&(0x7f00000004c0)=""/189, 0xabf70f75d9c5624) ioctl$fiemap(r2, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="000001000000000081000000000000000700000000000000020000020000000000000000000000000000000000000000000000000000000000000000000000020800000000000000000000000000008000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) lseek(0xffffffffffffffff, 0x3, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) getuid() ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000480)={0xfff, 0x4, r4, 0x2, 0x0, 0x280000000000000, 0x0, 0x3}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x5, 0x0, 0x0, 0xfffffffffffffff8}, &(0x7f00000002c0)=0x14) getpgid(r4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x6}, &(0x7f0000000340)=0x18) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)=@in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000600)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x0, 0x5}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x200, 0x10000, 0xfff}}], 0x60, 0x4000000}, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000957000)={&(0x7f0000000040)=@in6={0xa}, 0x1c}, 0x8000) socketpair$inet6(0xa, 0x80006, 0x5, &(0x7f0000000580)) sendto$inet6(0xffffffffffffffff, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) write$selinux_create(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB='system_u:obje\t\x00\x00\x00\x00\x00\x00\x00mod_exec_t:s0 /usr/sbin/ntpd 18'], 0x34) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000800)={0xffff, 0x7, 0x6, 'queue0\x00', 0xffffffffffffff00}) fdatasync(0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x6, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x6}}}, 0x88) add_key(&(0x7f0000000700)='big_key\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) 2018/03/31 03:09:19 executing program 5: r0 = socket(0xa, 0x2, 0x0) flock(0xffffffffffffffff, 0x6) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000009c0)={&(0x7f0000000500)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000cc0)=ANY=[]}, 0x1}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendto$inet(r0, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000580)='/dev/rfkill\x00', 0x200, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f00000007c0)={0x6, 0x80000001}) fchdir(r0) fstat(0xffffffffffffffff, &(0x7f0000000180)) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e20, 0xffff, @loopback={0x0, 0x1}, 0x1ff}}, 0x0, 0x9, 0x0, 0x3cab, 0x1}, &(0x7f0000000280)=0x98) sendto$inet6(r0, &(0x7f00000011c0)="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", 0x1d8, 0x0, &(0x7f0000000400)={0xa, 0x4e21, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x19}}, 0x3}, 0x1c) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000005c0)={r2, 0x3c, &(0x7f0000000540)=[@in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xce}, @in={0x2, 0x4e21, @multicast2=0xe0000002}, @in={0x2, 0x4e20, @broadcast=0xffffffff}]}, &(0x7f0000000600)=0xc) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000a00)=""/129) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000003c0)=""/25) ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40186417, &(0x7f0000000300)={0x0, 0x20, 0x7, 0x1, 0x11, 0x100000001}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@nat={'nat\x00', 0x19, 0x3, 0x970, [0x200019c0, 0x0, 0x0, 0x200019f0, 0x20002398], 0x0, &(0x7f0000000040), &(0x7f00000019c0)=[{}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'vlan0\x00', 'ifb0\x00', 'ip6gre0\x00', 'eql\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @empty, [], 0x8b0, 0x8b0, 0x8e0, [@among={'among\x00', 0x81c, {{0x0, 0x0, 0x0, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xb105, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x437, 0x0, 0x0, 0xff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x7f, 0x0, 0x6, 0x7ff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe1]}, {[0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x2, 0xcd3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x9, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x200, 0x80000001, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xdf9f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x1, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x86, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}]}}, @snat={'snat\x00', 0xc, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1}]}, 0x9c0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r4, &(0x7f00000003c0)=[{}], 0xffffff1a) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net\x00', 0x200002, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x6, 0x4) fchdir(r5) unlink(&(0x7f0000000080)='./file0/file0\x00') 2018/03/31 03:09:19 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x7, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(r1, r0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000b40)=[{&(0x7f0000000100)="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", 0x5b8}], 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) ftruncate(r1, 0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b00)=0x0) getpgrp(r3) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000c00)={'erspan0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ppoll(&(0x7f0000000a40)=[{r2}, {0xffffffffffffffff, 0x10}, {}, {0xffffffffffffffff, 0x400}], 0x4, &(0x7f00000000c0), &(0x7f0000000ac0), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000e80)=ANY=[]) utime(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)={0x0, 0x6}) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000000080)) 2018/03/31 03:09:19 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 661.671320] device lo left promiscuous mode [ 661.676797] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 661.683002] device lo entered promiscuous mode 2018/03/31 03:09:19 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) [ 661.810226] device lo left promiscuous mode [ 661.930195] device lo left promiscuous mode [ 661.935543] device lo entered promiscuous mode 2018/03/31 03:09:21 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x9a, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713"}, &(0x7f0000000900)=0xa2) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:21 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:21 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x84, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef2"}, &(0x7f0000000900)=0x8c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:21 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:21 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x7, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r3 = syz_open_pts(r0, 0x2) dup3(r3, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:21 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f00000002c0)='./file1\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[{0x0, 0x3}, {0x3, 0x8}, {0x4, 0x40}], 0x3) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) unlink(&(0x7f0000000080)='./file1\x00') lsetxattr(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)=@random={'user.', '/dev/sequencer\x00'}, &(0x7f0000000440)='./cgroup.cpu\x00', 0xd, 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x800, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a93000/0x3000)=nil, 0x20000002, 0x0, 0x0, &(0x7f0000b1c000/0x4000)=nil}) munlock(&(0x7f0000b20000/0x4000)=nil, 0x4000) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000039ff8)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(0xffffffffffffffff, &(0x7f0000801ff8)=@file={0x1, './file0\x00'}, 0xa) r4 = fcntl$dupfd(r2, 0x0, r3) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}}, 0x27, 0xe4, 0x7617, 0x8c, 0x40}, &(0x7f0000000180)=0x98) ioctl$sock_ifreq(r3, 0x8933, &(0x7f0000000580)={"657271701e01000000006de400006900", @ifru_ivalue=0x7}) setsockopt$inet_buf(r4, 0x0, 0x0, &(0x7f0000000680)="9a15bb4f642130a9ea647457e94966136113e7b512c4318b8f1e73e4", 0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000340)={r5, 0x70, "f3cf3a844341de8dd6704749bdf6e53fed2e8d84a4e12f237fa1783c91c8566d62cce21b24344e2127f49448ef03032a6b1b35e4d46fb7a422b24c3c9c1334305fa35d08b6f6fba45a2ff0ac789306a9c629ec04342649080bfd2868c69eed4c4008731bfc25d8c76140bc28150ec306"}, &(0x7f0000000400)=0x78) getsockopt$packet_int(r4, 0x107, 0xf, &(0x7f00000006c0), &(0x7f0000000700)=0x4) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x80, 0x240000000, 0x100000000, 0x2, 0x400, 0x100000000, 0x1800000000, {r6, @in6={{0xa, 0x4e22, 0x6, @mcast2={0xff, 0x2, [], 0x1}, 0x7f}}, 0x1, 0x4, 0x0, 0x9, 0x9}}, &(0x7f0000000500)=0xb0) r7 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000800)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000900)=0xe8) getresgid(&(0x7f0000000940)=0x0, &(0x7f0000000980), &(0x7f00000009c0)=0x0) accept4$netrom(r4, &(0x7f00000005c0)=@full, &(0x7f0000000640)=0x48, 0x80000) sendmsg$unix(r3, &(0x7f0000000fc8)={&(0x7f0000000780)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000471000), 0x0, &(0x7f0000000a00)=[@cred={0x18, 0x1, 0x2, r7, r8, r9}, @cred={0x18, 0x1, 0x2, r7, r8, r9}, @cred={0x18, 0x1, 0x2, r7, r8, r10}], 0x48}, 0x0) 2018/03/31 03:09:21 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00001b3000)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xfffe, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000200)=0x5) r4 = epoll_create1(0x0) r5 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4011, r3, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000880)={0xc, 0x0, &(0x7f0000000780)=[@free_buffer={0x40086303, r5}], 0xaa, 0x0, &(0x7f00000007c0)="62e2b09b2564b16bc3d3a13bec18fd2fd216d92a5a6d3119d853e6a1ed16a3512d25d9aa3419dac730d42a60a893071dcfa02aeb1bea91fda4b23807f5bfa4738f98ed9eab8f763ef7a26fa7d3fb1d448fea77f3b466245e2a5f0526fdf593800f2880e19b5088624dd4055238449bfad6fe007f809a52a125df1c798e342705089a75867cc77095ec4ba4132f8d15a24884a1c1553d1236c4547bd1869383a8ae80cad41f6aaa7a2e16"}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000dc0000)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r0, &(0x7f0000000600)) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) fchmod(r0, 0x110) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffb) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ftruncate(r1, 0x0) recvfrom$inet(r3, &(0x7f0000000440)=""/65, 0x41, 0x100, &(0x7f00000002c0)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f0000000740)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)={0x64, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {0x6}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffeb3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback=0x7f000001}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r6 = dup3(r4, r2, 0x80000) ioctl$TIOCLINUX3(r6, 0x541c, &(0x7f00000001c0)=0x3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000038c0)={&(0x7f0000000540)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x25dfdbfd, {0xf}, [@nested={0xc, 0x0, [@typed={0x8, 0x8b, @fd=r0}]}, @generic="940a6e56b5d8a0d713e83682"]}, 0x2c}, 0x1, 0x0, 0x0, 0x4001}, 0x44855) [ 662.914754] device lo left promiscuous mode [ 662.920074] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 662.926240] device lo left promiscuous mode [ 662.931328] device lo left promiscuous mode [ 662.936189] device lo left promiscuous mode [ 662.941082] device lo entered promiscuous mode [ 662.946188] device lo entered promiscuous mode [ 662.951523] device lo left promiscuous mode [ 662.956702] device lo entered promiscuous mode 2018/03/31 03:09:21 executing program 5: r0 = socket(0xa, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname(0xffffffffffffffff, &(0x7f0000000a40)=@nfc, &(0x7f0000000ac0)=0x80) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000bc0)="b55b5b2d984508b8b83bd0e28d3591112af8bcd4d3a39dc38920113f56364613fd54f985773fe4fd403da2e7e9d0a0d90b9bf6bf25c0787566c8290d39ee9e3e6bed5c557da27efcca9a588833587a4d37f0b7465730f1b016fc7d05b69c0c6d6f6935d5629fadf43f40365ed85e23e9a17a07cf7c908ea4864feb2cff9752555fa9c827c029faf30d18c6ddc10715fb4eff6f4e65ef8c4b1a2daa7e31fac6f6a6d50001568ce6ab3b386a29aa31aad3f02448ef9b6f8caab2618aa86edfdf91f3f8378effa6e06d2f95a5f2c0fbc647f001e718ec", 0xd5, 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000cc0)='.dead\x00', &(0x7f0000000d00)={0x73, 0x79, 0x7a}, &(0x7f0000000d40)="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", 0xfe0, 0x0) keyctl$search(0xa, r2, &(0x7f00000002c0)='cifs.idmap\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, r3) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000000200)={0x5, &(0x7f0000000580)=""/232, &(0x7f00000009c0)=[{0x27b, 0x38, 0x0, &(0x7f00000001c0)=""/56}, {0xfffffffffffffffc, 0xe3, 0x7, &(0x7f0000000680)=""/227}, {0x5, 0xc7, 0x0, &(0x7f0000000780)=""/199}, {0x0, 0x4a, 0x6, &(0x7f0000000880)=""/74}, {0x0, 0x8f, 0xcd, &(0x7f0000000900)=""/143}]}) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) r4 = gettid() sched_rr_get_interval(r4, &(0x7f0000000180)) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x4766}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000400)={0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x200, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @broadcast=0xffffffff}}, 0x0, 0x7f, 0x0, 0x0, 0xc3}}, &(0x7f00000004c0)=0xb0) accept4$unix(r1, &(0x7f0000000500)=@abs, &(0x7f0000000100)=0xffffffffffffff4b, 0x0) [ 662.962313] device lo entered promiscuous mode [ 662.967799] device lo entered promiscuous mode 2018/03/31 03:09:21 executing program 5: r0 = socket(0xa, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname(0xffffffffffffffff, &(0x7f0000000a40)=@nfc, &(0x7f0000000ac0)=0x80) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000bc0)="b55b5b2d984508b8b83bd0e28d3591112af8bcd4d3a39dc38920113f56364613fd54f985773fe4fd403da2e7e9d0a0d90b9bf6bf25c0787566c8290d39ee9e3e6bed5c557da27efcca9a588833587a4d37f0b7465730f1b016fc7d05b69c0c6d6f6935d5629fadf43f40365ed85e23e9a17a07cf7c908ea4864feb2cff9752555fa9c827c029faf30d18c6ddc10715fb4eff6f4e65ef8c4b1a2daa7e31fac6f6a6d50001568ce6ab3b386a29aa31aad3f02448ef9b6f8caab2618aa86edfdf91f3f8378effa6e06d2f95a5f2c0fbc647f001e718ec", 0xd5, 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000cc0)='.dead\x00', &(0x7f0000000d00)={0x73, 0x79, 0x7a}, &(0x7f0000000d40)="e77cd88f7039eedf2dc236332867be16ed66a2ef87c119b047e0dd4150df038bae67ba8f7f9afd17598b79c2a9ccd38771761d2bc965635a139132808531024f706bedb410580622e1eef372697da65a49fc70c4a09761f1e5f0a460af4b83d40396bc6d2438d60b1d4162bf5a2f153669adda53136d5afd6fa3c80b7e88b9e926b77e81d7013195433bb968419845af2f188d9a9ea471e1b0a18a461bf1401ad7047641999208fa34b1bf08d00b8e97ddd036e9effbc13d58d011f637ee5593acf4be6505193069b6cb04dad18e389a47ed01eb359f4a048f99a6d6a3ad5d354947c69e695ea29ebbc1fb0247dec35d6c859c9d7ac789631604677d7b282f4b100d647f704c453ca378f0ea80f0f7557e1b6e609b35f74e42dcafa18a7acc1b2410661ed499abc012cd36555c9b88231d14ca9e3b90e25de99d913392fcc2281181a43139f87140dc45fada68c43abb32b041b4a89f745205a60a0a879c879a5bb8290d8873c826117dc9d0c60777d997fb71df44da943239b6876b77136be518f6e26c643e6617d1424766ce07a9cb297ceec495d4562a1abb7b9e6682d6e89619e92d73aa4068a0d56103bb81ba6a2810f21580047f6550b2533e049aa5e6201128b13626eb7984b00102a64debd2996290cad37582663e186ab2cf10cf6ef81f4b24d5d71a52d30b2a347a2afc486249df19f3c8076bc57cebf5f555f68a3a2e8cb298c9c7f9b17bf3f3c89556daca42072b761621453df904d796bb28627e294c19338c5a403dde4b3c4c3cdc56c393f045b0c891e34f127416c28c312e15de0f91e52c92ca76d643d68030e2e923afc9888835d03a93e8bbe45fdca022380b40b2ed967ea1143bda327246b37400fea8b0cea1241006eebe1aafc9922541518bf17942f2edbdb27830384b9bdc5c3521abd1c8997aa804c3cc97d1571a361631fe1d9bf638190e2ee51b0cdc1fe406dd89c5d59b26594536104f3f56be01e57d174d56109da7b371ae6d1ad00e93fb643c1f90235a1d4cbb7f8a6037118918e468cc040ac6a2f881ac4b15bfff8786baeac946b8caf35e524626ba45d34dd98a78acfcc33c1d8584bc0183ecd45a71177bad5a061fc9c2722be21d2902ce88a70d44a680d81042d3d566ce56704f7f1482b97d90e9dae3b4efe9a972269d8a3159a353664da44a14bcf486e99db3b27b8a586f8fa9cfde53beffb07bf3f6882f39d5cd7173b384d33bd457311f3da76bdce8e5e5c07ec4dc64ad3e61d885661c7d4a7a6137de3c441bb538edb0390bf0c6815ca0db8b4fe60a2dfa73ac5e01675ba3430975bfa2de2b91d18d89cb78cbd99d91edfbde2318b682a3a637d80e1465fc8efbaca32215fc17c619edb973c4c2f2e18949532e1ee9c2d9ffe9057567c97a85a7f59d64b38a86342b608e78dc793c222f24821d97e72e21fd551870b42d9409af59a055610ec7e1256de440ee0a7d2b6114ee70c48957a7690ce582224da198d38bd0cac51879cdf0c3655f527a82c70dbff07bf4a2e6363d4e8f9ba4ea5ad4cf64f504182e19e6f2d56f7da42522abbe2cca90400a11eb1024cc3f6513541f684025c2d11c53568b4535fdb3a550f613af6cb85c69f7fcb9b0488ac09f684226229fc90129a08994256b75accd45dc5db049535306a7e666038e499dd5f2142717b1ce26673b0fe3975c278af091747d9d5e7a873e0832f3c5950b2bb9701b320237b9568afc3517a73680bee306219e019b623dc5c6aaeb5b3f44643e04e4cf47fbcb5f56355db65c1e26213992130050f960314a5bdd4e6277bf76fa14335a4832b002b2f40a40e15cf6fa7a02302f089fd766b14e1e9f265262583c618dc908c7601f32a327b6fd084abe42dec5f3f0d78b4a4f78b0df7adb49c71f7f8c8eafb772273fb7a535c4d549856d31129ec3c2474a3fe95eba40aef9f55022e6e7dbb14f4c418dfec06a95e3bb126d5b3f320397eeb4397d595acedd0bf74cd0ce23f1408ec2384d6c092f5d0c7a1cf92b000653b8ead213b032b09dcf5020ab2901fa5d0f478c908419b609d3f54481bdf6f5058c2617b702da1f8b615fbe02e7312131b65b963951316c01e7139f55dcb0c6141d03c85e0d9d0d52fd095d68587d3edf7df2fdb45a25672f0ae69ba5bf5a97e1d68c51a809145d8682c57c9b89bff3d88cc21ce86719da4299138b022e396c4b6685559b4219f0715bf608feddd22bb5d47e77670c589916254a1dead61c37e64ae10ba310bb726f1439c886ba90548b15d084a4116ef2b8c20441aeb110cd4e595661b5fb4e358a771a77e06c3f19245512200ecb9e809c04727c83fad64c76d8a4e9f70ba6edb8315dab41e60ffdc8b067812a40beba20588dbf5a90bf9fe6e374f9759cfca4d347664eec5d20041f82d2d1c5e81fb054c2f2fbdfd8f4923b6720339db550591b1d2815adc2e2b9c721e07ca3fd38d8d330b256d1b254e97d9bad5850ea99bb2da05055c5787b7ac83dbe8d5d847913ba2042e5ba18a1d091e624d963b7e96e0405fdfac2bc7129be48119c3440663ce8771339fa38e73a7a1794f410aefd2405fc092fbe0466f2c2d663ba6d427899ae546218a7007935687a9a2963c34b9cfd542a2eed32d2e7963c7f3ec1002fe293a8a74cc8d6b3f086d670aed206882d68b2d7379cf6e4c1d0014d61a29657442f047a4aa6e80c1680d5a330bf351e01d9d96500458cc1366ba87ccb9ff513f0acfa0f229e32be9a4718281861a41b07813fd71a4d0a4832c7269b192f39714629417879edb01f684f5e6b308b069719a5a5e5d8e3bb8943df7cf51ef3074a34142d8b8354dfc679a77b5b5dd5fdcb15e3cb7d8325f5a3947740d3fac55919f6c8a7bd4981c57ecf33b310d13d903416e20a40ee0ebc13ffdfd873b55e7d6df342fa4a7fb7b9b177b6e460c89e0f5ff19e473516202b5a19f0d5adce46411aff0c199b5f0c6fcb7a10c69ec1c80b50cb97b7b2ca70243e58b25b784f84882a7ba7e3efcfee47c9b3be238e2848d55eb664592443d688c98c7c48f25916ece0cbc77c3dd966d66330285557e9a4bb87c9a0260c78287914c1eafe4c0b3c17cf342623f650d761c4a7804db320dc5a678205e5c295dd2f8749b0179ccc29cf96d3ca868185cb5ed7978b1d8750147d6ffcbe44b858e62cca43bd617f7afc2987341d182169d2b908001c8365ed2999f5036572d9cd6964dc8e290ffd859d93b7eb6d718ad713e5958a78eb3a4896c1fded3d2ef5aaa6a2ca9e510584d5ba5d4089d9d40620c6024e4e67000c116aafd688106a0ff7419a727899966003c5d6e73222509e07c87514d8b49d2dfdb8dffc47a05c6f60d788e993b7ce54fc45411e0aebda9d6ce312f5cf3fd734db066df62e81a5deb28b607187fcd0bfc368ae12462e78921e7cbdc243a3103d03071411e6c7d1abfcddccc925068c10c52b1c55351d033eb379a1ae7c3c8528afce88b4cc895052e483a9495be4ff8c74210c3cfb2bac328b6c911f0d1f21c66fd3b1fdfe86a1bd1e7cb01fa898d97e29e76cc29e00388f5f41f2424a1961923eb01a2a600d831967f594f074a8984f05e23d8aa1fd749477ff27ff23a752275e29b99b392b448bd7e15b175cb0130569820808272fb5a8e25bc60a19fcbc360fdc5277e62fbeace9db50462eca5d1eff18b5e3ebb69ced64d707141af4f4f4360191eccafd9fd3c3fd6c0a8c198798f257d2d6c4ef5da5f02556571d46c7a0928d7a5801152cc8ab29f611d4a8b38c935974603828cb24966b3dd7276c5c985ed2c7a0b08e648fb34ad6d7b31951df834422131d006230b86ba846d9eca54dd9d07be8ecedd0cdaed8b7fa61d7b5d4ac37f8035cb0791f402c4c5d077e7327d44a7fc3a15450ef0813351d9c55117add5bb37dc47ac37a24f4dfe048fef0c222e56e3662c40db1b7d955b42d49666dcf567f4f518304d4f0c8b93b70c15bb92c5f4abf9087c00a72a78670af3b431f502ec08c65bfadca5735b9f2a27a376319e6f104c66be70e8e0f250ac87b7b373339638695ff50277fa3e35062b1304a48990eb8495d8f6957c8b3963d29f17a92c9b87d593b8776e6a892f6827753d02eb454c014f3e4084b92f0f4a822ca9d5befce0431d61b4c8fae784478d4b4c4f7432ffc71a238c26630deb570becc605e35b9fac2002c6b58285eaf8b51474f9763416ab3796fc20840553cfea840a1931bef86d4c68a3cb0c0cd8639380c90da192e2784028f2baba09dd459d73e368f835cc6f11ae66e6cc6d679c1ad931482f16c9a449526c058f0be05e6d40eb6ee3f3aa4536503c12a5888d1f1b271163b570b4cd9a1d5e85799121420704dd0da389c46eb3db94c7603c69490d002b3f2022bbe13077dcb470755618b7cf8614a86a98f04fffb474f81527023290ebae74d64c3941818b81d139357f9fb00352d8524afb6bdf207697fc7d73d905150a44b65f2a89ec75f5841bfefa7967dbc5236bd7cefca9cc763119d09f16459d979ad66b433f0820528e0f5a60fd5f3b4ddac261bb30d909c996d44f8a965b20261f02184f862d3f069c532ebc813e939a669390659111f60e85f977282c548d22f0e73f09b018f3666a7d2a22fedc5a0e94e7a664f50262597e878c440b6709c0857230c5455a99ab9429d8993128c1659a4058a9aa7c5de2b013797f28b22e786692826922433b19ae153e9a9a6861e4d345b68fd52c01614a4f619939398221b5afc3e9a3b2dc260ac2063eaa24bdf0fa680ef39d681a1c027e89e5f7b3e1b46b9bc0b5412b0b220a4357fb98996dd11669db54798ed0880d74f041954b42c957845b43777c864aef0ef771281b0a27e64d8cbb256691e9511336269dff997a3433a83e8d7d82bd6891b65856d9c8c13dc34fcb4841802a80c3057573f203c4eeb6470784377e7644d0482229be044cc1a6d7abf80d9ba98fcbcb5621be317eefb2a4ef93e196bf2d8543f944d62a4c2fd12a5c6b74e1fe5deeb4a77e3b2bce3194beb0988138c55759de9820d17cfd1c252e60c81c102c217f129dada61247a9a0eb8040a69ce1e803d3540332db50276f0fded1d61e47267688d22b63761377c5be06a8c7e6bb7b17950f1d2ca28a57720ee5881aa99893625e1117db6cdd17b40c4845f97da927e2dcf726d312d5b805d107157d3da0ba97626312b9fd2341cb276561c8145a292ec6f7567258f6531be30f1f1c33e67758480471434a3a4a923ebd23021b026eb72bede6140441d4cd33f82e31e28ac28f93f8f932883d977a0c815cc3c36153c64295258754ec1729b1a2d6b4be0662c24411374eb8490320d151986e031fb58eb634be0d8364eab77191896057d7d90e245a4ee27dc5129b2469649bd76ffda84fa206b9890680a34fff99924adfa9a6e474e341078bff3464a48e0712bc7f503ba3dc314088eb4a068ca236a522db5f3c0fb88065dc476668bfe7d54c78b440a977ae75720b0b2e2ab3091b115532f75ba07626fd280c9847444021b63db27bfb9f49e941072d606db6b4a3ec2dbc9161f5b9455b89683a7ef34a5096dbc5e9220cdb749ed068f84afc8173395ea99ac80030d8940e96270596b1eb323ea88d96e2293f4444925995dc254d1e2d80e89d13a1d7d87feda58275133953fcce2a7b3c8267039ea772ce76002d5bd0d64417d7e07850ac60726d391f5cffad156a336c3c3166ae969fdbf6b83a575422fba544245777c7a892f5f", 0xfe0, 0x0) keyctl$search(0xa, r2, &(0x7f00000002c0)='cifs.idmap\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, r3) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000000200)={0x5, &(0x7f0000000580)=""/232, &(0x7f00000009c0)=[{0x27b, 0x38, 0x0, &(0x7f00000001c0)=""/56}, {0xfffffffffffffffc, 0xe3, 0x7, &(0x7f0000000680)=""/227}, {0x5, 0xc7, 0x0, &(0x7f0000000780)=""/199}, {0x0, 0x4a, 0x6, &(0x7f0000000880)=""/74}, {0x0, 0x8f, 0xcd, &(0x7f0000000900)=""/143}]}) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) r4 = gettid() sched_rr_get_interval(r4, &(0x7f0000000180)) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x80, &(0x7f0000000b00)=[@in6={0xa, 0x0, 0x1e, @remote={0xfe, 0x80, [], 0xbb}}, @in6={0xa, 0x0, 0xfffffffffffffffe, @mcast1={0xff, 0x1, [], 0x1}, 0x6}, @in6={0xa, 0x0, 0x200, @empty, 0x9}, @in6={0xa, 0x0, 0x2, @dev={0xfe, 0x80, [], 0x14}, 0x3f}, @in={0x2, 0x4e23}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x4766}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000400)={r5, 0x0, 0xffffffff, 0x0, 0x0, 0x200, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @broadcast=0xffffffff}}, 0x0, 0x7f, 0x0, 0x0, 0xc3}}, &(0x7f00000004c0)=0xb0) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) accept4$unix(r1, &(0x7f0000000500)=@abs, &(0x7f0000000100)=0xffffffffffffff4b, 0x0) 2018/03/31 03:09:21 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 663.170056] device lo left promiscuous mode [ 663.215790] device lo entered promiscuous mode 2018/03/31 03:09:22 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0x0, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) [ 663.892018] device lo left promiscuous mode [ 663.897379] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 663.903562] device lo entered promiscuous mode 2018/03/31 03:09:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r3 = syz_open_pts(r0, 0x2) dup3(r3, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:23 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:23 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x9a, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713"}, &(0x7f0000000900)=0xa2) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:23 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:23 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:23 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0x0, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:23 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x9a, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713"}, &(0x7f0000000900)=0xa2) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:23 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 664.835338] device lo left promiscuous mode [ 664.869389] device lo left promiscuous mode [ 664.874563] device lo left promiscuous mode [ 664.879457] device lo left promiscuous mode [ 664.884329] device lo left promiscuous mode [ 664.891383] device lo left promiscuous mode [ 664.896224] device lo entered promiscuous mode [ 664.898182] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 664.907676] device lo entered promiscuous mode [ 664.913610] device lo entered promiscuous mode [ 664.918979] device lo entered promiscuous mode [ 664.925542] device lo entered promiscuous mode [ 664.931262] device lo entered promiscuous mode 2018/03/31 03:09:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r3 = syz_open_pts(r0, 0x2) dup3(r3, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:24 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0x0, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:24 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:24 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d2"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:24 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0xc6}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:24 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00'}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:24 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x9a, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713"}, &(0x7f0000000900)=0xa2) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:24 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x9a, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713"}, &(0x7f0000000900)=0xa2) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 665.840298] device lo left promiscuous mode [ 665.845633] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 665.851989] device lo entered promiscuous mode [ 665.860644] device lo left promiscuous mode [ 665.907792] device lo entered promiscuous mode [ 665.950044] device lo left promiscuous mode [ 665.958582] device lo entered promiscuous mode [ 666.070108] device lo left promiscuous mode [ 666.075577] device lo entered promiscuous mode [ 666.140644] device lo left promiscuous mode [ 666.146158] device lo entered promiscuous mode [ 666.220036] device lo left promiscuous mode [ 666.225615] device lo entered promiscuous mode 2018/03/31 03:09:24 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x7, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) [ 666.801883] device lo left promiscuous mode [ 666.807464] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 666.813723] device lo entered promiscuous mode 2018/03/31 03:09:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:25 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) 2018/03/31 03:09:25 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:25 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00'}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:25 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0xc6}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:25 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xa5, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0"}, &(0x7f0000000900)=0xad) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d2"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:25 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x7, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:25 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x9a, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713"}, &(0x7f0000000900)=0xa2) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 667.744895] device lo left promiscuous mode [ 667.780437] device lo left promiscuous mode [ 667.785325] device lo left promiscuous mode [ 667.790193] device lo left promiscuous mode [ 667.795027] device lo left promiscuous mode [ 667.799861] device lo left promiscuous mode [ 667.804813] device lo entered promiscuous mode [ 667.805834] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 667.817434] device lo entered promiscuous mode [ 667.822773] device lo entered promiscuous mode [ 667.828022] device lo entered promiscuous mode [ 667.834375] device lo entered promiscuous mode [ 667.839795] device lo entered promiscuous mode 2018/03/31 03:09:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:26 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x7, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:26 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) [ 668.770012] device lo left promiscuous mode [ 668.775267] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 668.781481] device lo entered promiscuous mode [ 668.839623] device lo left promiscuous mode [ 668.875073] device lo entered promiscuous mode 2018/03/31 03:09:28 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xa5, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0"}, &(0x7f0000000900)=0xad) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:28 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0xc6}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:28 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xa5, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0"}, &(0x7f0000000900)=0xad) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:28 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00'}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:28 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d2"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) 2018/03/31 03:09:28 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) 2018/03/31 03:09:28 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x0, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) [ 669.816649] device lo left promiscuous mode [ 669.821640] device lo left promiscuous mode [ 669.828279] device lo left promiscuous mode [ 669.833591] device lo left promiscuous mode [ 669.838659] device lo left promiscuous mode [ 669.843517] device lo entered promiscuous mode [ 669.843871] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 669.854886] device lo entered promiscuous mode [ 669.860981] device lo entered promiscuous mode [ 669.866263] device lo entered promiscuous mode [ 669.871693] device lo entered promiscuous mode [ 669.877311] device lo left promiscuous mode [ 669.913534] device lo entered promiscuous mode 2018/03/31 03:09:28 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x0, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:29 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600), 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:29 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xa5, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0"}, &(0x7f0000000900)=0xad) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:29 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f000032df3a)=""/198, 0xc6}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:29 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xa5, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0"}, &(0x7f0000000900)=0xad) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:29 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) 2018/03/31 03:09:29 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 670.790443] device lo left promiscuous mode [ 670.797540] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 670.803819] device lo entered promiscuous mode [ 670.839395] device lo entered promiscuous mode [ 670.910207] device lo left promiscuous mode [ 670.915519] device lo entered promiscuous mode [ 670.939864] device lo left promiscuous mode [ 670.945240] device lo entered promiscuous mode [ 670.969957] device lo left promiscuous mode [ 670.975254] device lo entered promiscuous mode [ 671.120051] device lo left promiscuous mode [ 671.155752] device lo entered promiscuous mode [ 671.164247] device lo left promiscuous mode [ 671.169721] device lo entered promiscuous mode 2018/03/31 03:09:29 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x0, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:30 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600), 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 671.764628] device lo left promiscuous mode [ 671.770035] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 671.776283] device lo entered promiscuous mode 2018/03/31 03:09:30 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xab, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac"}, &(0x7f0000000900)=0xb3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 671.909846] device lo left promiscuous mode [ 671.915369] device lo entered promiscuous mode [ 671.940497] device lo left promiscuous mode [ 671.945799] device lo entered promiscuous mode 2018/03/31 03:09:31 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f000032df3a)=""/198, 0xc6}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:31 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) 2018/03/31 03:09:31 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:31 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xa5, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0"}, &(0x7f0000000900)=0xad) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:31 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x7, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:31 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xab, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac"}, &(0x7f0000000900)=0xb3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:31 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600), 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 672.923771] device lo left promiscuous mode [ 672.929495] device lo left promiscuous mode [ 672.965754] device lo left promiscuous mode [ 672.970620] device lo left promiscuous mode [ 672.975463] device lo left promiscuous mode [ 672.980953] device lo entered promiscuous mode [ 672.986716] device lo left promiscuous mode [ 672.991501] device lo entered promiscuous mode [ 672.996767] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 673.002836] device lo left promiscuous mode [ 673.007862] device lo entered promiscuous mode [ 673.013502] device lo entered promiscuous mode [ 673.018833] device lo entered promiscuous mode [ 673.024111] device lo entered promiscuous mode [ 673.029797] device lo entered promiscuous mode 2018/03/31 03:09:32 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x7, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb11709fcca9c031f228513ec4508000008b9df5e1feb6a93f901ae128a0d47193c870fc5b13c3f0517408d27bdeaffab16772538eb171fd916949f62d43e25d81f02557f68ee691807dd0cbabc21ffc57635a00ef32dc135ee9c6bfdbec44e087dd394ebb92d48bd5260dfeb7b4c0df04c3ec400b420bc6b2394a323a6789ab9fc182e6e44da6d36a5b1039f4c54efd5dc2af05bd0900f185371a635ae492062a715248eed51397ad30eb1959e1e8348220e7404895b0104fc2a8f3eb2a2676e8ec71ecad157fbf57b216c7b1e5faa3fdda4613f36f3803ed52eab02302dfed9e0f2b04f8e209ac52f554f9b1233e57e84c7f39ca10545db511ecbc920c704830bccb89ec093da067a9c525780c06540ef8cbd447b141d898b8549ff0a3e06dc3a14debe12867ab01b9a5c6b0dd89c81637cb2f3a93ec1e0d0c35fb0c24c26d7b7c3130b4507de326a50d43fb0d8cb0eb132cd5f6b07f7c841a27bc17a4600000000fec9ce4801a3c142e2753925f40f026b65043bb9f3d088e385c7e055bea63e98ba362d1125bf5fe11af8c3556c893a8076cb7f0fcb36ca1c490791ee89b006a06520632950c039b35374036bb0dd5ff42f80e6c5df7c71e84ac25103e64eaa2961f9e9ec488c3797016fc5d93e2b23c898be9bde18e2986e4da7c71aabd6da708f065b23e5fddddbec9acce07ce01651b7bcfd9582b2add5d20f09348b5c33cbc287f670893e8c68b5f4533981a7c70a2e0ea7831bd7bfae765047f1d5654f054fabcd7359000000000000000000000000409d19935ac1917d808e4bb70a3884065698bea2d51aeaf22a95a4aca100273ed7ac0123b34e57fa08248f5bd9f3d8be7134bb6cc9947174378a3253e8074640e54b5afb9015a02afc291c0f2ff9c7cc1e96aa08c5549eded6eecba119401fa2eb7a35cb81e34846eedfac26fdb22a78a6f6d64a533afd9c2aba7cc1ab5175acdbd79b1e450dc64d6b6ba20b659e3878d6927224371cf42df28b79334e40280b9b08f96d89269d87176d5b6643e2591b6cf7607eaabab600"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:32 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:32 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f000032df3a)=""/198, 0xc6}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:32 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:32 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:32 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xab, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac"}, &(0x7f0000000900)=0xb3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:32 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xab, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac"}, &(0x7f0000000900)=0xb3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 673.892748] device lo left promiscuous mode [ 673.898202] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 673.904397] device lo entered promiscuous mode [ 673.949635] device lo left promiscuous mode [ 673.985308] device lo entered promiscuous mode 2018/03/31 03:09:32 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 674.029809] device lo left promiscuous mode [ 674.035150] device lo entered promiscuous mode [ 674.059678] device lo left promiscuous mode [ 674.064939] device lo entered promiscuous mode [ 674.089880] device lo left promiscuous mode [ 674.095141] device lo entered promiscuous mode [ 674.199924] device lo left promiscuous mode [ 674.205332] device lo entered promiscuous mode [ 674.360165] device lo left promiscuous mode [ 674.365529] device lo entered promiscuous mode 2018/03/31 03:09:32 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 674.450043] device lo left promiscuous mode [ 674.455402] device lo entered promiscuous mode 2018/03/31 03:09:32 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 674.550285] device lo left promiscuous mode [ 674.555669] device lo entered promiscuous mode [ 674.620188] device lo left promiscuous mode [ 674.625583] device lo entered promiscuous mode 2018/03/31 03:09:33 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x7, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:33 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:33 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xae, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81"}, &(0x7f0000000900)=0xb6) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:33 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:33 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:33 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:33 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xab, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac"}, &(0x7f0000000900)=0xb3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 675.593861] device lo left promiscuous mode [ 675.603903] device lo left promiscuous mode [ 675.603993] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 675.643564] device lo left promiscuous mode [ 675.649801] device lo left promiscuous mode [ 675.654711] device lo entered promiscuous mode [ 675.660844] device lo left promiscuous mode [ 675.666214] device lo left promiscuous mode [ 675.671549] device lo left promiscuous mode [ 675.676537] device lo entered promiscuous mode [ 675.681781] device lo entered promiscuous mode [ 675.687537] device lo entered promiscuous mode [ 675.692730] device lo entered promiscuous mode [ 675.698084] device lo entered promiscuous mode [ 675.703392] device lo entered promiscuous mode 2018/03/31 03:09:34 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb11709fcca9c031f228513ec4508000008b9df5e1feb6a93f901ae128a0d47193c870fc5b13c3f0517408d27bdeaffab16772538eb171fd916949f62d43e25d81f02557f68ee691807dd0cbabc21ffc57635a00ef32dc135ee9c6bfdbec44e087dd394ebb92d48bd5260dfeb7b4c0df04c3ec400b420bc6b2394a323a6789ab9fc182e6e44da6d36a5b1039f4c54efd5dc2af05bd0900f185371a635ae492062a715248eed51397ad30eb1959e1e8348220e7404895b0104fc2a8f3eb2a2676e8ec71ecad157fbf57b216c7b1e5faa3fdda4613f36f3803ed52eab02302dfed9e0f2b04f8e209ac52f554f9b1233e57e84c7f39ca10545db511ecbc920c704830bccb89ec093da067a9c525780c06540ef8cbd447b141d898b8549ff0a3e06dc3a14debe12867ab01b9a5c6b0dd89c81637cb2f3a93ec1e0d0c35fb0c24c26d7b7c3130b4507de326a50d43fb0d8cb0eb132cd5f6b07f7c841a27bc17a4600000000fec9ce4801a3c142e2753925f40f026b65043bb9f3d088e385c7e055bea63e98ba362d1125bf5fe11af8c3556c893a8076cb7f0fcb36ca1c490791ee89b006a06520632950c039b35374036bb0dd5ff42f80e6c5df7c71e84ac25103e64eaa2961f9e9ec488c3797016fc5d93e2b23c898be9bde18e2986e4da7c71aabd6da708f065b23e5fddddbec9acce07ce01651b7bcfd9582b2add5d20f09348b5c33cbc287f670893e8c68b5f4533981a7c70a2e0ea7831bd7bfae765047f1d5654f054fabcd7359000000000000000000000000409d19935ac1917d808e4bb70a3884065698bea2d51aeaf22a95a4aca100273ed7ac0123b34e57fa08248f5bd9f3d8be7134bb6cc9947174378a3253e8074640e54b5afb9015a02afc291c0f2ff9c7cc1e96aa08c5549eded6eecba119401fa2eb7a35cb81e34846eedfac26fdb22a78a6f6d64a533afd9c2aba7cc1ab5175acdbd79b1e450dc64d6b6ba20b659e3878d6927224371cf42df28b79334e40280b9b08f96d89269d87176d5b6643e2591b6cf7607eaabab600"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:34 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:34 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xab, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac"}, &(0x7f0000000900)=0xb3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 676.562834] device lo left promiscuous mode [ 676.568367] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 676.575917] device lo entered promiscuous mode [ 676.620143] device lo left promiscuous mode [ 676.656830] device lo entered promiscuous mode [ 676.680584] device lo left promiscuous mode [ 676.686124] device lo entered promiscuous mode 2018/03/31 03:09:35 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:35 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:35 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:35 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xae, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81"}, &(0x7f0000000900)=0xb6) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:35 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:35 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xae, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81"}, &(0x7f0000000900)=0xb6) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:35 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 677.668344] device lo left promiscuous mode [ 677.675565] device lo left promiscuous mode [ 677.680551] device lo left promiscuous mode [ 677.685413] device lo left promiscuous mode [ 677.690285] device lo left promiscuous mode [ 677.725502] device lo left promiscuous mode [ 677.730722] device lo entered promiscuous mode [ 677.732823] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 677.741901] device lo entered promiscuous mode [ 677.747257] device lo entered promiscuous mode [ 677.752494] device lo entered promiscuous mode [ 677.759133] device lo entered promiscuous mode [ 677.764353] device lo left promiscuous mode [ 677.769244] device lo entered promiscuous mode [ 677.774608] device lo entered promiscuous mode 2018/03/31 03:09:36 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb11709fcca9c031f228513ec4508000008b9df5e1feb6a93f901ae128a0d47193c870fc5b13c3f0517408d27bdeaffab16772538eb171fd916949f62d43e25d81f02557f68ee691807dd0cbabc21ffc57635a00ef32dc135ee9c6bfdbec44e087dd394ebb92d48bd5260dfeb7b4c0df04c3ec400b420bc6b2394a323a6789ab9fc182e6e44da6d36a5b1039f4c54efd5dc2af05bd0900f185371a635ae492062a715248eed51397ad30eb1959e1e8348220e7404895b0104fc2a8f3eb2a2676e8ec71ecad157fbf57b216c7b1e5faa3fdda4613f36f3803ed52eab02302dfed9e0f2b04f8e209ac52f554f9b1233e57e84c7f39ca10545db511ecbc920c704830bccb89ec093da067a9c525780c06540ef8cbd447b141d898b8549ff0a3e06dc3a14debe12867ab01b9a5c6b0dd89c81637cb2f3a93ec1e0d0c35fb0c24c26d7b7c3130b4507de326a50d43fb0d8cb0eb132cd5f6b07f7c841a27bc17a4600000000fec9ce4801a3c142e2753925f40f026b65043bb9f3d088e385c7e055bea63e98ba362d1125bf5fe11af8c3556c893a8076cb7f0fcb36ca1c490791ee89b006a06520632950c039b35374036bb0dd5ff42f80e6c5df7c71e84ac25103e64eaa2961f9e9ec488c3797016fc5d93e2b23c898be9bde18e2986e4da7c71aabd6da708f065b23e5fddddbec9acce07ce01651b7bcfd9582b2add5d20f09348b5c33cbc287f670893e8c68b5f4533981a7c70a2e0ea7831bd7bfae765047f1d5654f054fabcd7359000000000000000000000000409d19935ac1917d808e4bb70a3884065698bea2d51aeaf22a95a4aca100273ed7ac0123b34e57fa08248f5bd9f3d8be7134bb6cc9947174378a3253e8074640e54b5afb9015a02afc291c0f2ff9c7cc1e96aa08c5549eded6eecba119401fa2eb7a35cb81e34846eedfac26fdb22a78a6f6d64a533afd9c2aba7cc1ab5175acdbd79b1e450dc64d6b6ba20b659e3878d6927224371cf42df28b79334e40280b9b08f96d89269d87176d5b6643e2591b6cf7607eaabab600"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:36 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r3, &(0x7f0000fd1ff6)='stack\x00') preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:36 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r3, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:36 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:36 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xae, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81"}, &(0x7f0000000900)=0xb6) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d2"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:36 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 678.644362] device lo left promiscuous mode [ 678.652103] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 678.658302] device lo entered promiscuous mode 2018/03/31 03:09:36 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xae, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81"}, &(0x7f0000000900)=0xb6) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 678.749292] device lo left promiscuous mode [ 678.784320] device lo entered promiscuous mode [ 678.799658] device lo left promiscuous mode [ 678.804948] device lo entered promiscuous mode [ 678.829620] device lo left promiscuous mode [ 678.834888] device lo entered promiscuous mode [ 678.859724] device lo left promiscuous mode [ 678.865021] device lo entered promiscuous mode [ 678.879899] device lo left promiscuous mode [ 678.885263] device lo entered promiscuous mode [ 678.919887] device lo left promiscuous mode [ 678.925209] device lo entered promiscuous mode 2018/03/31 03:09:37 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x0]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) [ 679.610403] device lo left promiscuous mode [ 679.615822] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 679.622414] device lo entered promiscuous mode 2018/03/31 03:09:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:38 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r3, &(0x7f0000fd1ff6)='stack\x00') preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:38 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r3, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:38 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:38 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xaf, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb"}, &(0x7f0000000900)=0xb7) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:38 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x0]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:38 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:38 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xae, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81"}, &(0x7f0000000900)=0xb6) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 680.550887] device lo left promiscuous mode [ 680.555951] device lo left promiscuous mode [ 680.560917] device lo left promiscuous mode [ 680.565842] device lo left promiscuous mode [ 680.571953] device lo left promiscuous mode [ 680.576924] device lo left promiscuous mode [ 680.612331] device lo entered promiscuous mode [ 680.617769] device lo entered promiscuous mode [ 680.622934] device lo entered promiscuous mode [ 680.628331] device lo entered promiscuous mode [ 680.633674] device lo left promiscuous mode [ 680.638668] device lo entered promiscuous mode [ 680.643715] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 680.644628] device lo entered promiscuous mode [ 680.655068] device lo entered promiscuous mode 2018/03/31 03:09:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r2, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r3 = syz_open_pts(r0, 0x2) dup3(r3, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:39 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x0]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:39 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xaf, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb"}, &(0x7f0000000900)=0xb7) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:39 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r3, &(0x7f0000fd1ff6)='stack\x00') preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:39 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xaf, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb"}, &(0x7f0000000900)=0xb7) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:39 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:39 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:39 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r3, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) [ 681.580300] device lo left promiscuous mode [ 681.585555] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 681.591840] device lo entered promiscuous mode [ 681.609571] device lo left promiscuous mode [ 681.614800] device lo entered promiscuous mode [ 681.669888] device lo left promiscuous mode [ 681.705360] device lo entered promiscuous mode [ 681.714499] device lo left promiscuous mode [ 681.719818] device lo entered promiscuous mode [ 681.749681] device lo left promiscuous mode [ 681.754983] device lo entered promiscuous mode [ 681.779911] device lo left promiscuous mode [ 681.785194] device lo entered promiscuous mode [ 681.880063] device lo left promiscuous mode [ 681.885638] device lo entered promiscuous mode 2018/03/31 03:09:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r2, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r3 = syz_open_pts(r0, 0x2) dup3(r3, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:41 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:41 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xaf, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb"}, &(0x7f0000000900)=0xb7) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:41 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xaf, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb"}, &(0x7f0000000900)=0xb7) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:41 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:41 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x0], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:41 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0x58, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db07790967382"}, &(0x7f0000000900)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:41 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 682.860551] device lo left promiscuous mode [ 682.865544] device lo left promiscuous mode [ 682.870567] device lo left promiscuous mode [ 682.874293] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 682.912150] device lo left promiscuous mode [ 682.917256] device lo entered promiscuous mode [ 682.922611] device lo left promiscuous mode [ 682.927606] device lo entered promiscuous mode [ 682.932999] device lo left promiscuous mode [ 682.938804] device lo entered promiscuous mode [ 682.944049] device lo entered promiscuous mode [ 682.950082] device lo entered promiscuous mode [ 682.956001] device lo left promiscuous mode [ 682.961016] device lo entered promiscuous mode [ 682.966620] device lo entered promiscuous mode 2018/03/31 03:09:42 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb11709fcca9c031f228513ec4508000008b9df5e1feb6a93f901ae128a0d47193c870fc5b13c3f0517408d27bdeaffab16772538eb171fd916949f62d43e25d81f02557f68ee691807dd0cbabc21ffc57635a00ef32dc135ee9c6bfdbec44e087dd394ebb92d48bd5260dfeb7b4c0df04c3ec400b420bc6b2394a323a6789ab9fc182e6e44da6d36a5b1039f4c54efd5dc2af05bd0900f185371a635ae492062a715248eed51397ad30eb1959e1e8348220e7404895b0104fc2a8f3eb2a2676e8ec71ecad157fbf57b216c7b1e5faa3fdda4613f36f3803ed52eab02302dfed9e0f2b04f8e209ac52f554f9b1233e57e84c7f39ca10545db511ecbc920c704830bccb89ec093da067a9c525780c06540ef8cbd447b141d898b8549ff0a3e06dc3a14debe12867ab01b9a5c6b0dd89c81637cb2f3a93ec1e0d0c35fb0c24c26d7b7c3130b4507de326a50d43fb0d8cb0eb132cd5f6b07f7c841a27bc17a4600000000fec9ce4801a3c142e2753925f40f026b65043bb9f3d088e385c7e055bea63e98ba362d1125bf5fe11af8c3556c893a8076cb7f0fcb36ca1c490791ee89b006a06520632950c039b35374036bb0dd5ff42f80e6c5df7c71e84ac25103e64eaa2961f9e9ec488c3797016fc5d93e2b23c898be9bde18e2986e4da7c71aabd6da708f065b23e5fddddbec9acce07ce01651b7bcfd9582b2add5d20f09348b5c33cbc287f670893e8c68b5f4533981a7c70a2e0ea7831bd7bfae765047f1d5654f054fabcd7359000000000000000000000000409d19935ac1917d808e4bb70a3884065698bea2d51aeaf22a95a4aca100273ed7ac0123b34e57fa08248f5bd9f3d8be7134bb6cc9947174378a3253e8074640e54b5afb9015a02afc291c0f2ff9c7cc1e96aa08c5549eded6eecba119401fa2eb7a35cb81e34846eedfac26fdb22a78a6f6d64a533afd9c2aba7cc1ab5175acdbd79b1e450dc64d6b6ba20b659e3878d6927224371cf42df28b79334e40280b9b08f96d89269d87176d5b6643e2591b6cf7607eaabab600"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r2, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r3 = syz_open_pts(r0, 0x2) dup3(r3, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:42 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:42 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:42 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xaf, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb"}, &(0x7f0000000900)=0xb7) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:42 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:42 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 683.835671] device lo left promiscuous mode [ 683.842086] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 683.848549] device lo entered promiscuous mode 2018/03/31 03:09:42 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x0], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 683.899519] device lo left promiscuous mode [ 683.937144] device lo entered promiscuous mode [ 683.959776] device lo left promiscuous mode [ 683.965041] device lo entered promiscuous mode [ 684.029858] device lo left promiscuous mode [ 684.035228] device lo entered promiscuous mode [ 684.059984] device lo left promiscuous mode [ 684.068191] device lo entered promiscuous mode [ 684.140123] device lo left promiscuous mode [ 684.145619] device lo entered promiscuous mode [ 684.169979] device lo left promiscuous mode [ 684.175352] device lo entered promiscuous mode 2018/03/31 03:09:43 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:43 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:43 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:43 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:43 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x0], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:43 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:43 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d2"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) [ 685.149564] device lo left promiscuous mode [ 685.154909] device lo left promiscuous mode [ 685.190565] device lo left promiscuous mode [ 685.195531] device lo left promiscuous mode [ 685.201973] device lo left promiscuous mode [ 685.204104] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 685.212756] device lo entered promiscuous mode [ 685.218030] device lo entered promiscuous mode [ 685.223242] device lo entered promiscuous mode [ 685.229992] device lo left promiscuous mode [ 685.235220] device lo entered promiscuous mode [ 685.240713] device lo entered promiscuous mode [ 685.245922] device lo entered promiscuous mode [ 685.254786] device lo left promiscuous mode [ 685.260452] device lo entered promiscuous mode 2018/03/31 03:09:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:44 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:44 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:44 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:44 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:44 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x2, 0x0, &(0x7f0000000440)=[0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:44 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:44 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) [ 686.238274] device lo left promiscuous mode [ 686.244232] device lo left promiscuous mode [ 686.250547] device lo left promiscuous mode [ 686.254932] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 686.261841] device lo left promiscuous mode [ 686.298128] device lo entered promiscuous mode [ 686.303319] device lo entered promiscuous mode [ 686.309014] device lo entered promiscuous mode [ 686.314334] device lo left promiscuous mode [ 686.320300] device lo entered promiscuous mode [ 686.325581] device lo entered promiscuous mode [ 686.331059] device lo left promiscuous mode [ 686.336309] device lo entered promiscuous mode [ 686.550076] device lo left promiscuous mode [ 686.555621] device lo entered promiscuous mode 2018/03/31 03:09:45 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:45 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:45 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:45 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d2"], &(0x7f00000009c0)=0x1) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:45 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) [ 687.203982] device lo left promiscuous mode [ 687.209352] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 687.215504] device lo entered promiscuous mode 2018/03/31 03:09:45 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d2"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 687.279362] device lo left promiscuous mode [ 687.285860] device lo entered promiscuous mode [ 687.319668] device lo left promiscuous mode [ 687.357419] device lo entered promiscuous mode 2018/03/31 03:09:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) [ 687.379977] device lo left promiscuous mode [ 687.386918] device lo entered promiscuous mode [ 687.419885] device lo left promiscuous mode [ 687.425180] device lo entered promiscuous mode 2018/03/31 03:09:45 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x2, 0x0, &(0x7f0000000440)=[0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 687.490095] device lo left promiscuous mode [ 687.495482] device lo entered promiscuous mode [ 687.649993] device lo left promiscuous mode [ 687.655565] device lo entered promiscuous mode 2018/03/31 03:09:46 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) [ 688.170523] device lo left promiscuous mode [ 688.175921] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 688.182462] device lo entered promiscuous mode 2018/03/31 03:09:46 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f"], &(0x7f00000009c0)=0x1) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:46 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:46 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f00000009c0)=0x1) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 688.290399] device lo left promiscuous mode [ 688.295713] device lo entered promiscuous mode [ 688.329632] device lo left promiscuous mode 2018/03/31 03:09:46 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) [ 688.366886] device lo entered promiscuous mode 2018/03/31 03:09:46 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 688.440211] device lo left promiscuous mode [ 688.445611] device lo entered promiscuous mode [ 688.470211] device lo left promiscuous mode [ 688.475548] device lo entered promiscuous mode [ 688.559442] device lo left promiscuous mode [ 688.565002] device lo entered promiscuous mode 2018/03/31 03:09:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:47 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x2, 0x0, &(0x7f0000000440)=[0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:47 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(0xffffffffffffffff, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:47 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f00000009c0)=0x1) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:47 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f00000009c0)=0x1) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:47 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:47 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:47 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) [ 689.540326] device lo left promiscuous mode [ 689.545373] device lo left promiscuous mode [ 689.550978] device lo left promiscuous mode [ 689.584887] device lo left promiscuous mode [ 689.590080] device lo left promiscuous mode [ 689.595412] device lo left promiscuous mode [ 689.597023] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 689.606073] device lo entered promiscuous mode [ 689.611526] device lo entered promiscuous mode [ 689.616977] device lo left promiscuous mode [ 689.621799] device lo entered promiscuous mode [ 689.627791] device lo entered promiscuous mode [ 689.633072] device lo entered promiscuous mode [ 689.638787] device lo entered promiscuous mode [ 689.644099] device lo entered promiscuous mode 2018/03/31 03:09:48 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(0xffffffffffffffff, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:48 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) readv(0xffffffffffffffff, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r2, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r0, 0x5428) r3 = syz_open_pts(0xffffffffffffffff, 0x2) dup3(r3, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r1, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:48 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f00000009c0)=0x1) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:48 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:48 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:48 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:48 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:48 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) readv(0xffffffffffffffff, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r2, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r0, 0x5428) r3 = syz_open_pts(0xffffffffffffffff, 0x2) dup3(r3, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r1, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:48 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) [ 690.513388] device lo left promiscuous mode [ 690.518707] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 690.524928] device lo entered promiscuous mode [ 690.569223] device lo left promiscuous mode [ 690.574496] device lo entered promiscuous mode [ 690.619831] device lo left promiscuous mode [ 690.656365] device lo entered promiscuous mode [ 690.689943] device lo left promiscuous mode [ 690.695302] device lo entered promiscuous mode [ 690.720395] device lo left promiscuous mode [ 690.725697] device lo entered promiscuous mode [ 690.750132] device lo left promiscuous mode [ 690.755426] device lo entered promiscuous mode 2018/03/31 03:09:49 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) readv(0xffffffffffffffff, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r2, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r0, 0x5428) r3 = syz_open_pts(0xffffffffffffffff, 0x2) dup3(r3, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r1, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) [ 690.820558] device lo left promiscuous mode [ 690.825932] device lo entered promiscuous mode 2018/03/31 03:09:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb11709fcca9c031f228513ec4508000008b9df5e1feb6a93f901ae128a0d47193c870fc5b13c3f0517408d27bdeaffab16772538eb171fd916949f62d43e25d81f02557f68ee691807dd0cbabc21ffc57635a00ef32dc135ee9c6bfdbec44e087dd394ebb92d48bd5260dfeb7b4c0df04c3ec400b420bc6b2394a323a6789ab9fc182e6e44da6d36a5b1039f4c54efd5dc2af05bd0900f185371a635ae492062a715248eed51397ad30eb1959e1e8348220e7404895b0104fc2a8f3eb2a2676e8ec71ecad157fbf57b216c7b1e5faa3fdda4613f36f3803ed52eab02302dfed9e0f2b04f8e209ac52f554f9b1233e57e84c7f39ca10545db511ecbc920c704830bccb89ec093da067a9c525780c06540ef8cbd447b141d898b8549ff0a3e06dc3a14debe12867ab01b9a5c6b0dd89c81637cb2f3a93ec1e0d0c35fb0c24c26d7b7c3130b4507de326a50d43fb0d8cb0eb132cd5f6b07f7c841a27bc17a4600000000fec9ce4801a3c142e2753925f40f026b65043bb9f3d088e385c7e055bea63e98ba362d1125bf5fe11af8c3556c893a8076cb7f0fcb36ca1c490791ee89b006a06520632950c039b35374036bb0dd5ff42f80e6c5df7c71e84ac25103e64eaa2961f9e9ec488c3797016fc5d93e2b23c898be9bde18e2986e4da7c71aabd6da708f065b23e5fddddbec9acce07ce01651b7bcfd9582b2add5d20f09348b5c33cbc287f670893e8c68b5f4533981a7c70a2e0ea7831bd7bfae765047f1d5654f054fabcd7359000000000000000000000000409d19935ac1917d808e4bb70a3884065698bea2d51aeaf22a95a4aca100273ed7ac0123b34e57fa08248f5bd9f3d8be7134bb6cc9947174378a3253e8074640e54b5afb9015a02afc291c0f2ff9c7cc1e96aa08c5549eded6eecba119401fa2eb7a35cb81e34846eedfac26fdb22a78a6f6d64a533afd9c2aba7cc1ab5175acdbd79b1e450dc64d6b6ba20b659e3878d6927224371cf42df28b79334e40280b9b08f96d89269d87176d5b6643e2591b6cf7607eaabab600"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:50 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(0xffffffffffffffff, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:50 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:50 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:50 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:50 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:50 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:50 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) [ 692.088763] device lo left promiscuous mode [ 692.093760] device lo left promiscuous mode [ 692.127923] device lo left promiscuous mode [ 692.132824] device lo left promiscuous mode [ 692.139132] device lo left promiscuous mode [ 692.143974] device lo left promiscuous mode [ 692.146485] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 692.154740] device lo left promiscuous mode [ 692.159544] device lo entered promiscuous mode [ 692.164888] device lo entered promiscuous mode [ 692.170199] device lo entered promiscuous mode [ 692.175515] device lo entered promiscuous mode [ 692.181665] device lo entered promiscuous mode [ 692.187186] device lo entered promiscuous mode [ 692.192351] device lo entered promiscuous mode 2018/03/31 03:09:51 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:51 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) socket$inet_tcp(0x2, 0x1, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:51 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:51 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:51 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:51 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) [ 693.052115] device lo left promiscuous mode [ 693.064219] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 693.073120] device lo entered promiscuous mode [ 693.139723] device lo left promiscuous mode [ 693.177081] device lo entered promiscuous mode [ 693.209870] device lo left promiscuous mode [ 693.215234] device lo entered promiscuous mode [ 693.239768] device lo left promiscuous mode [ 693.245131] device lo entered promiscuous mode [ 693.270222] device lo left promiscuous mode [ 693.275550] device lo entered promiscuous mode [ 693.289908] device lo left promiscuous mode [ 693.295166] device lo entered promiscuous mode 2018/03/31 03:09:52 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:52 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:52 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) socket$inet_tcp(0x2, 0x1, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:52 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8], &(0x7f00000009c0)=0x1) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:52 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:52 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:52 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) socket$inet_tcp(0x2, 0x1, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(0xffffffffffffffff, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb11709fcca9c031f228513ec4508000008b9df5e1feb6a93f901ae128a0d47193c870fc5b13c3f0517408d27bdeaffab16772538eb171fd916949f62d43e25d81f02557f68ee691807dd0cbabc21ffc57635a00ef32dc135ee9c6bfdbec44e087dd394ebb92d48bd5260dfeb7b4c0df04c3ec400b420bc6b2394a323a6789ab9fc182e6e44da6d36a5b1039f4c54efd5dc2af05bd0900f185371a635ae492062a715248eed51397ad30eb1959e1e8348220e7404895b0104fc2a8f3eb2a2676e8ec71ecad157fbf57b216c7b1e5faa3fdda4613f36f3803ed52eab02302dfed9e0f2b04f8e209ac52f554f9b1233e57e84c7f39ca10545db511ecbc920c704830bccb89ec093da067a9c525780c06540ef8cbd447b141d898b8549ff0a3e06dc3a14debe12867ab01b9a5c6b0dd89c81637cb2f3a93ec1e0d0c35fb0c24c26d7b7c3130b4507de326a50d43fb0d8cb0eb132cd5f6b07f7c841a27bc17a4600000000fec9ce4801a3c142e2753925f40f026b65043bb9f3d088e385c7e055bea63e98ba362d1125bf5fe11af8c3556c893a8076cb7f0fcb36ca1c490791ee89b006a06520632950c039b35374036bb0dd5ff42f80e6c5df7c71e84ac25103e64eaa2961f9e9ec488c3797016fc5d93e2b23c898be9bde18e2986e4da7c71aabd6da708f065b23e5fddddbec9acce07ce01651b7bcfd9582b2add5d20f09348b5c33cbc287f670893e8c68b5f4533981a7c70a2e0ea7831bd7bfae765047f1d5654f054fabcd7359000000000000000000000000409d19935ac1917d808e4bb70a3884065698bea2d51aeaf22a95a4aca100273ed7ac0123b34e57fa08248f5bd9f3d8be7134bb6cc9947174378a3253e8074640e54b5afb9015a02afc291c0f2ff9c7cc1e96aa08c5549eded6eecba119401fa2eb7a35cb81e34846eedfac26fdb22a78a6f6d64a533afd9c2aba7cc1ab5175acdbd79b1e450dc64d6b6ba20b659e3878d6927224371cf42df28b79334e40280b9b08f96d89269d87176d5b6643e2591b6cf7607eaabab600"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) [ 694.343363] device lo left promiscuous mode [ 694.348446] device lo left promiscuous mode [ 694.348971] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 694.388691] device lo left promiscuous mode [ 694.393649] device lo left promiscuous mode [ 694.399206] device lo left promiscuous mode [ 694.404082] device lo left promiscuous mode [ 694.408889] device lo entered promiscuous mode [ 694.414049] device lo entered promiscuous mode [ 694.419510] device lo entered promiscuous mode [ 694.424721] device lo entered promiscuous mode [ 694.430445] device lo entered promiscuous mode 2018/03/31 03:09:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(0xffffffffffffffff, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) [ 694.435742] device lo entered promiscuous mode [ 694.444995] device lo left promiscuous mode [ 694.450361] device lo entered promiscuous mode 2018/03/31 03:09:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(0xffffffffffffffff, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000), 0x0) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="05000000406507387fa5ce8ac48eeebca0efb11709fcca9c031f228513ec4508000008b9df5e1feb6a93f901ae128a0d47193c870fc5b13c3f0517408d27bdeaffab16772538eb171fd916949f62d43e25d81f02557f68ee691807dd0cbabc21ffc57635a00ef32dc135ee9c6bfdbec44e087dd394ebb92d48bd5260dfeb7b4c0df04c3ec400b420bc6b2394a323a6789ab9fc182e6e44da6d36a5b1039f4c54efd5dc2af05bd0900f185371a635ae492062a715248eed51397ad30eb1959e1e8348220e7404895b0104fc2a8f3eb2a2676e8ec71ecad157fbf57b216c7b1e5faa3fdda4613f36f3803ed52eab02302dfed9e0f2b04f8e209ac52f554f9b1233e57e84c7f39ca10545db511ecbc920c704830bccb89ec093da067a9c525780c06540ef8cbd447b141d898b8549ff0a3e06dc3a14debe12867ab01b9a5c6b0dd89c81637cb2f3a93ec1e0d0c35fb0c24c26d7b7c3130b4507de326a50d43fb0d8cb0eb132cd5f6b07f7c841a27bc17a4600000000fec9ce4801a3c142e2753925f40f026b65043bb9f3d088e385c7e055bea63e98ba362d1125bf5fe11af8c3556c893a8076cb7f0fcb36ca1c490791ee89b006a06520632950c039b35374036bb0dd5ff42f80e6c5df7c71e84ac25103e64eaa2961f9e9ec488c3797016fc5d93e2b23c898be9bde18e2986e4da7c71aabd6da708f065b23e5fddddbec9acce07ce01651b7bcfd9582b2add5d20f09348b5c33cbc287f670893e8c68b5f4533981a7c70a2e0ea7831bd7bfae765047f1d5654f054fabcd7359000000000000000000000000409d19935ac1917d808e4bb70a3884065698bea2d51aeaf22a95a4aca100273ed7ac0123b34e57fa08248f5bd9f3d8be7134bb6cc9947174378a3253e8074640e54b5afb9015a02afc291c0f2ff9c7cc1e96aa08c5549eded6eecba119401fa2eb7a35cb81e34846eedfac26fdb22a78a6f6d64a533afd9c2aba7cc1ab5175acdbd79b1e450dc64d6b6ba20b659e3878d6927224371cf42df28b79334e40280b9b08f96d89269d87176d5b6643e2591b6cf7607eaabab600"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:53 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:53 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x2, 0x0, &(0x7f0000000440)=[0xffff, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:53 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:53 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8], &(0x7f00000009c0)=0x1) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:53 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) socket$inet_tcp(0x2, 0x1, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:53 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8], &(0x7f00000009c0)=0x1) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 695.320608] device lo left promiscuous mode [ 695.328824] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 695.334780] device lo left promiscuous mode [ 695.340272] device lo entered promiscuous mode [ 695.345530] device lo entered promiscuous mode [ 695.370201] device lo left promiscuous mode [ 695.375690] device lo entered promiscuous mode [ 695.439822] device lo left promiscuous mode [ 695.445141] device lo entered promiscuous mode [ 695.480254] device lo left promiscuous mode [ 695.517563] device lo entered promiscuous mode [ 695.549692] device lo left promiscuous mode [ 695.555295] device lo entered promiscuous mode 2018/03/31 03:09:54 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) socket$inet_tcp(0x2, 0x1, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000), 0x0) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:54 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:54 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8], &(0x7f00000009c0)=0x1) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:54 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x2, 0x0, &(0x7f0000000440)=[0xffff, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:54 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:54 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8], &(0x7f00000009c0)=0x1) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:54 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) listen(0xffffffffffffffff, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) [ 696.530371] device lo left promiscuous mode [ 696.537242] device lo left promiscuous mode [ 696.542563] device lo left promiscuous mode [ 696.547571] device lo left promiscuous mode [ 696.547901] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 696.559143] device lo entered promiscuous mode [ 696.564442] device lo left promiscuous mode [ 696.569548] device lo left promiscuous mode [ 696.605514] device lo entered promiscuous mode [ 696.612138] device lo entered promiscuous mode [ 696.617443] device lo entered promiscuous mode [ 696.623181] device lo entered promiscuous mode [ 696.628429] device lo entered promiscuous mode [ 696.634053] device lo left promiscuous mode [ 696.639813] device lo entered promiscuous mode 2018/03/31 03:09:55 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000), 0x0) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:55 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) socket$inet_tcp(0x2, 0x1, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d2"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:55 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:55 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x2, 0x0, &(0x7f0000000440)=[0xffff, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:55 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r3, &(0x7f0000fd1ff6)='stack\x00') preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:55 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8], &(0x7f00000009c0)=0x1) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:55 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) listen(0xffffffffffffffff, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) [ 697.630691] device lo left promiscuous mode [ 697.638637] device lo left promiscuous mode [ 697.643646] device lo left promiscuous mode [ 697.649137] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 697.649159] device lo entered promiscuous mode [ 697.649905] device lo entered promiscuous mode [ 697.664660] device lo left promiscuous mode [ 697.669594] device lo entered promiscuous mode [ 697.675236] device lo entered promiscuous mode [ 697.729699] device lo left promiscuous mode [ 697.765519] device lo entered promiscuous mode [ 697.774107] device lo left promiscuous mode [ 697.779610] device lo entered promiscuous mode [ 697.840207] device lo left promiscuous mode [ 697.845813] device lo entered promiscuous mode 2018/03/31 03:09:56 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:56 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) listen(0xffffffffffffffff, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:56 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x2, 0x0, &(0x7f0000000440)=[0xffff, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:56 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 698.602043] device lo left promiscuous mode [ 698.607633] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 698.613814] device lo entered promiscuous mode 2018/03/31 03:09:56 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) listen(0xffffffffffffffff, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:56 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r3, &(0x7f0000fd1ff6)='stack\x00') preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) [ 698.689233] device lo left promiscuous mode [ 698.694618] device lo entered promiscuous mode [ 698.750117] device lo left promiscuous mode [ 698.755586] device lo entered promiscuous mode 2018/03/31 03:09:57 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 698.800466] device lo left promiscuous mode [ 698.805816] device lo entered promiscuous mode [ 698.830152] device lo left promiscuous mode [ 698.865945] device lo entered promiscuous mode [ 698.919934] device lo left promiscuous mode [ 698.925471] device lo entered promiscuous mode [ 699.030251] device lo left promiscuous mode [ 699.035812] device lo entered promiscuous mode 2018/03/31 03:09:57 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) [ 699.560622] device lo left promiscuous mode [ 699.566226] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 699.572726] device lo entered promiscuous mode 2018/03/31 03:09:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:58 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:58 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r3, &(0x7f0000fd1ff6)='stack\x00') preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:58 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:58 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:58 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x2, 0x0, &(0x7f0000000440)=[0xffff, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:58 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:58 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) listen(0xffffffffffffffff, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) [ 700.614403] device lo left promiscuous mode [ 700.673451] device lo left promiscuous mode [ 700.680776] device lo left promiscuous mode [ 700.686152] device lo left promiscuous mode [ 700.691576] device lo left promiscuous mode [ 700.697543] device lo left promiscuous mode [ 700.698992] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 700.708775] device lo left promiscuous mode [ 700.713921] device lo entered promiscuous mode [ 700.720560] device lo entered promiscuous mode [ 700.726092] device lo entered promiscuous mode [ 700.732509] device lo entered promiscuous mode [ 700.738646] device lo entered promiscuous mode [ 700.745001] device lo entered promiscuous mode [ 700.751227] device lo entered promiscuous mode 2018/03/31 03:09:59 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x200, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:09:59 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:59 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) listen(0xffffffffffffffff, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:59 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:59 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x2, 0x0, &(0x7f0000000440)=[0xffff, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:09:59 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:09:59 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef0"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 701.604241] device lo left promiscuous mode [ 701.614408] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 701.620915] device lo entered promiscuous mode [ 701.641900] device lo left promiscuous mode [ 701.647541] device lo entered promiscuous mode [ 701.691079] device lo left promiscuous mode [ 701.697365] device lo entered promiscuous mode [ 701.751612] device lo left promiscuous mode [ 701.757886] device lo entered promiscuous mode [ 701.791217] device lo left promiscuous mode [ 701.797263] device lo entered promiscuous mode [ 701.840458] device lo left promiscuous mode [ 701.881632] device lo entered promiscuous mode [ 701.911127] device lo left promiscuous mode [ 701.917507] device lo entered promiscuous mode 2018/03/31 03:10:01 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x0, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:10:01 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:01 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:01 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:01 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:10:01 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef0"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:01 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 702.902517] device lo left promiscuous mode [ 702.908481] device lo left promiscuous mode [ 702.914032] device lo left promiscuous mode [ 702.948669] device lo left promiscuous mode [ 702.953642] device lo left promiscuous mode [ 702.954446] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 702.964533] device lo left promiscuous mode [ 702.969457] device lo entered promiscuous mode [ 702.974899] device lo entered promiscuous mode [ 702.981986] device lo entered promiscuous mode [ 702.987354] device lo entered promiscuous mode [ 702.992775] device lo entered promiscuous mode [ 702.998108] device lo entered promiscuous mode [ 703.010670] device lo left promiscuous mode [ 703.016226] device lo entered promiscuous mode 2018/03/31 03:10:02 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x0, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:10:02 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:10:02 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:02 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:02 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:02 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 703.883386] device lo left promiscuous mode [ 703.888752] device lo left promiscuous mode [ 703.889322] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 703.899876] device lo entered promiscuous mode [ 703.905106] device lo entered promiscuous mode 2018/03/31 03:10:02 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef0"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 703.989391] device lo left promiscuous mode [ 704.026777] device lo entered promiscuous mode [ 704.069392] device lo left promiscuous mode [ 704.074750] device lo entered promiscuous mode [ 704.109846] device lo left promiscuous mode [ 704.115248] device lo entered promiscuous mode [ 704.139238] device lo left promiscuous mode [ 704.144567] device lo entered promiscuous mode [ 704.259879] device lo left promiscuous mode [ 704.265266] device lo entered promiscuous mode 2018/03/31 03:10:03 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x0, 0x7, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:10:03 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000), 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:10:03 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:03 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:03 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:03 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d2"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:03 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 705.241500] device lo left promiscuous mode [ 705.246607] device lo left promiscuous mode [ 705.247089] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 705.257523] device lo left promiscuous mode [ 705.262381] device lo left promiscuous mode [ 705.267371] device lo left promiscuous mode [ 705.302735] device lo left promiscuous mode [ 705.307686] device lo entered promiscuous mode [ 705.313505] device lo entered promiscuous mode [ 705.319706] device lo entered promiscuous mode [ 705.325107] device lo entered promiscuous mode [ 705.330387] device lo entered promiscuous mode [ 705.335591] device lo entered promiscuous mode [ 705.341076] device lo left promiscuous mode [ 705.346998] device lo entered promiscuous mode 2018/03/31 03:10:04 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x0, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:10:04 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000), 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:10:04 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:04 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:04 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:04 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 706.204237] device lo left promiscuous mode [ 706.209844] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 706.216693] device lo entered promiscuous mode 2018/03/31 03:10:04 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 706.259181] device lo left promiscuous mode [ 706.264540] device lo entered promiscuous mode [ 706.359655] device lo left promiscuous mode [ 706.397121] device lo entered promiscuous mode [ 706.403156] device lo left promiscuous mode [ 706.408466] device lo entered promiscuous mode [ 706.439151] device lo left promiscuous mode [ 706.444542] device lo entered promiscuous mode [ 706.510223] device lo left promiscuous mode [ 706.515631] device lo entered promiscuous mode [ 706.579586] device lo left promiscuous mode [ 706.584946] device lo entered promiscuous mode 2018/03/31 03:10:05 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x0, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:10:05 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d295"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:05 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(0x0, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000), 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:10:05 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:05 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:05 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 707.561148] device lo left promiscuous mode [ 707.567774] device lo left promiscuous mode [ 707.569133] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 707.609601] device lo left promiscuous mode [ 707.614598] device lo left promiscuous mode [ 707.619667] device lo left promiscuous mode [ 707.624525] device lo entered promiscuous mode [ 707.631327] device lo left promiscuous mode [ 707.636125] device lo entered promiscuous mode [ 707.642642] device lo entered promiscuous mode [ 707.647989] device lo entered promiscuous mode [ 707.653258] device lo entered promiscuous mode [ 707.658678] device lo entered promiscuous mode [ 707.664061] device lo left promiscuous mode [ 707.669460] device lo entered promiscuous mode 2018/03/31 03:10:06 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x0, 0x5, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:10:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:10:06 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:06 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(0x0, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:06 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:06 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:06 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 708.522230] device lo left promiscuous mode [ 708.530664] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 708.537134] device lo entered promiscuous mode 2018/03/31 03:10:06 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 708.629628] device lo left promiscuous mode [ 708.634934] device lo entered promiscuous mode [ 708.659200] device lo left promiscuous mode [ 708.664467] device lo entered promiscuous mode [ 708.679276] device lo left promiscuous mode [ 708.714929] device lo entered promiscuous mode [ 708.759442] device lo left promiscuous mode [ 708.764795] device lo entered promiscuous mode [ 708.819600] device lo left promiscuous mode [ 708.824976] device lo entered promiscuous mode [ 708.929543] device lo left promiscuous mode [ 708.934927] device lo entered promiscuous mode 2018/03/31 03:10:08 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x0, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:10:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:10:08 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(0x0, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:08 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:08 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:08 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:08 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69b"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:08 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(0x0, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) [ 709.910791] device lo left promiscuous mode [ 709.915816] device lo left promiscuous mode [ 709.920794] device lo left promiscuous mode [ 709.925787] device lo left promiscuous mode [ 709.925903] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 709.937554] device lo left promiscuous mode [ 709.942410] device lo entered promiscuous mode [ 709.947828] device lo left promiscuous mode [ 709.984481] device lo entered promiscuous mode [ 709.991129] device lo entered promiscuous mode [ 709.996418] device lo entered promiscuous mode [ 710.001705] device lo entered promiscuous mode [ 710.007219] device lo entered promiscuous mode [ 710.013284] device lo left promiscuous mode [ 710.018912] device lo entered promiscuous mode 2018/03/31 03:10:09 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x0, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:10:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:10:09 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(0x0, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:09 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:09 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69b"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:09 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:09 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 710.881153] device lo left promiscuous mode [ 710.891723] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 710.898077] device lo entered promiscuous mode [ 710.919438] device lo left promiscuous mode [ 710.924725] device lo entered promiscuous mode 2018/03/31 03:10:09 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 711.019513] device lo left promiscuous mode [ 711.024833] device lo entered promiscuous mode [ 711.049633] device lo left promiscuous mode [ 711.054923] device lo entered promiscuous mode [ 711.089348] device lo left promiscuous mode [ 711.094676] device lo entered promiscuous mode [ 711.119297] device lo left promiscuous mode [ 711.155777] device lo entered promiscuous mode [ 711.161187] device lo left promiscuous mode [ 711.166744] device lo entered promiscuous mode 2018/03/31 03:10:10 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x0, 0x781d, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:10:10 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) socket$inet_tcp(0x2, 0x1, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:10 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(0x0, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000004400)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x7, 0x8001, 0x0, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2}}, 0x0, 0x1, 0x0, 0xe0000000}, &(0x7f0000000180)=0x98) ioctl$TIOCCBRK(r1, 0x5428) r4 = syz_open_pts(r0, 0x2) dup3(r4, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000040)={0x95, &(0x7f0000000280)=""/149}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1) 2018/03/31 03:10:10 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:10 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69b"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:10 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:10 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 712.141861] device lo left promiscuous mode [ 712.147982] device lo entered promiscuous mode [ 712.153401] device lo left promiscuous mode [ 712.158314] device lo left promiscuous mode [ 712.163196] device lo left promiscuous mode [ 712.168088] device lo left promiscuous mode [ 712.172906] device lo entered promiscuous mode [ 712.178037] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 712.184975] device lo entered promiscuous mode [ 712.191243] device lo entered promiscuous mode [ 712.196993] device lo left promiscuous mode [ 712.232008] device lo entered promiscuous mode [ 712.238571] device lo entered promiscuous mode [ 712.269459] device lo left promiscuous mode [ 712.274893] device lo entered promiscuous mode [ 713.027796] ================================================================== [ 713.035213] BUG: KASAN: stack-out-of-bounds in __unwind_start+0x3a7/0x3c0 [ 713.042114] Read of size 8 at addr ffff8801c6be7e58 by task syz-executor5/28324 [ 713.049528] [ 713.051130] CPU: 1 PID: 28324 Comm: syz-executor5 Not tainted 4.9.91-gcc88c05 #9 [ 713.058640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.067973] ffff8801cfa2f7d0 ffffffff81d95109 ffffea00071af9c0 ffff8801c6be7e58 [ 713.075943] 0000000000000000 ffff8801c6be7e58 ffff8801cfa2f900 ffff8801cfa2f808 [ 713.083917] ffffffff8153d5d3 ffff8801c6be7e58 0000000000000008 0000000000000000 [ 713.091893] Call Trace: [ 713.094456] [] dump_stack+0xc1/0x128 [ 713.099793] [] print_address_description+0x73/0x280 [ 713.106436] [] kasan_report+0x255/0x380 [ 713.112032] [] ? __unwind_start+0x3a7/0x3c0 [ 713.117974] [] __asan_report_load8_noabort+0x14/0x20 [ 713.124710] [] __unwind_start+0x3a7/0x3c0 [ 713.130480] [] ? ptrace_may_access+0x24/0x50 [ 713.136510] [] __save_stack_trace+0x59/0xf0 [ 713.142462] [] save_stack_trace_tsk+0x48/0x70 [ 713.148581] [] proc_pid_stack+0x146/0x230 [ 713.154368] [] ? lock_trace+0xc0/0xc0 [ 713.159791] [] proc_single_show+0xf8/0x170 [ 713.165654] [] seq_read+0x32f/0x1290 [ 713.170987] [] ? seq_escape+0x200/0x200 [ 713.176580] [] ? __fsnotify_parent+0xbc/0x340 [ 713.182696] [] ? fsnotify+0x86/0xf30 [ 713.188029] [] ? fsnotify+0xf30/0xf30 [ 713.193467] [] do_loop_readv_writev.part.17+0xc8/0x2b0 [ 713.200365] [] compat_do_readv_writev+0x5ff/0x740 [ 713.206827] [] ? do_pwritev+0x1a0/0x1a0 [ 713.212424] [] ? __fget+0x20a/0x3b0 [ 713.217670] [] ? __fget+0x231/0x3b0 [ 713.222927] [] ? __fget+0x47/0x3b0 [ 713.228098] [] compat_readv+0xe3/0x150 [ 713.233611] [] do_compat_preadv64+0xd6/0x100 [ 713.239637] [] compat_SyS_preadv+0x3b/0x50 [ 713.245492] [] ? compat_SyS_preadv64+0x40/0x40 [ 713.251696] [] do_fast_syscall_32+0x2f5/0x870 [ 713.257820] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 713.264459] [] entry_SYSENTER_compat+0x90/0xa2 [ 713.270657] [ 713.272252] The buggy address belongs to the page: [ 713.277159] page:ffffea00071af9c0 count:0 mapcount:0 mapping: (null) index:0x0 [ 713.285387] flags: 0x8000000000000000() [ 713.289331] page dumped because: kasan: bad access detected [ 713.295006] [ 713.296606] Memory state around the buggy address: [ 713.301507] ffff8801c6be7d00: 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2 f2 f2 f2 f2 [ 713.308833] ffff8801c6be7d80: 00 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 f2 [ 713.316158] >ffff8801c6be7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2018/03/31 03:10:11 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) socket$inet_tcp(0x2, 0x1, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r6 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:11 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x5, 0x200, 0x4a51, 0x8001, 0x1, 0x5, 0x80, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x2, 0x10000, 0x7, r2}, 0x10) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9, 0x443}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000200)=0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x17, 0xfffffd0f) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={r4, 0x1, &(0x7f00000003c0)=[0x4], &(0x7f0000000400)=[0xaeef, 0x9, 0x100, 0x0], 0x1, 0x8, 0x0, &(0x7f0000000440)=[0x1, 0xffff, 0x1da, 0x9, 0x9, 0xfffffffffffffffb, 0x8, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) getsockname(r3, &(0x7f0000000700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x80) fstat(r1, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x100000001, 0x0, 0x200, 0x7, 0x5, 0x0, 0x0, 0xfffffffffffeffff, r5}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x7, 0x6}, &(0x7f0000000300)=0x8) 2018/03/31 03:10:11 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x3, 0x0, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:11 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) 2018/03/31 03:10:11 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500)={0x6, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600)=0x1ff, 0x4) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9], 0x0, 0x4, 0x0, &(0x7f0000000440)=[0xffff, 0x9, 0x0, 0x0], &(0x7f0000000480)}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4802, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140), 0x4) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r5, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0xfffffffffffffe82, 0x200080800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) r7 = syz_open_procfs(r4, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={0x0, 0xb0, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c5301d13d713a76212b0e8a8f75bca18b0c12f092fddac5f5f81bb71"}, &(0x7f0000000900)=0xb8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYRES32=r8, @ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6b7671c45821c4eef9a9dfeebf502d21a495404ec41586989bff1e75e4bb764413cc8e313aae0a094afea6878dc47903d98e86ceea59be67cb700000000877c4ffb40eb220c9666b3457ffa277129b5b83d44edc5c0667871bbae0204c7f73b95d2ca2872fdcef018297f7af4d7b55f09e73bab83193dfde26a797e84ef0e30bbfb46541fac300a62122931b01ccda103ec4afa27c593b72565a705e1aeb39f944d72910000000000000002eb583c86949918fa6bdc0f6ec4a8148011e69bb921eee2c61867d2d408007485220cfa3af06206243f052131a84245390105f4166f0f8c5009f55780598deaa46f1033a7c860ae01040428d9e17a6dbb8fb485fce320fae4dfaa84d1d2"], &(0x7f00000009c0)=0x2) preadv(r7, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}, {&(0x7f000032df3a)=""/198, 0x4ca}], 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000600)=""/156) [ 713.323484] ^ [ 713.329682] ffff8801c6be7e80: 00 00 00 00 f1 f1 f1 f1 04 f2 f2 f2 00 00 00 00 [ 713.337009] ffff8801c6be7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 713.344334] ================================================================== [ 713.351658] Disabling lock debugging due to kernel taint [ 713.371808] Kernel panic - not syncing: panic_on_warn set ... [ 713.371808] [ 713.379184] CPU: 1 PID: 28324 Comm: syz-executor5 Tainted: G B 4.9.91-gcc88c05 #9 [ 713.387902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.397228] ffff8801cfa2f728 ffffffff81d95109 ffffffff84197d57 ffff8801cfa2f800 [ 713.405199] 0000000000000000 ffff8801c6be7e58 ffff8801cfa2f900 ffff8801cfa2f7f0 [ 713.413186] ffffffff8142e791 0000000041b58ab3 ffffffff8418b7b0 ffffffff8142e5d5 [ 713.421147] Call Trace: [ 713.423710] [] dump_stack+0xc1/0x128 [ 713.429047] [] panic+0x1bc/0x3a8 [ 713.434035] [] ? percpu_up_read_preempt_enable.constprop.53+0xd7/0xd7 [ 713.442236] [] ? preempt_schedule+0x25/0x30 [ 713.448176] [] ? ___preempt_schedule+0x16/0x18 [ 713.454378] [] kasan_end_report+0x50/0x50 [ 713.460144] [] kasan_report+0x16b/0x380 [ 713.465737] [] ? __unwind_start+0x3a7/0x3c0 [ 713.471683] [] __asan_report_load8_noabort+0x14/0x20 [ 713.478403] [] __unwind_start+0x3a7/0x3c0 [ 713.484180] [] ? ptrace_may_access+0x24/0x50 [ 713.490210] [] __save_stack_trace+0x59/0xf0 [ 713.496150] [] save_stack_trace_tsk+0x48/0x70 [ 713.502275] [] proc_pid_stack+0x146/0x230 [ 713.508042] [] ? lock_trace+0xc0/0xc0 [ 713.513461] [] proc_single_show+0xf8/0x170 [ 713.519317] [] seq_read+0x32f/0x1290 [ 713.524650] [] ? seq_escape+0x200/0x200 [ 713.530242] [] ? __fsnotify_parent+0xbc/0x340 [ 713.536358] [] ? fsnotify+0x86/0xf30 [ 713.541689] [] ? fsnotify+0xf30/0xf30 [ 713.547108] [] do_loop_readv_writev.part.17+0xc8/0x2b0 [ 713.554012] [] compat_do_readv_writev+0x5ff/0x740 [ 713.560475] [] ? do_pwritev+0x1a0/0x1a0 [ 713.566084] [] ? __fget+0x20a/0x3b0 [ 713.571331] [] ? __fget+0x231/0x3b0 [ 713.576576] [] ? __fget+0x47/0x3b0 [ 713.581740] [] compat_readv+0xe3/0x150 [ 713.587246] [] do_compat_preadv64+0xd6/0x100 [ 713.593273] [] compat_SyS_preadv+0x3b/0x50 [ 713.599126] [] ? compat_SyS_preadv64+0x40/0x40 [ 713.605324] [] do_fast_syscall_32+0x2f5/0x870 [ 713.611437] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 713.618074] [] entry_SYSENTER_compat+0x90/0xa2 [ 713.624634] Dumping ftrace buffer: [ 713.628143] (ftrace buffer empty) [ 713.631825] Kernel Offset: disabled [ 713.635427] Rebooting in 86400 seconds..