000100)={0x7f, r2, 0x10003, 0x5}) r3 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000200)) getpgid(0xffffffffffffffff) r4 = getpgid(0x0) syz_open_procfs(r4, &(0x7f0000000240)='clear_refs\x00') writev(r3, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/03/30 07:41:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x0, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00'}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r3, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:48 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x0, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 183.144227] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 183.211600] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 183.230795] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r5 = accept$unix(r4, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r6 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r6, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r5, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:48 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') bind$rds(r2, &(0x7f0000000100)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x400000, 0x0) 2018/03/30 07:41:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x0, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:48 executing program 6: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x200) 2018/03/30 07:41:48 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x0, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r3, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:48 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)=ANY=[@ANYBLOB="5000000016000000fddbdf250a3f10008cf0949d674a10ad892fa0723f927cb24238a229859e66fbfb9fa1bca05ea570ad2894fcfb827ade456c2daef338adad2e88943463158e3246f215a158c64dea4db99ad88d7865f3ed55fbf57d5eb06351f362f848d7fc4f8353c42656c6e22898bbba1951d70aa08f9fbd26e048"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000380)=0x1) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x5) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000002c0), &(0x7f0000000340)=0x8) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:48 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000002c0)=ANY=[@ANYBLOB="500084d216000000fddbdf25023f10008cf0949d664a10ad892fa0ebb1691348723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000003c0)={0xa, &(0x7f0000000440)=[{0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f00000004c0)={r3, 0x1c}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x2}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @remote}, &(0x7f0000000380)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000400)={@dev={0xfe, 0x80, [], 0x16}, 0x200047, r5}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r6 = syz_open_pts(r4, 0x11) ioctl$int_in(r6, 0x5452, &(0x7f0000f27ff8)=0x81) write(r6, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x3) dup2(r0, r2) 2018/03/30 07:41:48 executing program 6: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x200) 2018/03/30 07:41:48 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:48 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00'}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r2, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r3, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 183.394445] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r4 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r5 = accept$unix(r4, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r6 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r6, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r5, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r3, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:48 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000400)={r1, 0x264, 0x1, 0x3ff, 0x48, 0x9, 0xf704, 0x8, {r1, @in={{0x2, 0x4e20, @broadcast=0xffffffff}}, 0x7, 0x5e, 0x1, 0x6, 0x7}}, &(0x7f00000002c0)=0xb0) shmget$private(0x0, 0x4000, 0x54001827, &(0x7f0000ffb000/0x4000)=nil) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000380)=0x3800, 0x4) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$sock_netrom_SIOCGSTAMP(r0, 0x8906, &(0x7f00000004c0)) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000500)={@mcast1={0xff, 0x1, [], 0x1}, 0x7, 0x0, 0xff, 0x2, 0x6, 0x10001, 0xffffffffffffffff}, 0x20) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 183.453720] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 183.460877] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 183.561867] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 183.579763] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 183.928323] IPVS: ftp: loaded support on port[0] = 21 [ 184.056237] bond0 (unregistering): Released all slaves [ 184.468647] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 185.139622] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 185.145720] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.189558] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 185.233382] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 185.239523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.246916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/03/30 07:41:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB="50000000160000005a3261f5ad892fa0723fdc719a60b9ab0594292ce4b82a86cf2e8283500817474ac1d52f0000000000000000210e0000"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000002c0)={'ip6_vti0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r3, 0x11) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) ppoll(&(0x7f0000000400)=[{r0, 0x1070}, {r4, 0x400}, {r4, 0x1022}, {r0, 0xc1}, {r3, 0x20}, {r4, 0x8002}, {r0, 0x5101}, {r4, 0x200}, {r2, 0x40}, {r3, 0x20}], 0xa, &(0x7f00000004c0)={r5, r6+30000000}, &(0x7f0000000500)={0xfff}, 0x8) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000680)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000600)={{0xa, 0x4e24, 0x3, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x3}, {0xa, 0x4e24, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x4101}, 0x80000000, [0x4, 0x1f346ffb, 0x3, 0x67fe, 0x2, 0x4, 0x200, 0x7b8]}, 0x5c) ioctl$TCFLSH(r4, 0x540b, 0x0) dup2(r4, r3) 2018/03/30 07:41:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x0, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 6: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x200) 2018/03/30 07:41:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r4 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r5 = accept$unix(r4, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r6 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r6, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r5, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00'}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r2, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r3, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r3, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 0 (fault-call:14 fault-nth:0): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 6: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x200) 2018/03/30 07:41:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r3, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(0xffffffffffffffff, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000380)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r1, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r2, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000400)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r3, 0x11) keyctl$join(0x1, &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) dup2(r4, r3) [ 185.422166] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 185.461536] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:50 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x0, 0x4, 0x7, 0x1}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5004000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00'}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r2, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r3, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r4 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r5 = accept$unix(r4, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r6 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r6, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r5, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 6: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x200) [ 185.503214] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(0xffffffffffffffff, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="2000000016000000fddbdf2a023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(0xffffffffffffffff, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={r1, 0x3}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x1, 0x53d7, 0x400, 0x81, 0x6973a2db, 0xfffffffffffff5f9, 0x7, 0xfff, 0xe7, 0x3, 0x4, 0x20}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 185.599011] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 185.632896] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r3, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 185.680816] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:50 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) write$cgroup_pid(r0, &(0x7f00000002c0)={[0x34, 0x31, 0x39]}, 0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000), 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r2, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r3, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000400)={0x8, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}) dup2(r3, r2) [ 185.812720] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 185.834741] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:50 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0xfffffffffffffffd, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f0000000400)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) ioctl$VT_RELDISP(r0, 0x5605) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r3, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000), 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:50 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r2, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r3, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 185.861304] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) syz_extract_tcp_res(&(0x7f00000002c0)={0x41424344}, 0x1, 0xff) syz_extract_tcp_res$synack(&(0x7f0000000380)={0x41424344}, 0x1, 0x0) write$tun(r0, &(0x7f0000000400)={@pi={0x0, 0x893f}, @void, @ipv4={{0xb, 0x4, 0x27, 0x9, 0xbe, 0x65, 0x800000000000000, 0x3, 0x89, 0x0, @multicast1=0xe0000001, @loopback=0x7f000001, {[@rr={0x7, 0x7, 0x5, [@remote={0xac, 0x14, 0x14, 0xbb}]}, @ssrr={0x89, 0xb, 0x9dce, [@multicast1=0xe0000001, @empty]}, @ra={0x94, 0x6, 0x401}]}}, @tcp={{0x4e21, 0x4e23, r4, r5, 0x80000001, 0x0, 0x24, 0x9, 0xffffffffffffffff, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x2}, @fastopen={0x22, 0x12, "ba1bfbb83688c39daa7f47570d5842f7"}, @sack={0x5, 0x2a, [0x7f, 0x9, 0x2, 0x4, 0x1, 0x7fff, 0x9, 0xd27, 0x3, 0x1f]}, @mss={0x2, 0x4, 0x7ff}, @mss={0x2, 0x4, 0x1}, @exp_smc={0xfe, 0x6, 0xe2d4c3d9}, @exp_fastopen={0xfe, 0x7, 0xf989, "66ce8f"}, @mss={0x2, 0x4, 0x8001}, @sack={0x5, 0x16, [0x1f, 0x1, 0x7, 0x0, 0x0]}, @mss={0x2, 0x4, 0x6e6}]}}, {"06bc"}}}}, 0xc2) dup2(r3, r2) 2018/03/30 07:41:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000), 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000380)=0x14) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) close(r0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) socketpair$inet(0x2, 0x80001, 0x7fff, &(0x7f00000002c0)) write(r3, &(0x7f0000fd6000)='Z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) socket$l2tp(0x18, 0x1, 0x1) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r2, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r3, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 185.980562] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 186.004082] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 186.060306] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) r4 = dup2(r3, r2) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000600)={'broute\x00', 0x0, 0x4, 0xf9, [], 0x6, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000480)=""/249}, &(0x7f00000002c0)=0x78) 2018/03/30 07:41:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYRES64], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='cgroup\x00') perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2, 0x0, 0x80000000, 0x0, 0x6b5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x29, 0x2, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001580)=[{&(0x7f0000000540)={0x10, 0x0, 0x0, 0x70bd2c}, 0x10}], 0x1}, 0x0) sendfile(r5, r4, &(0x7f0000000000), 0x1366) dup2(r3, r2) 2018/03/30 07:41:51 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r2, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r3, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 186.121167] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 186.148719] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000004c0)={0x7, {{0x2, 0x4e24}}}, 0x88) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000002c0)=@req={0xffff, 0x9, 0x3, 0x100}, 0x10) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000400)={r1, @in={{0x2, 0x4e22, @loopback=0x7f000001}}}, 0xffffffffffffff7e) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) ioctl$sock_ifreq(r0, 0x891c, &(0x7f00000002c0)={'ifb0\x00', @ifru_hwaddr}) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r3, 0x11) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) flistxattr(r3, &(0x7f0000000400)=""/79, 0x4f) signalfd4(r2, &(0x7f0000000380), 0x8, 0x800) dup2(r4, r3) [ 186.292153] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 186.312520] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 186.324260] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)) dup2(r3, r2) 2018/03/30 07:41:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="50000000169d664a10ad89a0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r2, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r3, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0xfffffffffffffea9) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000480)={r1, @in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x3, 0x1, 0x1, 0x5, 0x18}, &(0x7f0000000540)=0x98) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f00000002c0)=""/10, &(0x7f0000000380)=0xa) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000400)={{0xffffffffffffff00, 0x7fff}, {0x2, 0x6}, 0x3, 0x7, 0xc9}) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)) dup2(r3, r2) 2018/03/30 07:41:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) fcntl$setflags(r0, 0x2, 0x1) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:51 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r2, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r3, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)) dup2(r3, r2) 2018/03/30 07:41:51 executing program 2: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r3, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000380)) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x7ff, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x3, 0x7}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000004c0)={0x0, 0x1}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000400)={r1, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7, 0xa157}, &(0x7f0000000540)=0xfffffffffffffe41) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x8, 0x5dd4b48e0a6bee00) recvfrom$ipx(r3, &(0x7f0000000180)=""/23, 0x17, 0x10000, &(0x7f00000001c0)={0x4, 0x6, 0x9, "7eb4a961c185", 0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r5 = syz_open_pts(r4, 0x11) ioctl$int_in(r5, 0x5452, &(0x7f0000f27ff8)=0x81) write(r5, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) dup2(r5, r4) [ 186.474794] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 186.482463] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 186.501191] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(0xffffffffffffffff, r2) 2018/03/30 07:41:51 executing program 2: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r3, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:51 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'dummy0\x00', r1}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000700)=ANY=[@ANYBLOB="50c9002000fddbdf25033ffdff8cf0949d664a10ad892f85fb6485b818f84623f56de9adb3e8f7aad1e2934e2fe24fd896b5199eae79e5c091aa1220d071219d1615c744a4e5719e7e3140d2b8dcd74ebd84f721601ed77194364f35a1824a94fea9958a8818bd5c2980b73746733cfb661513b687515eb5b9d1a6c0424d300fbc86c0bb30b7d94fc0935a8cd6ee343c208b0cb3c279f58be7b180840b378ee1377ae51334db505e97846f3a49222b0a8684d7da87f57e6e35aa8985d3dd150dcceb06a91b51a3c62398fecd846b9642066b01d9f835046294f08422e94ecfe83f96a317e46f45bc65c440814e3bd27724b32dfa"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000380)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x450) r4 = syz_open_pts(r3, 0x11) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) dup2(r4, r3) 2018/03/30 07:41:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)=ANY=[@ANYBLOB="62000000ee000000fdb9df25023f10008cf0949d664a10ad892fa0723f63183953b73e4db9a9e145032fb9d2b031d6fd913f0590810a2c35e8bef1bad958d2c7374e29ad06b0dae352b7ee51b5e249a09677e9410b3ba571b79d2c1d575ff62f800ca1116d5ba3427006d67423f4c7c804d531aa1368d8b30b620a57a7441946a8d8104094a1915a0f969a2ad33766cfb8401542d787fac556c7751ff3c8ea2236f5e03357229e60576ac52d9a354e4074475caa"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r4 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r5 = accept$unix(r4, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r6 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r6, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r5, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 186.602193] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 186.639902] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(0xffffffffffffffff, r2) 2018/03/30 07:41:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000017000000fddbdfd4023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) ustat(0x25, &(0x7f00000002c0)) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000380)={0x100000000, 0x7f, 0x10001, 0x800, 0x0, 0x3, 0x9, 0x7, 0x6, 0x7ff, 0x1ff, 0xffffffffffff8001}) sendto$ax25(r0, &(0x7f0000000400)="42bdd4e1548b55606dcbde990364b3145444fd9ce246f73723421b56c90e20b48ead4b24df8f62f0e488ae18b9f4c195fbca7dea8252ebf92bc8267d4dafd3f923b0bdbd213fabab89d69295f24ff7f116d77b60927743a3f78d91815914e2a6cbdb82a7c4f0f82348dd381cb3b666d0fb8c40865372a4a8ce897d30e64a54705da8d23e8cb9399daa8080d8d4d70bed80304ba496fa279fb750106ba81187fee92d07a3fa5ae95bf1b156e7217ab8fa6c4ef3e0d0d94809b6a31030e16612a4026507dca5f2e6d3138191cfd98c12cb091bf9527ac830f5747191215017fed6411785dd0a78be79a133fc4a987f5cd6c068", 0xf2, 0x20004011, 0x0, 0x0) ioctl$TIOCNXCL(r2, 0x540d) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000b250be85dd4df2c4701a19000016000000f9dbdf25023f10008cf0"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x103000, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:51 executing program 2: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r3, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 186.734828] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:51 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(0xffffffffffffffff, r2) 2018/03/30 07:41:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 186.802440] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 186.816861] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) r2 = getpgrp(0x0) fcntl$setownex(r0, 0xf, &(0x7f00000002c0)={0x0, r2}) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r3, 0x11) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) dup2(r4, r3) 2018/03/30 07:41:52 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r4 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r5 = accept$unix(r4, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r6 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r6, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r5, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5454, &(0x7f0000f27ff8)=0x10081) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:52 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, 0xffffffffffffffff) 2018/03/30 07:41:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 186.868914] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 186.908692] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000002c0)={0x1ff, 0x0, 0x10001, 0x8}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000340)={0x3, r4, 0x10001, 0x7ff}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:52 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, 0xffffffffffffffff) 2018/03/30 07:41:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) [ 187.029291] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 187.051332] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/l2cap\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:52 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, 0xffffffffffffffff) 2018/03/30 07:41:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r4 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r5 = accept$unix(r4, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r6 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r6, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r5, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:52 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723fc199d98d5839c94ead407f612c7d0b2d9635dd959bd2338cf613ab60a056547d73269b4bfad3bb3fd7961fd177df8c32ed0f1569c200701cbb9d8b0d29c437895eda8a613c5db406322d2c1a633e2345d980750e49a15b403f880a096960296ba04cd1dbe4c45c900f6d1882"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 187.075191] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008c7094664a10af4666b898e6cd49723f20"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000500)={r1, 0x100000001}, 0x5eec2e1fd5f39065) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) mq_timedreceive(r0, &(0x7f0000000400)=""/86, 0x56, 0xf4, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000340)={r1, 0x4}, 0x8) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) r3 = getpid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f00000004c0)={0xffffffff}) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000000c0)={0x4, 0x1c4d, 0x2, 0xfff, 0x8021, 0x96, 0xfffffffffffffffa, 0x3, 0x100, 0x7ff}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r2, 0x11) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000480)=0x3) dup2(r4, r2) 2018/03/30 07:41:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:52 executing program 1 (fault-call:10 fault-nth:0): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 187.218073] FAULT_INJECTION: forcing a failure. [ 187.218073] name failslab, interval 1, probability 0, space 0, times 0 [ 187.229423] CPU: 0 PID: 434 Comm: syz-executor1 Not tainted 4.16.0-rc7+ #6 [ 187.236420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.245763] Call Trace: [ 187.248348] dump_stack+0x194/0x24d [ 187.251983] ? arch_local_irq_restore+0x53/0x53 [ 187.256654] ? lock_release+0xa40/0xa40 [ 187.260623] ? check_same_owner+0x320/0x320 [ 187.264946] should_fail+0x8c0/0xa40 [ 187.268661] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 187.273754] ? __might_fault+0x188/0x1d0 [ 187.277807] ? pty_unix98_ioctl+0x1bc/0x560 [ 187.282120] ? pty_write_room+0xd0/0xd0 [ 187.286091] ? tty_ioctl+0x65d/0x1610 [ 187.289893] ? find_held_lock+0x35/0x1d0 [ 187.293958] ? check_same_owner+0x320/0x320 [ 187.296409] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 187.298257] ? iterate_fd+0x3f0/0x3f0 [ 187.298272] ? rcu_note_context_switch+0x710/0x710 [ 187.298298] should_failslab+0xec/0x120 [ 187.298315] kmem_cache_alloc+0x47/0x760 [ 187.321996] ? do_vfs_ioctl+0x486/0x1520 [ 187.326074] getname_flags+0xcb/0x580 [ 187.329029] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 187.329875] getname+0x19/0x20 [ 187.329886] do_sys_open+0x2e7/0x6d0 [ 187.343732] ? filp_open+0x70/0x70 [ 187.347269] ? security_file_ioctl+0x89/0xb0 [ 187.351670] SyS_open+0x2d/0x40 [ 187.354921] ? do_sys_open+0x6d0/0x6d0 [ 187.358789] do_syscall_64+0x281/0x940 [ 187.362649] ? __do_page_fault+0xc90/0xc90 [ 187.366857] ? _raw_spin_unlock_irq+0x27/0x70 [ 187.371324] ? finish_task_switch+0x1c1/0x7e0 [ 187.375792] ? syscall_return_slowpath+0x550/0x550 [ 187.380698] ? syscall_return_slowpath+0x2ac/0x550 [ 187.385601] ? prepare_exit_to_usermode+0x350/0x350 [ 187.390594] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 187.395932] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 187.400755] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 187.405921] RIP: 0033:0x40eb91 [ 187.409089] RSP: 002b:00007f7a5b727bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 2018/03/30 07:41:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) [ 187.416769] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000040eb91 [ 187.424012] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f7a5b727bd0 [ 187.431261] RBP: 000000000072bea0 R08: 0000000000000000 R09: 000000000000000a [ 187.438503] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000015 [ 187.445743] R13: 0000000000000684 R14: 00000000006fbd00 R15: 0000000000000000 [ 187.456922] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:52 executing program 1 (fault-call:10 fault-nth:1): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) r2 = getpid() perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r3, 0x11) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) dup2(r4, r3) 2018/03/30 07:41:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x201}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYRES32=r0], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) r4 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x7, r4) uname(&(0x7f0000000400)=""/253) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r5 = syz_open_pts(r3, 0x11) ioctl$int_in(r5, 0x5452, &(0x7f0000f27ff8)=0x81) write(r5, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) dup2(r5, r2) 2018/03/30 07:41:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x0) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:52 executing program 7: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r2, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r3, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 187.528878] FAULT_INJECTION: forcing a failure. [ 187.528878] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 187.540718] CPU: 1 PID: 457 Comm: syz-executor1 Not tainted 4.16.0-rc7+ #6 [ 187.547732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.557086] Call Trace: [ 187.559695] dump_stack+0x194/0x24d [ 187.563340] ? arch_local_irq_restore+0x53/0x53 [ 187.568010] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 187.573219] should_fail+0x8c0/0xa40 2018/03/30 07:41:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) [ 187.576930] ? trace_hardirqs_off+0x10/0x10 [ 187.581262] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 187.586367] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 187.591555] ? find_held_lock+0x35/0x1d0 [ 187.595615] ? __might_fault+0x110/0x1d0 [ 187.599671] ? lock_downgrade+0x980/0x980 [ 187.603819] ? lock_release+0xa40/0xa40 [ 187.607789] ? check_same_owner+0x320/0x320 [ 187.612102] ? find_held_lock+0x35/0x1d0 [ 187.616161] ? trace_hardirqs_off+0x10/0x10 [ 187.620483] ? should_fail+0x23b/0xa40 [ 187.624385] __alloc_pages_nodemask+0x327/0xdd0 [ 187.629059] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 187.634085] ? find_held_lock+0x35/0x1d0 [ 187.637415] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 187.638172] ? check_same_owner+0x320/0x320 [ 187.649450] ? iterate_fd+0x3f0/0x3f0 [ 187.653250] cache_grow_begin+0x72/0x640 [ 187.657305] kmem_cache_alloc+0x400/0x760 [ 187.661431] ? do_vfs_ioctl+0x486/0x1520 [ 187.665477] getname_flags+0xcb/0x580 [ 187.669263] getname+0x19/0x20 [ 187.672431] do_sys_open+0x2e7/0x6d0 [ 187.676130] ? filp_open+0x70/0x70 2018/03/30 07:41:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) [ 187.679664] ? security_file_ioctl+0x89/0xb0 [ 187.684078] SyS_open+0x2d/0x40 [ 187.687348] ? do_sys_open+0x6d0/0x6d0 [ 187.691231] do_syscall_64+0x281/0x940 [ 187.695109] ? __do_page_fault+0xc90/0xc90 [ 187.699336] ? _raw_spin_unlock_irq+0x27/0x70 [ 187.703828] ? finish_task_switch+0x1c1/0x7e0 [ 187.708322] ? syscall_return_slowpath+0x550/0x550 [ 187.713251] ? syscall_return_slowpath+0x2ac/0x550 [ 187.714622] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) [ 187.718173] ? prepare_exit_to_usermode+0x350/0x350 [ 187.718189] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 187.718209] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 187.718229] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 187.745516] RIP: 0033:0x40eb91 [ 187.748683] RSP: 002b:00007f7a5b727bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 187.756380] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000040eb91 [ 187.763642] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f7a5b727bd0 [ 187.770905] RBP: 000000000072bea0 R08: 0000000000000000 R09: 000000000000000a 2018/03/30 07:41:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000400)=0x400000) dup2(r3, r2) 2018/03/30 07:41:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="500000000e1015f49adbdf25023f100010b88901000000000000100000"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) write$rdma_cm(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="00000000180000fa030000cb104b9600", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES32=0xffffffff], @ANYBLOB="06010f0000000000"], 0x20) write$rdma_cm(r0, &(0x7f0000000440)=@set_option={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) ftruncate(r0, 0x1) write(r3, &(0x7f0000fd6000)='z', 0x1) dup3(r2, r3, 0x80000) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:52 executing program 1 (fault-call:10 fault-nth:2): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 187.778167] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000015 [ 187.785423] R13: 0000000000000684 R14: 00000000006fbd00 R15: 0000000000000001 [ 187.857231] FAULT_INJECTION: forcing a failure. [ 187.857231] name failslab, interval 1, probability 0, space 0, times 0 [ 187.868509] CPU: 1 PID: 508 Comm: syz-executor1 Not tainted 4.16.0-rc7+ #6 [ 187.875515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.884847] Call Trace: [ 187.887425] dump_stack+0x194/0x24d [ 187.891040] ? arch_local_irq_restore+0x53/0x53 [ 187.895687] ? task_dump_owner+0x28f/0x4d0 [ 187.899906] should_fail+0x8c0/0xa40 [ 187.903601] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 187.908675] ? print_irqtrace_events+0x270/0x270 [ 187.913412] ? trace_hardirqs_off+0x10/0x10 [ 187.917719] ? find_held_lock+0x35/0x1d0 [ 187.921779] ? check_same_owner+0x320/0x320 [ 187.926078] ? rcu_note_context_switch+0x710/0x710 [ 187.930982] ? find_held_lock+0x35/0x1d0 [ 187.935035] should_failslab+0xec/0x120 [ 187.938990] kmem_cache_alloc+0x47/0x760 [ 187.943038] ? trace_hardirqs_off+0x10/0x10 [ 187.947342] get_empty_filp+0xfb/0x4f0 [ 187.951221] ? proc_nr_files+0x60/0x60 [ 187.955083] ? rcutorture_record_progress+0x10/0x10 [ 187.960083] ? __lock_is_held+0xb6/0x140 [ 187.964119] ? trace_hardirqs_off+0x10/0x10 [ 187.968423] ? unwind_get_return_address+0x61/0xa0 [ 187.973331] path_openat+0xed/0x3530 [ 187.977031] ? find_held_lock+0x35/0x1d0 [ 187.981075] ? path_lookupat+0xba0/0xba0 [ 187.985111] ? lock_downgrade+0x980/0x980 [ 187.989232] ? do_sys_open+0x2e7/0x6d0 [ 187.993095] ? lock_release+0xa40/0xa40 [ 187.997048] ? find_held_lock+0x35/0x1d0 [ 188.001087] ? do_raw_spin_trylock+0x190/0x190 [ 188.005645] ? __lock_is_held+0xb6/0x140 [ 188.009689] ? _raw_spin_unlock+0x22/0x30 [ 188.013814] ? __alloc_fd+0x29b/0x750 [ 188.017605] do_filp_open+0x25b/0x3b0 [ 188.021381] ? may_open_dev+0xe0/0xe0 [ 188.025158] ? strncpy_from_user+0x323/0x430 [ 188.029546] ? mpi_resize+0x200/0x200 [ 188.033320] ? do_vfs_ioctl+0x486/0x1520 [ 188.037359] ? get_unused_fd_flags+0x121/0x190 [ 188.041918] ? __alloc_fd+0x750/0x750 [ 188.045693] ? getname_flags+0x256/0x580 [ 188.049736] do_sys_open+0x502/0x6d0 [ 188.053423] ? do_sys_open+0x502/0x6d0 [ 188.057289] ? filp_open+0x70/0x70 [ 188.060806] ? security_file_ioctl+0x89/0xb0 [ 188.065194] SyS_open+0x2d/0x40 [ 188.068445] ? do_sys_open+0x6d0/0x6d0 [ 188.072310] do_syscall_64+0x281/0x940 [ 188.076173] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 188.081686] ? syscall_return_slowpath+0x550/0x550 [ 188.086591] ? syscall_return_slowpath+0x2ac/0x550 [ 188.091500] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 188.096846] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 188.101670] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/30 07:41:53 executing program 7: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r2, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r3, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:53 executing program 1 (fault-call:10 fault-nth:3): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x0) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:53 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000002c0)={0x2}) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016010000fddbdf25023f10008cf0949d664a20ad892ba0563f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r0, &(0x7f0000000380)="91b3ac813a25b20f8f2b2661b88521027636aa4f7884c6", 0x17) syz_open_pts(r0, 0x400000) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:53 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x28008123}, 0x0, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x1) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000300)={0x3ff, 0x5, 0x8, 0x9, 0x3, 0x400, 0x8001, 0x4, 0x6, 0x5, 0x8, 0x1}) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:53 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000), 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) [ 188.106832] RIP: 0033:0x40eb91 [ 188.109994] RSP: 002b:00007f7a5b727bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 188.117683] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000040eb91 [ 188.124925] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f7a5b727bd0 [ 188.132171] RBP: 000000000072bea0 R08: 0000000000000000 R09: 000000000000000a [ 188.139412] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000015 [ 188.146653] R13: 0000000000000684 R14: 00000000006fbd00 R15: 0000000000000002 [ 188.229469] FAULT_INJECTION: forcing a failure. [ 188.229469] name failslab, interval 1, probability 0, space 0, times 0 [ 188.240811] CPU: 0 PID: 532 Comm: syz-executor1 Not tainted 4.16.0-rc7+ #6 [ 188.247823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.257170] Call Trace: [ 188.259763] dump_stack+0x194/0x24d [ 188.263405] ? arch_local_irq_restore+0x53/0x53 [ 188.268096] should_fail+0x8c0/0xa40 [ 188.271820] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 188.276936] ? kobj_lookup+0x29c/0x410 [ 188.280830] ? find_held_lock+0x35/0x1d0 [ 188.284921] ? check_same_owner+0x320/0x320 [ 188.289249] ? rcu_note_context_switch+0x710/0x710 [ 188.294188] should_failslab+0xec/0x120 [ 188.298166] kmem_cache_alloc_trace+0x4b/0x740 [ 188.302749] ? chrdev_open+0x581/0x730 [ 188.306628] ? lock_downgrade+0x980/0x980 [ 188.310762] tty_open+0x141/0xaa0 [ 188.314200] ? tty_init_dev+0x4b0/0x4b0 [ 188.318147] ? mount_fs+0x2d0/0x2d0 [ 188.321758] ? tty_init_dev+0x4b0/0x4b0 [ 188.325707] chrdev_open+0x257/0x730 [ 188.329400] ? cdev_put.part.1+0x50/0x50 [ 188.333435] ? fsnotify_first_mark+0x2b0/0x2b0 [ 188.337997] ? _copy_to_user+0xc0/0xc0 [ 188.341873] ? security_file_open+0x89/0x190 [ 188.346260] do_dentry_open+0x667/0xd40 [ 188.350214] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 188.355117] ? cdev_put.part.1+0x50/0x50 [ 188.359160] vfs_open+0x107/0x220 [ 188.362594] path_openat+0x1151/0x3530 [ 188.366472] ? path_lookupat+0xba0/0xba0 [ 188.370513] ? lock_downgrade+0x980/0x980 [ 188.374633] ? do_sys_open+0x2e7/0x6d0 [ 188.378498] ? lock_release+0xa40/0xa40 [ 188.382447] ? find_held_lock+0x35/0x1d0 [ 188.386489] ? do_raw_spin_trylock+0x190/0x190 [ 188.391048] ? __lock_is_held+0xb6/0x140 [ 188.395093] ? _raw_spin_unlock+0x22/0x30 [ 188.399214] ? __alloc_fd+0x29b/0x750 [ 188.403003] do_filp_open+0x25b/0x3b0 [ 188.406784] ? may_open_dev+0xe0/0xe0 [ 188.410569] ? mpi_resize+0x200/0x200 [ 188.414342] ? do_vfs_ioctl+0x486/0x1520 [ 188.418384] ? get_unused_fd_flags+0x121/0x190 [ 188.422940] ? __alloc_fd+0x750/0x750 [ 188.426715] ? getname_flags+0x256/0x580 [ 188.430756] do_sys_open+0x502/0x6d0 [ 188.434443] ? do_sys_open+0x502/0x6d0 [ 188.438309] ? filp_open+0x70/0x70 [ 188.441824] ? security_file_ioctl+0x89/0xb0 [ 188.446216] SyS_open+0x2d/0x40 [ 188.449470] ? do_sys_open+0x6d0/0x6d0 [ 188.453334] do_syscall_64+0x281/0x940 [ 188.457195] ? __do_page_fault+0xc90/0xc90 [ 188.461406] ? finish_task_switch+0x1c1/0x7e0 [ 188.465878] ? syscall_return_slowpath+0x550/0x550 [ 188.470781] ? syscall_return_slowpath+0x2ac/0x550 [ 188.475685] ? prepare_exit_to_usermode+0x350/0x350 [ 188.480675] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 188.486026] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 188.490850] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.496014] RIP: 0033:0x40eb91 [ 188.499180] RSP: 002b:00007f7a5b727bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 188.506862] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000040eb91 [ 188.514105] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f7a5b727bd0 [ 188.521349] RBP: 000000000072bea0 R08: 0000000000000000 R09: 000000000000000a 2018/03/30 07:41:53 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r0, r2) 2018/03/30 07:41:53 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000002c0)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000400)={0x0, 0x7ff}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000480)={0x0, 0x7f, 0x10001}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000500)={0x0, 0x3, 0x1, [0x1]}, &(0x7f0000000540)=0xa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={r1, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7, 0x4, 0x80, 0x0, 0x1}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000800)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723fe8d77b5ae6c8ce90a90ad43223bc3df70139c54fb2b9e9ff7e5f49796cf574a33d39c69e8c93bfef9fd884fb58e9339ce087381ea14edc6161b5baf7c32eae0d1476c3730dbf228d71652c79d32774fd79958f82a496eb1f71328b70d914210f06f80f81b23d92ddba5f6d8f350de04367f0b5117a77ecbf95adc89be9995c289f0a08484d4e806fefca44bffdd6bc5eb55fc9226d340d89d3b644f19d41e90eba7d0f08b2fa4af7baddd9dbb96b5fb81fa9c4d8b64e51a51d481a42952cc389d2a541d4717f7911c2e3a72fab301b4d236eee928354cfa58378751de9901faf873ebdcd61cc118f2512839029e546d812a3935718d9d87c6d2e52f91474f528f7e18e78eb1adab09f920da5d38c9996c81a70dff3a3d00980452853cca42d9eea1ae2391f1361eafd7dabd7bb"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r3, 0x11) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f00000006c0)="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", 0xffffffffffffffc6) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x4e24, 0x6e7, @loopback={0x0, 0x1}, 0xffffffffffffffff}, 0x1c) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) dup2(r4, r3) 2018/03/30 07:41:53 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000), 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) [ 188.528594] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000015 [ 188.535838] R13: 0000000000000684 R14: 00000000006fbd00 R15: 0000000000000003 [ 188.556798] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:53 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={r1, 0x6}, &(0x7f0000000380)=0x8) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:53 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5000000016000000fddb6bce2ec0201b0ef72d6a3c2d0faedf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 188.593447] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 188.603554] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:53 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000), 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:53 executing program 1 (fault-call:10 fault-nth:4): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:53 executing program 7: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r2, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r3, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x0) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:53 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) r2 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x2, 0x6, 0x10000, 0x294b, "eaa57225ad183fc149570eb2e3c0e8846ee28656d86e96cd8653a75922490e707994e90c1b324120d25f886e", 0x2}, 0x0, 0x0, 0x9, r2, 0x1ac5, 0x5ae9, "4ac01e32c97c0535f28389f702d32332543b20b589c7bed433543b1a164a68b573fa86881a95414aed6fdf110bcadc83a79eed4294d5dfb8f9089af358c8c483", &(0x7f00000002c0)='*posix_acl_access\\\x00', 0x13, [], [0xffff, 0x3, 0x6983, 0x3]}) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r3, 0x11) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) dup2(r4, r3) 2018/03/30 07:41:53 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r2 = syz_open_pts(r1, 0x11) ioctl$int_in(r2, 0x5452, &(0x7f0000f27ff8)=0x81) write(r2, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) dup2(r2, r1) 2018/03/30 07:41:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="25023f10008cf0949d664a10ad892f0000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f00000002c0)={r3}) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r2, r0) 2018/03/30 07:41:53 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:53 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 188.738810] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 188.759859] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:53 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) clock_settime(0x7, &(0x7f0000000440)={r3, r4+30000000}) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r5 = syz_open_pts(r2, 0x11) ioctl$int_in(r5, 0x5452, &(0x7f0000f27ff8)=0x81) write(r5, &(0x7f0000fd6000)='z', 0x1) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000002c0), &(0x7f0000000380)=0x4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) dup2(r5, r2) 2018/03/30 07:41:53 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r3) 2018/03/30 07:41:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 188.796989] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000440)={r2, r3+30000000}, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) bind$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r5 = syz_open_pts(r4, 0x0) ioctl$int_in(r5, 0x5452, &(0x7f0000f27ff8)=0x81) write(r5, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) dup2(r5, r4) 2018/03/30 07:41:53 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) vmsplice(r0, &(0x7f0000000380), 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10479617086dc021252ed2645691f533dead892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0xfffffffffffffffe, 0x5000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) clock_gettime(0x0, &(0x7f00000002c0)) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:54 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) [ 188.872863] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbe525023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) ppoll(&(0x7f0000000400)=[{r3, 0x4020}, {r3, 0xc408}, {r2, 0x4008}, {r2, 0x48}, {r0, 0x2000}, {r3, 0x444}, {r2, 0x10}, {r0}, {r2, 0x2002}, {r2, 0x8000}], 0xa, &(0x7f0000000380)={r4, r5+30000000}, &(0x7f0000000480)={0x45}, 0x8) r6 = syz_open_pts(r3, 0x11) ioctl$int_in(r6, 0x5452, &(0x7f0000f27ff8)=0x81) write(r6, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x3) dup2(r6, r3) 2018/03/30 07:41:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000600)=""/4096) dup2(r3, r2) [ 188.933651] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:54 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x2fa) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000400)={r1, @in6={{0xa, 0x4e20, 0xffffffffffffffff, @ipv4={[], [0xff, 0xff], @rand_addr=0x5}, 0x3f}}, 0x2, 0x6}, &(0x7f00000002c0)=0x90) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) sendmsg$nl_generic(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4080000}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)={0x10dc, 0x3a, 0x8, 0x70bd2a, 0x25dfdbfd, {0xa}, [@nested={0x1018, 0x2c, [@typed={0x1004, 0x80, @binary="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"}, @typed={0xc, 0x75, @u64=0xffffffffffffffff}, @typed={0x4, 0x18}]}, @typed={0x8, 0x4e, @ipv4=@broadcast=0xffffffff}, @typed={0xc, 0x48, @str='#em0\x00'}, @generic="b53b2149221f786f02aaefa04af929ace5bb86ff0dd9354548931c59deaf89aef709250d54b22643e53030d6c92a02dc5fc4250f938e5cec38351c713c3897cab1b8cf1d92350a267408f03a02bb89b9b3e2d4f3e2e60ac237edbf0fe65088cf8ac2aa5ed9e01f0d840c31699a9cfa3bf1cb0ac14bf6172b43e54aa91dccc4467e19e0b6394b77d8959698598ef055a46f07a7f64a2e7260967f0add"]}, 0x10dc}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:54 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f0517408d27bdebcbd9c34f54fa98421fd916949f62f43e"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000140)=""/25) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r2 = syz_open_pts(r1, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000f27ff8)=0x81) socket$vsock_stream(0x28, 0x1, 0x0) write(r2, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) dup2(r2, r1) 2018/03/30 07:41:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 188.986517] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 189.019945] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fdfbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$TIOCCONS(r0, 0x541d) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f00000002c0)="26c946e1645f7e", 0x7) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="500000949d664a30ad892f000000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000380)={r4, 0x2}) dup2(r3, r2) 2018/03/30 07:41:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[], &(0x7f0000000080)) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 189.139277] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 189.153774] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 189.176825] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)=ANY=[@ANYBLOB="5000000000000000e3dbdf25023f10008cf0949d664a10ad892fa0e0404c61089943de152910d2fd32fd723f00"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f00000000c0)=[0x100, 0x2]) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000002c0)=0x1) dup2(r3, r2) 2018/03/30 07:41:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='net/udp6\x00') getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000380)={0x0, 0x80000001, 0x30, 0x6, 0x10001}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7, 0x100000001}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949f664a10ad8939a0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x67, &(0x7f0000000600)=""/202, &(0x7f00000004c0)=0xca) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000002c0)={0x9, 0x1, 0x4, 0x3, 0x0, 0x3, 0x3}, 0xc) r4 = syz_open_pts(r3, 0x11) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000440)={r1, 0x8}, 0x8) write(r4, &(0x7f0000fd6000)='z', 0x1) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0x4) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) open(&(0x7f0000000500)='./file0\x00', 0x200, 0x82) dup2(r4, r3) ioctl$KVM_RUN(r0, 0xae80, 0x0) 2018/03/30 07:41:54 executing program 4: pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x4000) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='net/ip_tables_matches\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000400)={r3, 0x0, 0xb2, "30d3e6f19f4b8af7eefaf1165ed6e110d00290f20d2b3e92db11d4b8a83595c7dec9e23886aa5362ff734ffb031ae0f71827b7e8d73649f553677e3b18f1bae1b14545ce1bca434be34326060177252cd21b95bfaaed3226c460f632a3027283e46f00a7d9bcbf5519a13fd68da801d3d62e253147be7e6642112d70b8fe88251ee20b5850cb22b34e89bb8feb0752766af00451dc4acf09a48e58be651d6c439b96dd98e8d5b995806ea74a61d49bf61f06"}, 0xba) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r5 = syz_open_pts(r4, 0x11) getsockopt$inet_int(r2, 0x0, 0x2000000000001e, &(0x7f00000002c0), &(0x7f0000000380)=0x4) ioctl$int_in(r5, 0x5452, &(0x7f0000f27ff8)=0x81) write(r5, &(0x7f0000fd6000)='z', 0x1) llistxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000540)=""/53, 0x35) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) dup2(r5, r4) 2018/03/30 07:41:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00000002c0)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:54 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[], &(0x7f0000000080)) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1d, &(0x7f0000000880)="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", 0x19a) r2 = syz_open_pts(r1, 0x11) ioctl$int_in(r2, 0x5452, &(0x7f0000f27ff8)=0x81) write(r2, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) dup2(r2, r1) 2018/03/30 07:41:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x100000000006) dup2(r3, r2) openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x4000, 0x0) 2018/03/30 07:41:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) perf_event_open(&(0x7f0000ff3f88)={0x1, 0x70, 0xfffffffffffffc01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="ff009fce972b0900230b"], 0xe) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) 2018/03/30 07:41:54 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 189.324688] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 189.336806] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 189.344222] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x0, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000400)=""/116) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000300)={0x10}, 0xfffffffffffffe98, &(0x7f0000000580)={&(0x7f0000000280)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x200000000000000, &(0x7f00000002c0)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) bind$alg(r0, &(0x7f0000000500)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-aesni\x00'}, 0x58) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000280), &(0x7f0000000340)=0x4) write(r3, &(0x7f0000fd6000)='z', 0x1) r4 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r4}) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000400)) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000005c0)) dup2(r3, r2) 2018/03/30 07:41:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f00000002c0)={r0, 0x1}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 189.456331] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:54 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[], &(0x7f0000000080)) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:54 executing program 0: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000400)='net/snmp6\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r1, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d6522442dba0b7e6f0a"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r2, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r3, 0x11) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) dup2(r4, r3) 2018/03/30 07:41:54 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)=ANY=[@ANYBLOB="5030713983642ab8ad0200000000000000f0949d664a10ad892fa0723f46a2c149089becdcc1c9d8ea92b96f3234096c82674168f7a9967c2861759ca3c8512b187fe499567d7a53a0f460c0a12799e40000000912823b4767017cb988b09f747b6d282e94575258288c06897f4c5600548a2c3e91442e866642aac2f23381490f779e77382918a7c457f6e2aff531fd9e2421933eedf00d6465d90a2dc61dabbc0125ed174e196be17c65c135d65c11b537a2ac7b24c3d2ad5d5c3c13af3954a3d37c18ac983d22e9c9b9e579b2ff7bbbddbdf2af7e4d4cf169f476bfbb255aa68c"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) recvfrom$inet6(r0, &(0x7f0000000600)=""/239, 0xef, 0x40000000, &(0x7f0000000340)={0xa, 0x4e24, 0x200, @mcast1={0xff, 0x1, [], 0x1}, 0x8080}, 0x1c) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) r4 = dup2(r3, r2) accept(r4, &(0x7f0000000400)=@vsock, &(0x7f00000002c0)=0x80) 2018/03/30 07:41:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x0, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000500)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r1, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r2, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') r3 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f00000002c0)={{0x0, 0x3, 0x8, 0x3, 0x3f}}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)={0x4, 0x0, 0x4003, 0x8, 0xfffffffffffffffe, 0x0, 0x0, 0xf3e, 0x0, 0x0, 0x9653, 0x4}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r5 = syz_open_pts(r4, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0}, &(0x7f0000000400)=0xc) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000740)=r6) ioctl$int_in(r5, 0x5452, &(0x7f0000f27ff8)=0x81) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100), &(0x7f00000004c0)=0x4) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000640)={0x7, {0x2, 0x4e24, @broadcast=0xffffffff}, {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @rand_addr=0x400}, 0x100, 0x8, 0x2, 0x81, 0x0, &(0x7f0000000600)='ifb0\x00', 0x304f, 0xffffffffffff7676, 0x8001}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000540)=0x4, 0x4) dup2(r5, r4) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000700)={0xaac5, 0x8200, 0x4, 0x0, r2}, 0x10) [ 189.523378] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 189.532982] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 189.593595] device bcsf0 entered promiscuous mode 2018/03/30 07:41:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="4000000016000000fddbdf25023f10008df09404000000ad892fa072bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f00000002c0)={0x2, 0x5, 0xfce6}) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x1}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) close(r0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) fcntl$getownex(r2, 0x10, &(0x7f00000002c0)={0x0, 0x0}) capget(&(0x7f0000000380)={0x200f1526, r3}, &(0x7f0000000400)={0x0, 0x7bd, 0x3167, 0x3, 0x40, 0xfff}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r2, 0x11) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) dup2(r4, r2) socket$inet6_udp(0xa, 0x2, 0x0) 2018/03/30 07:41:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) dup3(r3, r2, 0x80000) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r3, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) [ 189.625615] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 189.628706] device bcsf0 left promiscuous mode 2018/03/30 07:41:54 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000380)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000480)) getpid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000004c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) gettid() r2 = getpid() r3 = getpgid(r2) sched_getparam(r3, &(0x7f00000002c0)) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r5 = syz_open_pts(r4, 0x11) ioctl$int_in(r5, 0x5452, &(0x7f0000f27ff8)=0x81) write(r5, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) dup2(r5, r4) [ 189.701144] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 189.701646] device bcsf0 entered promiscuous mode [ 189.727721] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x0, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 189.754669] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 189.769408] device bcsf0 left promiscuous mode 2018/03/30 07:41:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000002c0)={r1, 0x1}, &(0x7f0000000380)=0x8) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:54 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f00000002c0)={0x20, 0x1, 0x3, 0x6, 0x80, 0x8000}) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:54 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x3, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 189.818399] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 189.861350] device bcsf0 entered promiscuous mode 2018/03/30 07:41:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10c7332f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f0000000380)=[{0x0}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000440)={r2, 0x20}) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) ioctl$TCFLSH(r0, 0x540b, 0x593c) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000600)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x278, 0x138, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f00000002c0), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz1\x00', 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @rand_addr=0x200b, @empty, 0x4, 0xffffffff}}}, {{@arp={@rand_addr=0x800, @remote={0xac, 0x14, 0x14, 0xbb}, 0xffffffff, 0x0, @empty, {[0xff, 0x0, 0x0, 0xff, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0x0, 0x0, 0xff, 0xff]}, 0x4, 0x3, 0x0, 0x83, 0x3b6b, 0x0, 'bpq0\x00', 'yam0\x00', {0xff}, {0xff}, 0x0, 0x8}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4f0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r3, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) dup2(r0, r3) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) dup2(r4, r3) 2018/03/30 07:41:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)=ANY=[@ANYBLOB="5000000016000000fddddf25023f10008cf0949d664a10ad35acd71a3f82023adac6760463ad81f4d5ebef0120e6de6703f2945d5147a049b106ec"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000400)="db382ec0a3b84c89ee096c4ed6d0aaaacf2dd9f699e92307a62d8600d487d63c62e0e82fcec9ac327d50a1c355cd526e6ee3a2", 0x33, 0xfffffffffffffffe) pread64(r0, &(0x7f0000000500)=""/126, 0x7e, 0x0) keyctl$update(0x2, r2, &(0x7f0000000440)="afdabc03487c174d25cfda583557c959ba8eecfb1b934cb8ea9f6efea567b1607a687877bf1693b1fa06562c0f6145f7a184d74a0952c7b0274bdc952fbad282da0c7e95d1acd327a82162babf93c27ce269075ff717862d5ad9584c5fadfa33739e17cf978439035fc8214236930af75a26e536af35d3fd89aef1", 0x7b) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r3, 0x11) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000600)=0x8) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) dup2(r4, r3) [ 189.898731] device bcsf0 left promiscuous mode 2018/03/30 07:41:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) [ 189.962904] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 189.973257] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f30f3be192e3ce1466809b7072b7218c67d72eaa139ad68c11053b92d5763c0b66b4098e690e7962077a5a56c3f828af71294d61555db4461754a252ac455eecf59bd0f1e626a2deea5a7a90d0b5105acea6c5962bada1d3e57e609b443fa3507"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000002c0)={0x7, 0x8}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r0, &(0x7f00000007c0)="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", 0xba) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5000000016000000fddbdf2502df9e1935a68a4deb6cf72a90afcb31521a8f260004d53dae4a00ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000300)={0x10}, 0xfffffffffffffd3f, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="5001000016000000fddbdf25023f10008cf09c9d66305683764a10ad892fa0723f379a"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x800000100000004) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x800000100000001}, 0xffffffffffffff37) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(r0, 0x6, 0x20, &(0x7f00000002c0)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x2, 0x0, 0x0, 0x100000001, 0xfffffffffffffffd}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d665110ad0800a072c6"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) [ 190.132215] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:55 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r1, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r2, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r4 = syz_open_pts(r3, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000f27ff8)=0x81) write(r4, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) dup2(r4, r3) [ 190.178901] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000004c0)=0x40, 0x4) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000640)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f7901000100011283574f0d16722e5be36b314b9c5be1ed19572aeec7835e9aff74735b8eb9cad06ebe954496c5554198db99bea2af109886671b7e1970ed16afb726c99911b8ddad5bfbb11229fada981eb22986c23b16e7d06d79b6d31fa89ada337e12fb3e0aa539879889fcb11ede9d91cebb3cef52f2440c46af948bf13d865ae90840ca9bfcb89de858bbe24522832c4831bede7cfb389d4fef246b92296677a822b7a6c52ac8de828d91fd36db583e94e02cb39c8dbb68a75f67366f161d9e524fd7aff1f8dde8ac4d4b4c3b0eda9367a9ef606d0068cf40ca0a0aa692683571524cd4b44dca7e96d607c3f36e9cd854828e37e82aabbd27591d8b8cb3d356cc74ab519f63c6db71bb5c2378d83b1d3a9369a81742d6dfb72e2d076e9ff621c182100a5b2e1708d2b4c668b279df86922157be972ae8401f6cfdfe38cedab47b7361bd094a60e6aabc012a4120120c76191aeccfe0cc273c19f67a01c3983c34b2896b7f948b724a71313095a1c2f445233fba4bf019ba388778c82d458bcec343fb1fef7700ace142fe90827064ce9c73ddc5fc5a24b213041af779c7ac0970ff92697d0929e40d7075fb15fca248d2eee318e7c8f43cebde425ea2bb592104c76513fe09f5"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x6, 0x0) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000a80)=""/246) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x0, 0xffffffffffffffff}) ioctl$EVIOCGREP(r3, 0x40047451, &(0x7f0000000000)=""/174) close(r3) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) socket$inet(0x2, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f0000000480)={0xfffffffffffffff9, 0x5839d703e6a0c8d5, 'client0\x00', 0x3, "af71a5033ec20e22", "f820107afcb58466bc0c96db17c3d568ecab3a5f428afb699e64e645150e8f8b", 0x2, 0x20}) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000600)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x100000000006, r4, 0xfffffffffffffffe}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) r6 = creat(&(0x7f0000000200)='./file0\x00', 0x0) write$cgroup_pid(r6, &(0x7f0000000100)=ANY=[], 0x1023c) truncate(&(0x7f0000000280)='./file1\x00', 0x0) write(r6, &(0x7f0000000180)="15", 0x1) open(&(0x7f0000b91ff9)='./file1\x00', 0xfffc, 0x0) 2018/03/30 07:41:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0xfffffffffffffff8}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0xeb5e) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x2000000}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r0, 0x8000000200020) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) getsockopt$ax25_buf(r0, 0x101, 0x19, &(0x7f0000000400)=""/250, &(0x7f0000000500)=0xfa) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@local={0xfe, 0x80, [], 0xaa}, 0xc07, 0x1, 0xff, 0x2, 0x7ff, 0x3f, 0x86}, &(0x7f0000000380)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000600)={r1, @in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0xfffffffffffffffe, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x8001, 0x21d, 0x0, 0x401, 0x7fff, 0x3, 0x0, 0x0, 0x6, 0x3]}, &(0x7f0000000540)=0x100) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="50000000160000009bdbdf25023f10008cf0949d664a10ad892feae7bed22e1c9531f7d48a09a070c25770c1a49890b7ba1bbabb02d9e5c3b71cee4910afc164e3e2341e970349e88076b8e0294b96bf50c95eb147577a77b6be61a38a13c11c518a192ab47f208331364ad44a58ed2af93bee2e0ca6d092ea6db7cf7988b0ad3cfb760dcc14542578e6c467eed46d7062319ce8ff00000013ad63bd0f911722dd81e73c4673c63e614a04c63d108babb4a97744d75bf8a7fdf350337a2022564df67320ca884bfd257b9c492a871ecaf281450e840da4c780e8d6"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x48, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:55 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 190.261470] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr 2018/03/30 07:41:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) r4 = pkey_alloc(0x0, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) syz_fuse_mount(&(0x7f00000002c0)='./file0\x00', 0x2000, r5, r6, 0x9, 0x1) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xc, r4) dup2(r3, r2) 2018/03/30 07:41:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000540)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000380)={0x9, 0x5, 0x2, 0x7f, 0x0, 0x4}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000400)={r1, 0xe4, "48dc51a6c1633bdfd8174edb9b5a4869f1186c7608f80b4173df532e5b22558bcd784d303c383986be1aab6e2516db63ce555e71decf19c1682bd24615f3ea47aa8b6fe29b2962c4846ef0b3cb1698d55177d6a61fafb5ab49cf322c48f6af89159081e1964aa9726f5007277e7b79078fffe4ac1e966840a111fe9cb6a836a4b05f33be7d4ba0b522330ffc5612e2ef909621a8a79e4513178435b1e67412a07caee7327a4e6a10d40ea573d2a63f904edf773ce96a2679d8414cc5ca5cdaa78dcc891af67c40e2386cb7b750a06201bdfe9f42c7b5e886cec84980478ed33dcf74f704"}, &(0x7f0000000500)=0xec) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0xfe86) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000002c0)=0x3) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x339aaa0e, 0x400000) dup2(r3, r2) 2018/03/30 07:41:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f05"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="4000007e8854360f41c9692c5b056eaa2f614da0deb589e91398c5122355c58a3bab36aa44695b174282421d52f42befac1866e989bdaed624ed5c9be924a8b5c1401393bdc602c9f9108642db867331eb0e704c6290952084f90a5e1adbb96e8a60bb83e398b39916529b50a1596822756b9308650a7d425c6c639dbec9bde2b76496e56dc08129bb90074a6e7e02156462b40362942dab1f32e73e7a2b980e39647da3b337ea7d17d8d5167d7e9e3884f25d87406466f0c8f29aedd813fdac974500398cbab0b4a33d11a5d84c2015fb673aaa6e3c6d7ae4c10f586da6e777e71f5fb26d43bc510d66a10293504e5c9e454a9736e1b65f76e005c49312a2681e5236b4d5fb318ad2b8b2927a9286921e1d2ed3d06b1a67183cd92bdd270cf47e50ced63864d17c44051d3ecdd0c64146ee1ecd8ee7910b84895c86af300d48d54f2d425031d405b45977a13a7e2e206f659addd830e5c4f0ea1e9ecc0bd0dcb1ebe5ca397d0836725de927f1f598f6689deaf38b000000000000000000000000000064f1e12b09dfe85f763b1059af3da2b65e055b957e87e13e2e6463be30a311bde2fbaa96962f1275ffd996af2cb8ba0d38edbcca0e9a432bb39c91a8ec178fe4f7bdf4a088fe53e28910e6252624dc1afe50e8f163aaa28a0ad3926efd160a267dbdcf5fae2ead9d7d8414f29a7b7df1806c0f32dddc7e4fcda556278ecb4d51ffb3d101040000000000009362bea9cc105dc04f97327403000000c31bd71a891b47cf235201777709121e6972c05987047f6794f26da8a027bb5232e91653db5006eb0d6c4175c67e8191bfbc046e773b670c89fb1e27bce99ba3d67ccdb64fff5546603995f899bbaca042a9cce1575a4533618e0e900a99d950ae50573a5a6fc8aeb9ce8ac1b7d68962e17f7beca6a597ecd82c1f68cce2c1a7ab0a77a0cd745226e59463af7a39e1b88e5b6d3b1acd069c1b25ec8f7bc703c82b2211bfb5db8779ebad7ab8a5bb27449eee59500f5d9b80b1ca0100b684a9748c177a1b8476c90e8f7c877aaf7482330cc753b2791474a83cbb903bdec2ed0f1cac746085dc8afd0e6f595b88f7823be36769eb62946dcdfb17773fe1d1f47b0755e672a5283f0f177f2d138f6ffccf26ccb15a7573a2d3471b62c19bbca97caad3163c8e77b0bdaa1f79814d42cf6b143cdb044787a85113e6886b826755bfe321fdc3f12481bb29d7c5b372098893093b93611db98ffcb5c9384579276d7bbac7754ce9735a3d3eba31fb4aef76ba4af435dd8b0edf82394c20bed6fed4bf3df4a141f9feff45a3ec8e12fbc446ac82ac3cbf3ecb758909ccc8df7febd8b3301f6a8f6ed419a132020364d96e100000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a10ad892fa0723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000540)=0xe8) recvmsg(r0, &(0x7f0000001b00)={&(0x7f0000000700)=@can, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000780)=""/106, 0x6a}, {&(0x7f0000000800)=""/253, 0xfd}, {&(0x7f0000000900)=""/21, 0x15}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/127, 0x7f}], 0x5, &(0x7f0000001a40)=""/160, 0xa0, 0x9}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001cc0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001dc0)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000002c0)='./file0\x00', r4, r5) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@loopback={0x0, 0x1}, 0x5b, r3}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r6 = syz_open_pts(r2, 0x11) ioctl$int_in(r6, 0x5452, &(0x7f0000f27ff8)=0x81) write(r6, &(0x7f0000fd6000)='z', 0x1) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000400)={{0xa, 0x4e21, 0x100, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, {0xa, 0x4e21, 0x13ac, @dev={0xfe, 0x80, [], 0x12}, 0x8}, 0x3, [0x1, 0x7709, 0x8876, 0x0, 0xffff, 0xff, 0x9, 0x3]}, 0x5c) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x3) dup2(r6, r2) [ 190.403635] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 190.423432] IPVS: set_ctl: invalid protocol: 255 172.20.20.170:20001 lblcr [ 190.528635] syz-executor0 (1011) used greatest stack depth: 14472 bytes left [ 190.545218] IPVS: set_ctl: invalid protocol: 0 172.20.20.170:20001 lblcr 2018/03/30 07:41:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) r5 = socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r6 = accept$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r7, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) accept(r6, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5600000016000000fddbdf25023f10008cf0949d664a10ad892f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000640)='/dev/input/mouse#\x00', 0xd0daf7c, 0x400) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000600)={0xd6, &(0x7f0000000480)="e3345ea65d53bcb7aa1607740579aae6fdfce7bacfd83e143573696777621e990e8a8eea399e149c883f6504fda1e01b02b97592079dafc95c1fc5f07b1f1d15ba7d955e025235aebbe81f7b72fb935ec8416859a714a147516a1eef87f86afcaa59b3657e5bfac249cb8c80e65970589e0518a59f4e83e623460269b74e79748f4e56ae967fe1478b85b959f73f6692de329bce1b35d2b5f5ec0efe271b7a8537fc8f722cf6fa8e73f2c063a641cda8bd334ce3b795fc4489eb12f6c986dfcf823fb27afbd3f922e8a3f3d592d2f4df2e1eaa5a8abe"}) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) r3 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67ac9602d7a2b2b329f6b0c3419231426efcff62a4e1cd25136e5414a7f01c0aa104004fee907ad1dffd3b", 0x31) r5 = syz_open_pts(r4, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f00000006c0)=0x5002) connect$l2tp(r0, &(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x3, 0x2, 0x2, {0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0x17}, 0x64}}}, 0x3a) ioctl$int_in(r5, 0x5452, &(0x7f0000f27ff8)=0x81) write(r5, &(0x7f0000fd6000)='z', 0x1) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x7, 0x0, 0x1, 0x6}) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f00000002c0)={0xa12, r6}) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000440)=0xfffffffffffffffd) dup2(r5, r4) 2018/03/30 07:41:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0)=0xfffffffffffffffd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000700)=@abs, &(0x7f0000000200)=0x6e) r5 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(r4, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0xff, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) 2018/03/30 07:41:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xb485, 0x3, 0x0, 0x0, 0x0, 0x0, 0x804}) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb1172a0ba5f6cf08699737438a2e57ed09fcca9c031f228513ec45a8e50008b9f901ae128a0d47193c870fc5a43c3f05"], &(0x7f0000000080)=0x1) clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6161707300038c348b91069ddcb997fdc29105efa63614ad08f6cc51de6e497d0a226306cc024d8a2e014839e7aff8dbd9") ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x200) 2018/03/30 07:41:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d080021ad892fa0723f2ebc9c5720a58422de2b36b8730acd"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000400)={{0x3a, @dev={0xac, 0x14, 0x14, 0xe}, 0x4e20, 0x2, 'ovf\x00', 0x1, 0x2, 0x67}, {@broadcast=0xffffffff, 0x4e22, 0x12007, 0x9, 0x1, 0x8}}, 0x44) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0xfffffffffffffffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) dup2(r3, r2) 2018/03/30 07:41:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x0, 0x4, 0x7}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000016000000fddbdf25023f10008cf0949d664a107a225084723f"], 0x1}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x100000001}, 0x8) clock_nanosleep(0x9, 0x0, &(0x7f0000000640)={0x0, 0x989680}, &(0x7f0000000600)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@empty, 0x47}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3b", 0x31) ioctl$KDDELIO(r2, 0x4b35, 0x5) openat$cgroup_subtree(r0, &(0x7f00000002c0)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = syz_open_pts(r2, 0x11) ioctl$int_in(r3, 0x5452, &(0x7f0000f27ff8)=0x81) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000400)={0xbff8, {0x2, 0x4e24, @multicast2=0xe0000002}, {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x8, 0x6, 0x7, 0x8, 0xd93, 0x0, 0x3, 0x8, 0xfffffffffffffffa}) write(r3, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0}, &(0x7f0000000480)=0xc) migrate_pages(r4, 0x3, &(0x7f00000004c0)=0x4, &(0x7f0000000500)=0xfffffffffffffff8) dup2(r3, r2) 2018/03/30 07:41:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x2, 'ip_vti0\x00', 0x1}, 0x18) getsockname$inet(r3, &(0x7f0000000380)={0x0, 0x0, @multicast2}, &(0x7f0000000540)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') socket(0x5, 0x1000, 0xa) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r4, 0x0, 0x1000000000d1, &(0x7f00000000c0), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000580)={0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r0}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, "7607006e30080400ffff000000000002", 0x2}, 0x2af) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000bc0)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000a40)=0xfef2) [ 190.667555] ODEBUG: object is on stack, but not annotated [ 190.674307] WARNING: CPU: 1 PID: 1046 at lib/debugobjects.c:328 __debug_object_init+0x60a/0x1040 [ 190.683219] Kernel panic - not syncing: panic_on_warn set ... [ 190.683219] [ 190.690574] CPU: 1 PID: 1046 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #6 [ 190.697663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.707001] Call Trace: [ 190.709572] dump_stack+0x194/0x24d [ 190.713180] ? arch_local_irq_restore+0x53/0x53 [ 190.717827] ? vsnprintf+0x1ed/0x1900 [ 190.721601] panic+0x1e4/0x41c [ 190.724768] ? refcount_error_report+0x214/0x214 [ 190.729501] ? show_regs_print_info+0x18/0x18 [ 190.733972] ? __warn+0x1c1/0x200 [ 190.737401] ? __debug_object_init+0x60a/0x1040 [ 190.742038] __warn+0x1dc/0x200 [ 190.745300] ? __debug_object_init+0x60a/0x1040 [ 190.749940] report_bug+0x1f4/0x2b0 [ 190.753542] fixup_bug.part.11+0x37/0x80 [ 190.757576] do_error_trap+0x2d7/0x3e0 [ 190.761435] ? math_error+0x400/0x400 [ 190.765208] ? find_held_lock+0x35/0x1d0 [ 190.769246] ? __debug_object_init+0x55d/0x1040 [ 190.773888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 190.778708] do_invalid_op+0x1b/0x20 [ 190.782399] invalid_op+0x1b/0x40 [ 190.785828] RIP: 0010:__debug_object_init+0x60a/0x1040 [ 190.791073] RSP: 0018:ffff8801c0b77968 EFLAGS: 00010082 [ 190.796408] RAX: 000000000000002d RBX: 0000000000000001 RCX: 0000000000000000 [ 190.803651] RDX: 000000000000002d RSI: ffffc90004988000 RDI: ffffed003816ef21 [ 190.810894] RBP: ffff8801c0b77b40 R08: 0000000000000000 R09: 1ffff1003816ee89 [ 190.818135] R10: ffff8801c0b77820 R11: ffffffff87b3b658 R12: ffff8801b6bba2c0 [ 190.825377] R13: ffff8801c0b77ca0 R14: ffff8801d1c1c0e0 R15: ffff8801d1c1c0f0 [ 190.832629] ? __debug_object_init+0x5cc/0x1040 [ 190.837277] ? exit_robust_list+0x240/0x240 [ 190.841578] ? debug_object_fixup+0x30/0x30 [ 190.845878] ? __fget+0x36b/0x5b0 [ 190.849304] ? save_stack+0xa3/0xd0 [ 190.852905] ? find_held_lock+0x35/0x1d0 [ 190.856945] ? alarmtimer_get_rtcdev+0x2c/0x40 [ 190.861500] ? lock_downgrade+0x980/0x980 [ 190.865621] debug_object_init+0x17/0x20 [ 190.869654] hrtimer_init+0x8c/0x410 [ 190.873341] ? hrtimer_init_on_stack+0x40/0x40 [ 190.877891] ? do_raw_spin_trylock+0x190/0x190 [ 190.882448] ? security_capable+0x8e/0xc0 [ 190.886570] ? ns_capable_common+0xcf/0x160 [ 190.890865] alarm_timer_nsleep+0x164/0x4d0 [ 190.895159] ? alarmtimer_do_nsleep+0x600/0x600 [ 190.899803] ? get_timespec64+0x104/0x170 [ 190.903924] ? timespec_trunc+0xe0/0xe0 [ 190.907872] ? SyS_futex+0x269/0x390 [ 190.911555] ? SyS_setsockopt+0x215/0x360 [ 190.915683] SyS_clock_nanosleep+0x235/0x330 [ 190.920069] ? compat_SyS_clock_getres+0x160/0x160 [ 190.924974] ? do_syscall_64+0xb7/0x940 [ 190.928921] ? compat_SyS_clock_getres+0x160/0x160 [ 190.933822] do_syscall_64+0x281/0x940 [ 190.937682] ? __do_page_fault+0xc90/0xc90 [ 190.941887] ? _raw_spin_unlock_irq+0x27/0x70 [ 190.946355] ? finish_task_switch+0x1c1/0x7e0 [ 190.950824] ? syscall_return_slowpath+0x550/0x550 [ 190.955725] ? syscall_return_slowpath+0x2ac/0x550 [ 190.960625] ? prepare_exit_to_usermode+0x350/0x350 [ 190.965614] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 190.970950] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 190.975772] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 190.980931] RIP: 0033:0x4548b9 [ 190.984094] RSP: 002b:00007fe178158c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000e6 [ 190.991774] RAX: ffffffffffffffda RBX: 00007fe1781596d4 RCX: 00000000004548b9 [ 190.999020] RDX: 0000000020000640 RSI: 0000000000000000 RDI: 0000000000000009 [ 191.006261] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 191.013502] R10: 0000000020000600 R11: 0000000000000246 R12: 00000000ffffffff [ 191.020743] R13: 000000000000004f R14: 00000000006f2808 R15: 0000000000000000 [ 191.027997] [ 191.027999] ====================================================== [ 191.028002] WARNING: possible circular locking dependency detected [ 191.028004] 4.16.0-rc7+ #6 Not tainted [ 191.028007] ------------------------------------------------------ [ 191.028010] syz-executor4/1046 is trying to acquire lock: [ 191.028012] ((console_sem).lock){-.-.}, at: [<00000000345d34b0>] down_trylock+0x13/0x70 [ 191.028018] [ 191.028020] but task is already holding lock: [ 191.028021] (&obj_hash[i].lock){-.-.}, at: [<000000005277a966>] __debug_object_init+0x109/0x1040 [ 191.028026] [ 191.028028] which lock already depends on the new lock. [ 191.028029] [ 191.028030] [ 191.028032] the existing dependency chain (in reverse order) is: [ 191.028033] [ 191.028034] -> #3 (&obj_hash[i].lock){-.-.}: [ 191.028039] _raw_spin_lock_irqsave+0x96/0xc0 [ 191.028041] __debug_object_init+0x109/0x1040 [ 191.028043] debug_object_init+0x17/0x20 [ 191.028044] hrtimer_init+0x8c/0x410 [ 191.028046] init_dl_task_timer+0x1b/0x50 [ 191.028048] __sched_fork+0x2bb/0xb60 [ 191.028062] init_idle+0x75/0x820 [ 191.028063] sched_init+0xb19/0xc43 [ 191.028065] start_kernel+0x452/0x819 [ 191.028066] x86_64_start_reservations+0x2a/0x2c [ 191.028068] x86_64_start_kernel+0x77/0x7a [ 191.028070] secondary_startup_64+0xa5/0xb0 [ 191.028071] [ 191.028072] -> #2 (&rq->lock){-.-.}: [ 191.028077] _raw_spin_lock+0x2a/0x40 [ 191.028079] task_fork_fair+0x7a/0x690 [ 191.028080] sched_fork+0x450/0xc10 [ 191.028082] copy_process.part.38+0x17c9/0x4bd0 [ 191.028084] _do_fork+0x1f7/0xf70 [ 191.028085] kernel_thread+0x34/0x40 [ 191.028087] rest_init+0x22/0xf0 [ 191.028088] start_kernel+0x7f1/0x819 [ 191.028090] x86_64_start_reservations+0x2a/0x2c [ 191.028092] x86_64_start_kernel+0x77/0x7a [ 191.028094] secondary_startup_64+0xa5/0xb0 [ 191.028095] [ 191.028095] -> #1 (&p->pi_lock){-.-.}: [ 191.028101] _raw_spin_lock_irqsave+0x96/0xc0 [ 191.028103] try_to_wake_up+0xbc/0x15f0 [ 191.028104] wake_up_process+0x10/0x20 [ 191.028106] __up.isra.0+0x1cc/0x2c0 [ 191.028107] up+0x13b/0x1d0 [ 191.028109] __up_console_sem+0xb2/0x1a0 [ 191.028110] console_unlock+0x5af/0xfb0 [ 191.028112] do_con_write+0x106e/0x1f70 [ 191.028113] con_write+0x25/0xb0 [ 191.028115] n_tty_write+0x5ef/0xec0 [ 191.028116] tty_write+0x3fa/0x840 [ 191.028118] __vfs_write+0xef/0x970 [ 191.028119] vfs_write+0x189/0x510 [ 191.028121] SyS_write+0xef/0x220 [ 191.028122] do_syscall_64+0x281/0x940 [ 191.028124] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.028125] [ 191.028126] -> #0 ((console_sem).lock){-.-.}: [ 191.028132] lock_acquire+0x1d5/0x580 [ 191.028133] _raw_spin_lock_irqsave+0x96/0xc0 [ 191.028135] down_trylock+0x13/0x70 [ 191.028137] __down_trylock_console_sem+0xa2/0x1e0 [ 191.028138] console_trylock+0x15/0x70 [ 191.028140] vprintk_emit+0x5b5/0xb90 [ 191.028142] vprintk_default+0x28/0x30 [ 191.028143] vprintk_func+0x57/0xc0 [ 191.028145] printk+0xaa/0xca [ 191.028146] __debug_object_init+0x5cc/0x1040 [ 191.028148] debug_object_init+0x17/0x20 [ 191.028149] hrtimer_init+0x8c/0x410 [ 191.028151] alarm_timer_nsleep+0x164/0x4d0 [ 191.028153] SyS_clock_nanosleep+0x235/0x330 [ 191.028155] do_syscall_64+0x281/0x940 [ 191.028156] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.028157] [ 191.028159] other info that might help us debug this: [ 191.028160] [ 191.028161] Chain exists of: [ 191.028162] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 191.028169] [ 191.028171] Possible unsafe locking scenario: [ 191.028172] [ 191.028173] CPU0 CPU1 [ 191.028175] ---- ---- [ 191.028176] lock(&obj_hash[i].lock); [ 191.028179] lock(&rq->lock); [ 191.028183] lock(&obj_hash[i].lock); [ 191.028186] lock((console_sem).lock); [ 191.028189] [ 191.028191] *** DEADLOCK *** [ 191.028191] [ 191.028193] 1 lock held by syz-executor4/1046: [ 191.028194] #0: (&obj_hash[i].lock){-.-.}, at: [<000000005277a966>] __debug_object_init+0x109/0x1040 [ 191.028200] [ 191.028201] stack backtrace: [ 191.028204] CPU: 1 PID: 1046 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #6 [ 191.028207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.028208] Call Trace: [ 191.028209] dump_stack+0x194/0x24d [ 191.028211] ? arch_local_irq_restore+0x53/0x53 [ 191.028213] print_circular_bug.isra.38+0x2cd/0x2dc [ 191.028215] ? save_trace+0xe0/0x2b0 [ 191.028216] __lock_acquire+0x30a8/0x3e00 [ 191.028218] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 191.028220] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 191.028222] ? trace_hardirqs_off+0x10/0x10 [ 191.028224] ? plist_add+0x5cb/0x760 [ 191.028225] ? print_irqtrace_events+0x270/0x270 [ 191.028227] ? trace_hardirqs_off+0x10/0x10 [ 191.028229] ? _cond_resched+0x14/0x30 [ 191.028230] lock_acquire+0x1d5/0x580 [ 191.028232] ? lock_acquire+0x1d5/0x580 [ 191.028233] ? down_trylock+0x13/0x70 [ 191.028235] ? lock_release+0xa40/0xa40 [ 191.028236] ? vprintk_emit+0x43b/0xb90 [ 191.028238] ? lock_downgrade+0x980/0x980 [ 191.028239] ? kvm_sched_clock_read+0x25/0x40 [ 191.028241] ? sched_clock+0x31/0x40 [ 191.028243] ? sched_clock_cpu+0x1b/0x180 [ 191.028244] ? vprintk_emit+0x5b5/0xb90 [ 191.028246] _raw_spin_lock_irqsave+0x96/0xc0 [ 191.028247] ? down_trylock+0x13/0x70 [ 191.028249] down_trylock+0x13/0x70 [ 191.028250] ? vprintk_emit+0x5b5/0xb90 [ 191.028252] __down_trylock_console_sem+0xa2/0x1e0 [ 191.028253] console_trylock+0x15/0x70 [ 191.028255] vprintk_emit+0x5b5/0xb90 [ 191.028257] ? console_unlock+0xfb0/0xfb0 [ 191.028258] ? wake_up_q+0x8a/0xe0 [ 191.028260] ? find_held_lock+0x35/0x1d0 [ 191.028261] ? __debug_object_init+0x55d/0x1040 [ 191.028263] vprintk_default+0x28/0x30 [ 191.028265] vprintk_func+0x57/0xc0 [ 191.028267] printk+0xaa/0xca [ 191.028268] ? show_regs_print_info+0x18/0x18 [ 191.028270] __debug_object_init+0x5cc/0x1040 [ 191.028272] ? exit_robust_list+0x240/0x240 [ 191.028273] ? debug_object_fixup+0x30/0x30 [ 191.028275] ? __fget+0x36b/0x5b0 [ 191.028276] ? save_stack+0xa3/0xd0 [ 191.028278] ? find_held_lock+0x35/0x1d0 [ 191.028280] ? alarmtimer_get_rtcdev+0x2c/0x40 [ 191.028281] ? lock_downgrade+0x980/0x980 [ 191.028283] debug_object_init+0x17/0x20 [ 191.028284] hrtimer_init+0x8c/0x410 [ 191.028286] ? hrtimer_init_on_stack+0x40/0x40 [ 191.028288] ? do_raw_spin_trylock+0x190/0x190 [ 191.028289] ? security_capable+0x8e/0xc0 [ 191.028291] ? ns_capable_common+0xcf/0x160 [ 191.028292] alarm_timer_nsleep+0x164/0x4d0 [ 191.028294] ? alarmtimer_do_nsleep+0x600/0x600 [ 191.028296] ? get_timespec64+0x104/0x170 [ 191.028297] ? timespec_trunc+0xe0/0xe0 [ 191.028299] ? SyS_futex+0x269/0x390 [ 191.028300] ? SyS_setsockopt+0x215/0x360 [ 191.028302] SyS_clock_nanosleep+0x235/0x330 [ 191.028304] ? compat_SyS_clock_getres+0x160/0x160 [ 191.028305] ? do_syscall_64+0xb7/0x940 [ 191.028307] ? compat_SyS_clock_getres+0x160/0x160 [ 191.028309] do_syscall_64+0x281/0x940 [ 191.028311] ? __do_page_fault+0xc90/0xc90 [ 191.028312] ? _raw_spin_unlock_irq+0x27/0x70 [ 191.028314] ? finish_task_switch+0x1c1/0x7e0 [ 191.028316] ? syscall_return_slowpath+0x550/0x550 [ 191.028317] ? syscall_return_slowpath+0x2ac/0x550 [ 191.028319] ? prepare_exit_to_usermode+0x350/0x350 [ 191.028321] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 191.028323] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 191.028325] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.028326] RIP: 0033:0x4548b9 [ 191.028328] RSP: 002b:00007fe178158c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000e6 [ 191.028332] RAX: ffffffffffffffda RBX: 00007fe1781596d4 RCX: 00000000004548b9 [ 191.028334] RDX: 0000000020000640 RSI: 0000000000000000 RDI: 0000000000000009 [ 191.028337] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 191.028339] R10: 0000000020000600 R11: 0000000000000246 R12: 00000000ffffffff [ 191.028341] R13: 000000000000004f R14: 00000000006f2808 R15: 0000000000000000 [ 191.028802] Dumping ftrace buffer: [ 191.814725] (ftrace buffer empty) [ 191.818406] Kernel Offset: disabled [ 191.822003] Rebooting in 86400 seconds..