INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.30' (ECDSA) to the list of known hosts. 2018/04/30 14:07:53 fuzzer started 2018/04/30 14:07:53 dialing manager at 10.128.0.26:33975 syzkaller login: [ 51.843148] can: request_module (can-proto-0) failed. [ 51.854581] can: request_module (can-proto-0) failed. 2018/04/30 14:08:01 kcov=true, comps=false 2018/04/30 14:08:05 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x240, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000002680)={0x0, 0x0, 0x0}, &(0x7f00000026c0)=0x14) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000002700)={@remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x12}, r1}, 0xc) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000002740)='/dev/sequencer2\x00', 0x383401, 0x0) sendto$packet(r2, &(0x7f0000002780)="3e30e98c8738120cc13081591ab4b77974aebeb97a406d32eb54ed279cf40d1ec9c6fc40f59aa202cd0b3bd4715bc5b71889fb856dd7e70897c199b9c909df77bff49b5c0c44b5518f2d55a03429024272c13bd71b3a8c2aaf75ab845597538000d3867dfba539", 0x67, 0x4000810, &(0x7f0000002800)={0x11, 0x17, r1, 0x1, 0x200, 0x6}, 0x14) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002840)='/dev/vsock\x00', 0x20000, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000002880)={'bridge0\x00', r1}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000028c0)=0x8000) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000002900)={0x5, 0x7, 0x800, 0x5, 0x80}) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000002940)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000002980)={0x0, 0x5f, "6c030a4be2b266563b82abbc55371b57d33c77817d2c619b9d34a9b3aeb00c22709c23b7e272999a6917bd544a698035a6ded32aa13068c0e1d0e05f1f5ede9183e0a0e2bc6bbc0db567f89b8f2c008b0994b4c79d9b44ef22b65038d1eacd"}, &(0x7f0000002a00)=0x67) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000002a40)={r5, 0x4, 0x40}, &(0x7f0000002a80)=0x8) write$binfmt_elf64(r2, &(0x7f0000002ac0)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0x2, 0x2, 0x5, 0x10000, 0x2, 0x3e, 0x1000000000, 0x3a7, 0x40, 0x7f, 0x1, 0x8, 0x38, 0x1, 0x2, 0x7fff, 0x80}, [{0x0, 0x3ff, 0x0, 0x3, 0xfffffffffffffba9, 0xffffffff, 0x3, 0x4}, {0x6, 0xa88, 0x5, 0x400, 0x4c, 0xffffffffffffff00, 0x7, 0x7}], "c8fdc558231102f75b6b13001e94c865410f7593fed752b95b90f604d9d46ef11dfa12eb4d5af2e0cb263e84aef3d0ef9e76e7609e3888051e84168e2b2f9f314b3b98c649720e0c9a3138ce", [[], [], [], [], [], [], [], []]}, 0x8fc) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000033c0)={0x4, 0x0, 0x10001, 0x7, 0x9, 0x100, 0x1, 0x9, 0x200, 0x4, 0x5, 0x6}) r6 = syz_open_dev$vcsn(&(0x7f0000003400)='/dev/vcs#\x00', 0x80000000, 0x20000) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r3, 0x80dc5521, &(0x7f0000003440)=""/82) clock_gettime(0x0, &(0x7f00000034c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r6, 0xc05c5340, &(0x7f0000003500)={0xffffffffffffff80, 0x200, 0x400, {r7, r8+30000000}, 0x9, 0x401}) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000003580)=0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f00000035c0), &(0x7f0000003600)=0x8) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000003640)=""/176) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000003700)) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x9) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000003780)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x140, 0x398, 0x398, 0x398, 0x4, &(0x7f0000003740), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="93e77a245465", @mac=@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={0xac, 0x14, 0x14, 0xbb}, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4}}}, {{@uncond, 0xf0, 0x118}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="ccb055d67a95", @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xf}, @rand_addr=0x8001, 0x1, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f0000003c80)=@generic={0x3dfd, 0x8, 0x7fff}) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000003cc0)) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000003d00), &(0x7f0000003d40)=0x4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r3, 0x29, 0xd3, &(0x7f0000003d80)={{0xa, 0x4e21, 0x20, @mcast1={0xff, 0x1, [], 0x1}, 0x6}, {0xa, 0x4e22, 0xfffffffffffffffe, @local={0xfe, 0x80, [], 0xaa}, 0xe25}, 0x8000, [0x4, 0xf6cf, 0x0, 0x5, 0x4, 0x5, 0xffff, 0x20]}, 0x5c) 2018/04/30 14:08:05 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xeac2, 0x0) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f0000000040)=0x10001, 0x4) fallocate(r0, 0x1, 0x1, 0x81) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@loopback, @local}, &(0x7f00000000c0)=0xc) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x2}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000180)={r2, 0xffffffffffffff4f}) getsockname$netlink(r1, &(0x7f00000001c0), &(0x7f0000000200)=0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r0, &(0x7f0000000240)="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"}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000400)=r1) bind$pptp(r1, &(0x7f0000000440)={0x18, 0x2, {0x3, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1e) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000480)=0x7f, 0x4) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000004c0)={0x0, 0x1f, 0x30, 0x6, 0x9}, &(0x7f0000000500)=0x18) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000540)={r3, 0x2, 0x1, [0x3]}, 0xa) open$dir(&(0x7f0000000580)='./file0\x00', 0x0, 0x22) set_thread_area(&(0x7f00000005c0)={0x7ff, 0x0, 0x2000, 0x9, 0x372e, 0x1, 0x7, 0x8, 0x2, 0x10000}) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) iopl(0x2) getpeername$inet(r5, &(0x7f0000000640)={0x0, 0x0, @local}, &(0x7f0000000680)=0x10) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, &(0x7f00000006c0)) symlinkat(&(0x7f0000000700)='./file0\x00', r4, &(0x7f0000000740)='./file0\x00') pread64(r5, &(0x7f0000000780)=""/44, 0x2c, 0x0) sendto$inet(r0, &(0x7f00000007c0)="8cec292940fb8336bd0469b4a3ccb6ca55590ff4f007869ee67142698954c30c306a03bac72779fd04645ab273557c25cc217e1988fca21555335128e05d19741b9ab515c5159040ac64438c344366077b9598066e48d9dddb9e84791354cdd2dff606445fba60db5ad2af28a1839bc9ced6883441b3078c74943a7dc3303fda949322c3b2c4b7ecfb448e7c5ef1179404bbca53829b803b4bef3c4ba6085d77008c3523c892cd17474ea5ac8079bdc92f28559fe6126c67f6dbace6a59b224a4235c7c37b0d2bf5b1d9488ae29a1cf0b53c429c712d53f9d009f66c0cdd25a7da88f787d12cba3f", 0xe8, 0x40000, &(0x7f00000008c0)={0x2, 0x4e22}, 0x10) fadvise64(r5, 0x0, 0x4, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000900)={r3, @in={{0x2, 0x4e21, @rand_addr=0x10000000000}}, 0x1688f3c2, 0x3800000000, 0x1000, 0x4, 0x5}, &(0x7f00000009c0)=0x98) semget$private(0x0, 0x4, 0x120) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000a00)={'nat\x00'}, &(0x7f0000000a80)=0x78) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000ac0)={r2, 0x7ff}) accept4$ax25(r1, &(0x7f0000000b00), &(0x7f0000000b40)=0x10, 0x80000) 2018/04/30 14:08:05 executing program 7: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f0000000040)=0x8, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000080)={0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000000c0)={0x3, 0x1}, 0x2) setsockopt$inet_buf(r0, 0x0, 0x37, &(0x7f0000000100)="64c9f67b42aa26ee82ffe4e054c5dc5d1ac74bf2ed1fbe4542e38c64e5a023971a28ad910b7894945150b517680918c1d65e846ebc7b2412441e12efeb59a7ab2d51ade012a4a2fc9849093c2bd50a287587d44b5270d7cf60f9ceeb92330097d04b4e44a5408501bdbad90a7fd1f11120d232f0b4efdce65ad18b2a6499718a18388b84614af1a79002e10cf9e7a2a41263795c0c13bce765c83a6947531fd99eaf26f65469ad7c2e78c00ab0e9da7ee107ccf1ce8e4712d8526a9b454730905e3c54319170b6b6919f16661823e1f13a2fad8d18e3adf063ee34a8b90ee0134d35ea39c52cd6a1c56fe5c56f82", 0xee) r1 = accept$alg(r0, 0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000200)=""/89, 0x59) r2 = socket$alg(0x26, 0x5, 0x0) r3 = pkey_alloc(0x0, 0x0) pkey_free(r3) recvmmsg(r0, &(0x7f0000003d40)=[{{&(0x7f0000000280)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000380)=""/235, 0xeb}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x3, &(0x7f00000014c0)=""/63, 0x3f, 0x9924}, 0x101}, {{&(0x7f0000001500)=@sco, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001580)=""/163, 0xa3}, {&(0x7f0000001640)=""/213, 0xd5}, {&(0x7f0000001740)=""/219, 0xdb}, {&(0x7f0000001840)=""/211, 0xd3}, {&(0x7f0000001940)=""/212, 0xd4}], 0x5, &(0x7f0000001ac0)=""/233, 0xe9, 0x2}, 0x4}, {{&(0x7f0000001bc0)=@alg, 0x80, &(0x7f0000002180)=[{&(0x7f0000001c40)=""/77, 0x4d}, {&(0x7f0000001cc0)=""/23, 0x17}, {&(0x7f0000001d00)=""/73, 0x49}, {&(0x7f0000001d80)=""/234, 0xea}, {&(0x7f0000001e80)=""/112, 0x70}, {&(0x7f0000001f00)=""/171, 0xab}, {&(0x7f0000001fc0)=""/150, 0x96}, {&(0x7f0000002080)=""/234, 0xea}], 0x8, 0x0, 0x0, 0x100000001}, 0x1000}, {{&(0x7f0000002200)=@ipx, 0x80, &(0x7f0000003280)=[{&(0x7f0000002280)=""/4096, 0x1000}], 0x1, &(0x7f00000032c0)=""/117, 0x75, 0x82e7}, 0x2}, {{&(0x7f0000003340)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003580)=[{&(0x7f00000033c0)=""/246, 0xf6}, {&(0x7f00000034c0)=""/180, 0xb4}], 0x2, 0x0, 0x0, 0x5}, 0x3}, {{&(0x7f00000035c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003640)=""/14, 0xe}, {&(0x7f0000003680)=""/135, 0x87}, {&(0x7f0000003740)=""/24, 0x18}, {&(0x7f0000003780)=""/180, 0xb4}], 0x4, &(0x7f0000003880)=""/207, 0xcf, 0x2}, 0xcadb}, {{&(0x7f0000003980)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003a00)=""/250, 0xfa}, {&(0x7f0000003b00)=""/252, 0xfc}], 0x2, &(0x7f0000003c40)=""/201, 0xc9, 0x2}, 0x1000}], 0x7, 0x2000, &(0x7f0000003f00)={0x0, 0x1c9c380}) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000003f40)='/dev/autofs\x00', 0x42000, 0x0) eventfd2(0x10001, 0x80800) bind$alg(r5, &(0x7f0000003f80)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(lrw(fpu(pcbc(aes-aesni))),michael_mic-generic)\x00'}, 0x58) ioctl$VT_WAITACTIVE(r6, 0x5607) ioctl$TIOCSTI(r2, 0x5412, 0x5) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000004000)={'TPROXY\x00'}, &(0x7f0000004040)=0x1e) accept4$alg(r6, 0x0, 0x0, 0x800) fgetxattr(r1, &(0x7f0000004080)=@random={'os2.', '/dev/input/mice\x00'}, &(0x7f00000040c0), 0x0) r7 = accept$packet(r0, 0x0, &(0x7f0000004100)) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000004140)={0x2, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000004180)={r8, 0x9}) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000041c0)) recvmmsg(r7, &(0x7f0000004200), 0x0, 0x10160, &(0x7f0000004240)={0x0, 0x1c9c380}) openat$cgroup(r6, &(0x7f0000004280)='syz0\x00', 0x200002, 0x0) connect$netlink(r4, &(0x7f00000042c0)=@kern={0x10, 0x0, 0x0, 0x1020204}, 0xc) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000004340)={&(0x7f0000004300), 0x0, 0x7f, 0x9, 0x8, 0x5a, 0x7, {0x1, 0x3, 0x401, 0x1000, 0x1, 0x8df, 0x8001, 0x1000, 0x8, 0x2, 0xfffffffffffff000, 0x0, 0x7, 0xee2e, "4da0304a7a682c2c047b73afbc89d15ce049610b9fedff49708473b3a98498a7"}}) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00000043c0)=""/187, &(0x7f0000004480)=0xbb) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f00000044c0)={0x57, 0x20, 0xffffffffffff8001, {0x7fff, 0x10001}, {0x8, 0x8001}, @ramp={0x1, 0x533, {0xff, 0x7, 0x80000001, 0xffffffffffffffc1}}}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000004500)='/dev/sequencer\x00', 0x8a4c2, 0x0) 2018/04/30 14:08:05 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff50a, 0x200400) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0x8001, {{0x2, 0x4e23, @loopback=0x7f000001}}}, 0x88) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)={0x3, 0x8, 0x7fff, 0x1, 0x7, 0x6, 0x4, 0x400, 0x1, 0x0, 0xd8, 0x8000}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x8}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x401}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={r1, 0x0, 0x5, 0x3, 0xfffffffffffffffd, 0x0, 0x200, 0x20, {r2, @in6={{0xa, 0x4e24, 0x3b6875e3, @dev={0xfe, 0x80, [], 0x1b}, 0x6a72}}, 0x3, 0x45, 0x2039, 0x800, 0x165}}, &(0x7f0000000300)=0xb0) ioctl$BLKRRPART(r0, 0x125f, 0x0) getpeername$ipx(r0, &(0x7f0000000340), &(0x7f0000000380)=0x10) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000400)={0x9, {0x2, 0x4e21, @loopback=0x7f000001}, {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, 0x40, 0x5, 0xfffffffffffffc00, 0x6, 0x5, &(0x7f00000003c0)='veth0\x00', 0xffffffff, 0x5, 0x4}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000480)={{0x7, 0x7fffffff}, 'port1\x00', 0x0, 0x100000, 0x3, 0xfffffffffffffffb, 0xfffffffffffffff7, 0x7, 0x20, 0x0, 0x7, 0x8}) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000540)=@int=0xb54, 0x4) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x7) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x10001, 0x5, 0x417ce003, 0x1, 0x4, 0x2, 0x3, 0x7, 0x1cd, 0x40, 0xc6, 0x3000000, 0x1, 0x38, 0x1, 0x6, 0xd854, 0x400}, [{0x0, 0x2, 0x9, 0x17d, 0x6, 0x718e94a9, 0x232, 0x7f}, {0x60000007, 0x7, 0x400, 0x1, 0x0, 0x4, 0x414a676b, 0x4}], "cb85a2d07a45748420b30539926c246a8e5ead3bce5bdb252d155a3d4929fd93c987707edf2f1ce01d95d785d8d7eea42b1aeaaf9358d4a73e6bd15d17915db0c4c519c564d516b25053b3d56d3cf72c97642b03f71028c17718d963e16c306d799f4aad75f6e7da8f575e9700189eec0f06c0e078943303def55a7e91d55ba3a66dba975480a27ed2df9c85faf6c2a4172dea671eaad9aea365744777748c5c7f38e9ecfb7337035b8a494151f7b8554fd544a4b9579a114eecd97227faf5fea1c06fbd987b", [[], [], [], []]}, 0x576) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000b00)) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000b40), &(0x7f0000000b80)=0x8) ioctl$BLKRRPART(r0, 0x125f, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000bc0)={'security\x00', 0x3, [{}, {}, {}]}, 0x58) r3 = timerfd_create(0x7, 0x800) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = syz_open_dev$vcsa(&(0x7f0000000c40)='/dev/vcsa#\x00', 0xfffffffffffffffc, 0x200000) fcntl$getownex(r3, 0x10, &(0x7f0000000c80)) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000cc0)={r1, 0x4, 0x81, 0x80000000, 0x0, 0xfffffffffffffffb}, 0x14) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000d40)='@eth1\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000d80)={0x9, [0xffff, 0x2, 0x2f69, 0x10000, 0x3, 0x5, 0x800, 0x1ff, 0x3]}, &(0x7f0000000dc0)=0x16) sendmsg$nl_route(r0, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x400a00}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)=@ipmr_newroute={0x24, 0x18, 0x308, 0x70bd28, 0x25dfdbfe, {0x80, 0xa0, 0x34, 0x81, 0xff, 0x4, 0xfd, 0x7, 0x100}, [@RTA_PREFSRC={0x8, 0x7, @remote={0xac, 0x14, 0x14, 0xbb}}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r4, 0xc008551c, &(0x7f0000000f00)={0x8, 0x20, [0x7, 0x6, 0x39cb, 0x6, 0x20, 0x2, 0x4, 0x4]}) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000f40)={@loopback}, &(0x7f0000000f80)=0x14) 2018/04/30 14:08:05 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x78ac08bec5df9399) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x101}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r1, 0x400}, &(0x7f0000000100)=0x8) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x8, 0x3ff]}, &(0x7f0000000180)=0x8) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f00000001c0)=""/110) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000280)={0x7, 0x2}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) epoll_create1(0x80000) r5 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000300)={{0x101, 0x3}, 0x0, 0x4, 0x4, {0x9, 0x1}, 0x4, 0x8000}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000380)={0x690, 0x208, 0xb5, 0x2, r2}, &(0x7f00000003c0)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000400), 0x1) r8 = syz_open_dev$admmidi(&(0x7f0000000440)='/dev/admmidi#\x00', 0x7, 0x600000) ioctl$EVIOCGMASK(r8, 0x80104592, &(0x7f0000000580)={0x15, 0xdc, &(0x7f0000000480)="99e1d18012f45d53f493fe59e46d13aea28ce2e62e82e409d2a8710d35bab089075dc519cdab676e44bfe4f0b44eacd05b5dddd48a97c27cdf7884bccae9981ec0467c9dff8c5b1de68cac258a94f26c7e135e75dc346eee0ba1034aeca87b13cf31cb3d70d87e7a3babd58c04b2dcb72794f930374ba9862605f1cb6b16fa048ff340549173a5409e00a0ec5c177490107658be72c8d0256bcb15eb8d6507265f41a6784574527ea2ebe52f76db99bab132231c3eacf6185f9bdaff2d33eef6bf8cbe0d1cb71ce233625969e90127664a09c3ce147afb1466d0eaf5"}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f00000005c0)={'rose0\x00', 0x400}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000600)={r7, 0x804, 0x30, 0x2, 0x2}, &(0x7f0000000640)=0x18) mmap(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x4, 0x9011, r0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000680)={r1, 0x5, 0x5, "1d52da8898"}, 0xd) setsockopt$inet_sctp6_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f00000006c0)={0xff, 0x8000, 0x100000001, 0x3, 0x3ff, 0x97f6, 0x101, 0x80000001, 0x7, 0x1, 0xc000000000000000}, 0xb) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000700)={{0x7, 0x1}, 0x1, 0x2e8f, 0x80000001, {0x2, 0x100}, 0xffffffffffff8000, 0xffffffffffffffff}) r9 = semget$private(0x0, 0x6, 0x108) semctl$SEM_INFO(r9, 0x3, 0x13, &(0x7f0000000780)=""/31) openat$full(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/full\x00', 0x101000, 0x0) r10 = getpid() ioprio_get$pid(0x3, r10) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000800), &(0x7f0000000840)=0x4) ioctl$SG_GET_ACCESS_COUNT(r8, 0x2289, &(0x7f0000000880)) 2018/04/30 14:08:05 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x240000) ioctl$TIOCCONS(r0, 0x541d) write$binfmt_elf32(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x0, 0xfe8, 0x5, 0xffff, 0x3, 0x3f, 0x200, 0x3d3, 0x38, 0x3ba, 0x1, 0x6, 0x20, 0x1, 0x6, 0x80000000, 0x800}, [{0x70000003, 0x5, 0x5, 0x101, 0x100000000, 0x4, 0x9, 0xfffffffffffffffe}, {0x60000000, 0x2, 0x8001, 0x101, 0xff, 0x3f, 0x8, 0x8}], "1d488c8d6f6b89e0dbbf1c3e389a2cb3e04509458174eabcf6ab728449f2b2c9c149fc32fce3ac8239b60dc62f289dba9886b98c9b11837984949b3482a7c38f16365337e9f34d2e2e300b8ca93eed4a82fc14dddf924267c0ce3a06cf1e3fa0cf4c29a1c9fc82f4c654a23d6b87965bccb6b349b1106c383a56b3aa01b6549c4206df845577d7503ca6662e7cf573269aa54b2c3cb31b5a610fca525b4598c29c936919927c4fd492498837192beb1434ad5ef742d88c259bec1c0d72af3e688dcd68340fa843036f23bf8ff62bc6eb7a3933c77d2085ae3aed8b7fe6fcfaa5fbcb0d61bceeea909bc659aa3c5dbf97f4efec557a87ad212cfc4bdf98617b88bd535ba8fe818121ccd3ffaa8ebdca42f5d73574ee1fafa740c7ef579a5786b0d44da7c88f77ba28a964d416f5df8666477f8d80712f891c146c290dd1ea629059c8df0eef7113952656567bef5edb1dc81d2700b76c7120b1aadd0aa44a5fd27054a368348f1557cc585183407ef78927cd7aeb11e1bd8af0f524242253f425246d470d25cb5e50765c9df9dbfee4ee65551c5859fca62f8b398bde70b3f668b94f20b19ecf94cd610e1eeaade70cdb169dc5a170d6bf5715f92eed0b750abdce6875a2d194bd9ab670b2e2894be572f0d53d66b95b5ff3df0a02bd82b94819ae5f14cf51761a06d8f4b0c0928beb6465aee622bb97d061c2760585a1783567ed3d07f9a5007f05835fb991499b6254d92f00e460a643bcf2d62fbadd6a6d31096098fda6e5218a4ba516154604199a265912a26f215b93c194f8210b60b472300663e0b02cd9fe5ae64a38a90a407ae76b73f7e1affa503b674984205924f86654ab966c414d4ce0cee915a5d1fd3f18799a25dd1f4b0b023edd9b76f347b9d223ff77cebe63f641fdbb534dbf0d8cabdefae21ea844e3e511901fa09e8efb25b98c054ba72bd55f97c6351c5dfe7964cd2c0044e037549b9b15ee09ed87db28403f8e9ef3ca86acb7369975a1d1d77382b226b33dccf7f16a1bb399dde82879cf5a93dd91ac9b9a46397eb3f5dfe3bff98b50836dd17c16a2460c062b4e88f8cec7799f0b6c62ab4aae1fb18c8d69154c354ad132251af19f6d2b408704f0214164108da4aab3e0b26626e5a355e76b3c27151d2b935c77d725fc1141a9156633bbcf9159b1f6591a3e347ecaf8a8621c5bdd685d4d06fba6c6e39a2592fecd4314717862d1c6243a12d741ea9c1acf9bc99ab51be88d13cf26836d2b82d28cbf422a9c9747f570d755d37bfc5a8e3960a470a658da77636a0b8d3daf4f66558bece953323d6b393b8d807d7bbc56184dba4472bcc8dd7f3da26b7f7b306ece07356190593803aded1f566d0176aea9a22c506f5b7ebb7bd0dc58ed69c6f644ba8fd7f2128e42548e63f7b27dcc4d7d9627b39084c137d52524a931aa5d9832dfab2a1f173a328a348df4f412066526bd7038505e63825bd938b994bb495bd28aef06de8eccdc8ba481f67726faf4c65ea81e6cec978abde370e9df2dbd03477f0b798c38326b502897b788fca50fc34d55776761bb736c5fa0e0adb431e5e6691601dee762d065b438107efd796c2ece277418bc1fc39d54f4ef42af1ba57b67996f7fd7a634332ae46c8887c6a82b9f61b14bf72a098968f860332f6f8a959c40549d7f57355eaea3b4977e2937d2c882ce994e8378d283bfaddaa27422aac4e32685bf08a8ac6952473c7dbb48e8682c1280db653a428b899549b4ba49d2a819fb0ed352bfb937242918faf572d43e9dae8036f57354e5ae04954078f1070a9b725bbc5920ce9b5b41073023c2665fe0f00b576cd6cda02396e17bee2ea5654b0e2b1be40f399273ad5b6692bcde84b1a344ab86bd46a7571bd3604e74c420f285af188732d0f76123dfbf117dfdd3cf8ee65db4480e97359de2d7859ddd8ac6f582d3c466be1b7e516c3a1d46321bb4e73303025470d3e0799782ed9bae92dfb419c36f0076047ada93979787e1a27db69b12331e0c5827f6ad329c2cdbe76ef30bfded8424c79c772b2bd8d1a7f17aa8b2ea8553dc25913dd92a7cf77ae739fb316a14a7b3e45b019776bc43be735e99426e4d1c77d2ecc073bf4f48072a92c9aac8d0d512975e0492a343f4aa7719c053e94bb529c4c561d968614afdc128f0e1bda12fafe1652c805297913ec14e0e2f2399d95d7006dabc389ef1ca9bc07049435a1ac4edf69097572a97d0d2b5bb6aa9d660df16eb6016225cd6776d5ca3b5d2eeda4ca99e0a989faecc0aecd3820970505d58f5a193cd3d58435da9fdefa5218f3f7d9b8b29b0e93cab5b4ec31653e5552040f7d4130db696efd12122927600df8ef9f2c9589f9277b3fa56b04ba0b14d2de3e6ed5907519bde06ed1c09efce7e8446a310b0f252415f7a315ed555c6715ae3c5a84a2b5c11bf3bbdf2589015bbeb071535103a5396aac5a15c52b7502eb2fba7d49db1b31c38ab57e3dd70e9a381475c3f75473a677be769dcddc0d4d15a3d0bf89134012ed991eaccb63fab1fa964cc795ce0039f34128090c13f643674b26f8e40cef475415522e8d4cd38cc4642b0b8435878808659f7ae404cae7e9ca54d833f4552a1fc3feacdc48ebc6890980340035a0c953115141cdcdaaa4642bffbae344b1091b5d7a65e2f3e63911ff9b336a9c3f000bea23d99094612f85ddfa0326ca49e17e210a75cef3238f48fb2b3a430799f73747483c4663efcbe2536500d9cb8ee063cd3ecdc5f6428e31e244409cc1918ce99b1d67b0366a4178c1b7c41f38777f01fea4026e0a9192d30756217148449a344dbefa5265c936a2bbee88ecd9228ee443da55675162750a4b676816734483bfddb290e7fefa407afd96e52eca7e3674362565ce7dbae59f622da8223bd0dd3d5ca0c937ea1c5fefccff50a53865dfa191b4c7bc12c540ce9590e7126b78b3833b5b3bb2a431b5443192f712c02a8c088b1ebc058081d849134035215e389464b7459aa21aed97292555d65196bbc5792f33d05fd9a7bdaf52425272e86e2a2d07725b48e52d83def90008ef3e161e1ca5a62aee34da12cbc4ad530c9c4cf35e8b5c662c6990898d3a59d14bb52d676eae2d1267a392cd60bcfd55ba53c66bb1028a76ee6d0b4863b13c6d8d60a715c2b42afc62125f5e39428a6a5f1dcc4234c6dad577ac6ff396e274a7524cb1b387565fd821b263c22631d87412e5f0adce99bedf1f6266354338ba4cf89b8d02642eaf732fd4e6e294e53ea1f453fe842e175c12cb2ae4c093dbbca25ae80cfcc0f93bd6524945cb10611040545a61d08c0bb779f33125b0607912dab22dad3c3e48b98902c13e69c9ca058a4b8666a23a8f18dc9812dda77c29c2c9586171162d836400feacccd83d65fceb9451d0bf06a1383ff4461d1f08c65b266f622fb24f7f35ffa82c61e1e7fa04843e66b61e83bc209a2fa92cb3dd10acd15761b66cc74d2828af183029930d7e5a16fc8e7088bfffeae00247f6f96067d0aa6b6ce1c92b687d6ac4962d37fef496f9bc70a30fe69dcb80c341d53c3345a134a8ff3a733f3c99c89b2ba8eec21cc7befc33e8fadf82a64c017e46259b42b24f91c6646afd5774d551f098179789471e9a28769d71866fb98a265fa44ca94dea6bd30072d229ca2d6cbdc7c7f9fd2dfa9f72313a7ff38e3c1b8fe886fee9fd2986d9561456611ecb55a6300bd7e1294e06a16d19e0d991880d11b95760bf2454c9ccdae86fe4e75a42f87d0999c1f4f5393eae72de4cabeb0b0cbc952cc6a2140a318250bb78e452b986eba499ad6d91d815b2fd9aaae8a3d9d1b6237af1275468f2ce999268362ab18175d72d45ce3f9ff62b140ce7da438caf694ee8e3cff0c2b1f7afbc905fc487cfe7593bc2dac9189589f93b86b1529848652647f7d3d50fda9d58b6017c005ae60da9e996524d719c4dc5cfa569035924a8d348a3688cec53929717f1ea49dedeeef312f0fd06160d8766e57445e1d0aa545953f506b7b5bfeb3ac86df88208e85f923ea7086bb6be07c74da791668d5054aa4ca14f6aac5309979a4815409fddb62a6f730ce31a2497efd3257081219af978b624d9b4db09058bc963f9766effa69e9612a378434dfae23482b0024f139c48c63c1cdcf225ff97aea49ee530d61d1db57d1afc85dabd9e08256c157869f764b7646f8b4f0453fba723bdb9e2339b7039054cbdbb1b3d4db27f0048f858fd9f99e6ae3fa0a613ae880dd6870064ecdf4bc47821d171c8a8e7fc8495e196d8bda462223cf8dad4f92f3b2eddb48a306f2adc264a9b2e6e49794031253d1ec31e46caedb3f3de539aedf844714372c7b651a2ba650b6cec528702d1fc91d5c85f5af39b6872f7d6a2df52ef0a780de2434dfafec33858bfc1c893fecbc3de2492e7dfdba15af1214703e7703c92264f26c704504bae854de91a409426cee5f3416d11b29ea98e9f9537580ac281c9b28101fd3373ed41968712291d839cbe93e337d3fd1f5b53c0cd1c0ea01cb006db8645e436bc5f33607f9b3cd0aa65196d0c07b296a1c5dbff13ff26f0c1cbb865df45e0b2662cac1e44d548bbcadb9b9b0c2f5d5a067a95f3ad3299d94341656297519eebd77e5f28f1fb23e8e183cd0a0995ede8826353d27411cc4f4e2ccd4b626b11f40a52abc87fa417eef8af7abdbb6042209f3d59b800b1af6af2a6a2e5e06414fa8dba2ef25072c83bd120bcc1a0aa11938d17030c98e2d6d769cc893ef42235bca3fdfce1122980b57752ed242a4b21cffeadc5b165d3449459a1c1880e294a1d5d4da8b6f0ec6cfad9614b0987ca2f813c9f311c65db049a7305ade916326a27d8ac20e575098d39eb7ce623068608b4f923c88c5ef50abb167bfc50d29a404fa3cd532b1e74ad652d6d14b12827955ed30f58cb0ac7b07d70881b43cc8f0495b0c66dcbc2496fb8226cb5212bf42fa58d7f3227d7b8cebf1aba722a211ec2d5ad547578382fe29c1866ddbe28d37e6bee0d7df6c7968a0919b790dabf86b0ea7e5d10e1daa98de1c7b8142202c6da9d431eb6a77fa361c1c13c4aeae6b0acffdbaa6aa76a7fc1f8635ba4328fd70254ab33cddd7a6e594f4c360d8c1d651243650eefabe495777cb8f09536d3565472a58ed2f6004d486e7a01935c5ef6716c6b1d0c1f2ab61479c16864efcec9170e113ba143a4e930ee4e5c29015b2a84948ca97b83a378ad012c48de0d4419ddc29ac072d3c4d7e887b1e95f39610184dbed51e39a44f2e3c68ef4909f48a275e19a94feaa2f05f4e9f753bc3b782c77d0fd585d31e54b5bd73c668b6cb0ee41a34f3f55f3031a443239ec1f462329379382df15c94a00c6525bd95e6562050bd220f115428436c00f5c2f3253f41d0a3abb216ded81f477347e3314ace2621d52a05a4c34d1019a5fbd702df367f38940c9ff2d0b7cb85f3c9d6cc7571a440ab37a61ae07da04591539d8be3b941eb2e9c2fa5cbfc89e474ac3093007120b5da4a6c8d153cdb0e4c599764c07a1f55a5ed5514742aa183c310de4cf4ecc911700a9b4d50cd0da210720745e4553e3b394b8402e01c66d25020efb2dc9ab7cce01bb9fb614767a4006cdb587c23f79c681b087a184fd559d6fea9f0d797492c17379b303496d99873d68507c9eb882cfc33f434bef869bf0ce5b426d33f5a7bdb4603e74b30ce9e5ceecea4f91af1b061a4f7024dafc80442faf200f25dc3bde20b74b5b64be44cbecce582a210fa244bfaf841c23b731abfd7c60d05a7b897bdd3a13fc78a53", [[], [], [], [], []]}, 0x1578) ioctl$TCXONC(r0, 0x540a, 0x2) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000015c0)={0x2, 0x4e20, @rand_addr=0x1}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001640)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001680)={0x5, {{0xa, 0x4e23, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x50}}, 0x1, 0x1, [{{0xa, 0x4e23, 0x4, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x80000000}}]}, 0x110) statfs(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)=""/141) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001900)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000019c0)={&(0x7f00000018c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001980)={&(0x7f0000001940)={0x1c, r1, 0x200, 0x70bd27, 0x25dfdbff, {0x8}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/sequencer\x00', 0x800, 0x0) clock_gettime(0x0, &(0x7f0000001a80)={0x0, 0x0}) futimesat(r2, &(0x7f0000001a40)='./file1\x00', &(0x7f0000001ac0)={{}, {r3, r4/1000+10000}}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000001b80)={0xa, &(0x7f0000001b00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) r5 = accept$ax25(r0, &(0x7f0000001bc0), &(0x7f0000001c00)=0x10) removexattr(&(0x7f0000001c40)='./file0/file0\x00', &(0x7f0000001c80)=@known='system.sockprotoname\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001cc0)={0x0, 0x100, 0x5, 0x8, &(0x7f0000ffc000/0x4000)=nil}) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000001d00)={0x18, 0x0, {0x2, @random="ba351289c588", 'teql0\x00'}}) r6 = syz_open_dev$amidi(&(0x7f0000001d40)='/dev/amidi#\x00', 0xf4, 0x80) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001d80)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000001dc0)={0x0, 0x10001, 0x7fff, 0x100000000}, &(0x7f0000001e00)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000001e40)={r7, 0x4}, &(0x7f0000001e80)=0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001ec0)={r0, r6, 0x0, 0x1}, 0x10) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000001f40)={0x1, &(0x7f0000001f00)=[{}]}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)) openat$cuse(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/cuse\x00', 0x400000, 0x0) userfaultfd(0x80800) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r5) syz_open_dev$amidi(&(0x7f0000002000)='/dev/amidi#\x00', 0x2f8b, 0x0) 2018/04/30 14:08:05 executing program 6: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x200000) pwrite64(r0, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0x4d, 0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)=0x6, 0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000100)=0x1ff, 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x8000, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000180)=0x5) r2 = accept4(r1, &(0x7f00000001c0)=@in={0x0, 0x0, @multicast2}, &(0x7f0000000240)=0x80, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r1, 0x0, 0x1}, 0x14) rt_sigtimedwait(&(0x7f00000002c0), 0x0, &(0x7f0000000300)={0x77359400}, 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000340)={{0xba3, 0xeb}, {0x200, 0x5}, 0x2, 0x1, 0xffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = semget$private(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f00000003c0)=[0x9]) getpeername$inet(r3, &(0x7f0000000400)={0x0, 0x0, @dev}, &(0x7f0000000440)=0x10) getpeername$inet(r1, &(0x7f0000000480)={0x0, 0x0, @remote}, &(0x7f00000004c0)=0x10) getsockopt$llc_int(r1, 0x10c, 0x7, &(0x7f0000000500), &(0x7f0000000540)=0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000580)={r1}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000005c0)=0x8b, 0x4) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000600)=0x1) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000640), &(0x7f0000000680)=0x4) semop(r4, &(0x7f00000006c0)=[{0x3, 0x1, 0x1800}, {0x5, 0xb146, 0x1000}], 0x2) getsockopt$nfc_llcp(r2, 0x118, 0x3, &(0x7f0000000700)=""/165, 0xa5) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x8000, 0x3, 0x10, 0x4, "191d1ec92d3238bdbf2a4b822273f163c4e17a548b60d540bd5412041f4a5568986d5fa85cd4ad88b4b2c4d4de793e4c4b7ea715dc4c47780c4a347f5c35bab7", "b11cf5b2c7d686af19e139af2589b2080c338839bbc1a33032d2d33230de72e7", [0x3, 0x5]}) msgget(0x2, 0x80) ioctl$TIOCSBRK(r3, 0x5427) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000880)) openat$md(0xffffffffffffff9c, &(0x7f0000000980)='/dev/md0\x00', 0x4000, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000009c0)=0x4) syz_genetlink_get_family_id$fou(&(0x7f0000000a00)='fou\x00') 2018/04/30 14:08:05 executing program 2: [ 57.215336] IPVS: ftp: loaded support on port[0] = 21 [ 57.262801] IPVS: ftp: loaded support on port[0] = 21 [ 57.307282] IPVS: ftp: loaded support on port[0] = 21 [ 57.366291] IPVS: ftp: loaded support on port[0] = 21 [ 57.464411] IPVS: ftp: loaded support on port[0] = 21 [ 57.542835] IPVS: ftp: loaded support on port[0] = 21 [ 57.691359] IPVS: ftp: loaded support on port[0] = 21 [ 57.846780] IPVS: ftp: loaded support on port[0] = 21 [ 58.782470] ip (4662) used greatest stack depth: 54408 bytes left [ 59.224225] ip (4696) used greatest stack depth: 54280 bytes left [ 59.814587] ip (4741) used greatest stack depth: 54200 bytes left [ 60.328570] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.335163] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.365201] device bridge_slave_0 entered promiscuous mode [ 60.493654] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.500304] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.526916] device bridge_slave_0 entered promiscuous mode [ 60.652844] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.659371] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.669944] device bridge_slave_1 entered promiscuous mode [ 60.697851] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.704414] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.747593] device bridge_slave_0 entered promiscuous mode [ 60.775799] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.782293] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.813188] device bridge_slave_0 entered promiscuous mode [ 60.828775] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.835272] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.843465] device bridge_slave_1 entered promiscuous mode [ 60.898865] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.905417] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.935382] device bridge_slave_0 entered promiscuous mode [ 60.949434] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.957357] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.963854] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.983112] device bridge_slave_1 entered promiscuous mode [ 61.029108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.058559] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.065110] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.106797] device bridge_slave_1 entered promiscuous mode [ 61.136870] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.146268] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.152741] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.194587] device bridge_slave_1 entered promiscuous mode [ 61.233598] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.256623] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.287603] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.294137] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.348174] device bridge_slave_0 entered promiscuous mode [ 61.376827] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.390119] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.418294] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.424796] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.447117] device bridge_slave_0 entered promiscuous mode [ 61.470108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.493808] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.500392] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.559889] device bridge_slave_0 entered promiscuous mode [ 61.587948] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.627401] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.633956] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.663500] device bridge_slave_1 entered promiscuous mode [ 61.703891] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.712508] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.719125] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.745545] device bridge_slave_1 entered promiscuous mode [ 61.763857] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.770346] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.792184] device bridge_slave_1 entered promiscuous mode [ 61.862603] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.872408] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.916548] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.051280] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.072640] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.086210] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.098449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.114141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.132587] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.261942] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.287357] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.325192] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.355710] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.362695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.376836] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.385478] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.482230] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.540121] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.547171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.571084] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.579078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.617388] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.648759] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.660584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.682413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.689480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.746499] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.753615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.778167] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.790626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.797568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.856141] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.891811] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.900138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.924149] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.931221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.056607] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.075396] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.144340] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.166949] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.176099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.274009] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.281976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.315251] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.348294] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.355819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.389904] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.407461] team0: Port device team_slave_0 added [ 63.477759] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.501985] team0: Port device team_slave_0 added [ 63.530366] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.549943] team0: Port device team_slave_0 added [ 63.561606] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.568587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.599767] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.613158] team0: Port device team_slave_0 added [ 63.620837] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.627987] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.646291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.679148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.700738] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.718307] team0: Port device team_slave_1 added [ 63.762643] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.780588] team0: Port device team_slave_1 added [ 63.805644] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.831208] team0: Port device team_slave_1 added [ 63.846290] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.866588] team0: Port device team_slave_0 added [ 63.893085] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.920074] team0: Port device team_slave_1 added [ 63.952352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.959817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.977869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.998902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.016974] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.050864] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.057780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.072107] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.101112] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.114185] team0: Port device team_slave_1 added [ 64.141384] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.184626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.210814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.233374] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.247273] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.265288] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.274232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.309441] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.326762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.336376] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.345097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.354726] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.364267] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.378683] team0: Port device team_slave_0 added [ 64.399588] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.423884] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.433158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.442645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.471924] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.485660] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.507238] team0: Port device team_slave_0 added [ 64.530739] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.538431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.551892] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.580202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.601320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.624387] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.632115] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.653232] team0: Port device team_slave_1 added [ 64.664328] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.673561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.693577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.713226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.731209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.757661] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.766100] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.773775] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.788753] team0: Port device team_slave_0 added [ 64.797335] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.817379] team0: Port device team_slave_1 added [ 64.829785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.842443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.858167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.879911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.896260] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.909425] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.917460] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.925983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.940522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.954801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.972319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.989884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.006221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.021856] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.029147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.037464] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.061853] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.071197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.089348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.099129] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.114141] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.123414] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.136227] team0: Port device team_slave_1 added [ 65.146745] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.157978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.178500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.207501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.234199] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.263660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.295342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.332518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.347477] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.357445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.364502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.372712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.389820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.415249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.436132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.473897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.538258] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.545767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.561240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.594883] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.616437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.623415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.657780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.701208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.733069] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.821243] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.830341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.847268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.878324] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.886709] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.895831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.934346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.965616] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.996139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.090572] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.098150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.111191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.240016] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.246652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.253490] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.259940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.323840] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.334600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.387986] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.394502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.401363] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.407808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.493819] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.696900] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.703403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.710291] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.716748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.738497] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.840193] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.846711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.853616] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.860509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.938793] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.965798] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.972290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.979176] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.985632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.994375] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.205690] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.212196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.219102] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.225579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.282655] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.321082] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.327604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.334503] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.340939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.390187] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.404449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.416679] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.440683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.452960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.461120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.470307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.685493] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.691991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.698836] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.705264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.713129] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 69.192238] ip (5381) used greatest stack depth: 53992 bytes left [ 69.408226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.502656] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.690383] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.709822] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.740212] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.141059] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.214529] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.256767] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.389160] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.503294] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.513837] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.522717] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.635541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.983296] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.029252] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.124902] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.159209] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.167437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.176904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.316502] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.322805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.333592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.359205] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.373207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.403323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.454642] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.461389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.477818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.507662] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.885282] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.891929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.903593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.940938] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.947281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.961094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.993524] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.011206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.042952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.068137] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.149460] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.287454] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.339431] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.374583] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.383708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.397850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.701236] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.848829] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.914393] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.294740] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.983443] Unknown ioctl -2133043935 [ 84.006612] Unknown ioctl 1074025778 [ 84.048702] Unknown ioctl 8828 [ 84.130289] Unknown ioctl -2133043935 [ 84.163867] Unknown ioctl 1074025778 [ 84.189192] Unknown ioctl 8828 2018/04/30 14:08:34 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x200000) pwrite64(r0, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0x4d, 0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)=0x6, 0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000100)=0x1ff, 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x8000, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000180)=0x5) r2 = accept4(r1, &(0x7f00000001c0)=@in={0x0, 0x0, @multicast2}, &(0x7f0000000240)=0x80, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r1, 0x0, 0x1}, 0x14) rt_sigtimedwait(&(0x7f00000002c0), 0x0, &(0x7f0000000300)={0x77359400}, 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000340)={{0xba3, 0xeb}, {0x200, 0x5}, 0x2, 0x1, 0xffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = semget$private(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f00000003c0)=[0x9]) getpeername$inet(r3, &(0x7f0000000400)={0x0, 0x0, @dev}, &(0x7f0000000440)=0x10) getpeername$inet(r1, &(0x7f0000000480)={0x0, 0x0, @remote}, &(0x7f00000004c0)=0x10) getsockopt$llc_int(r1, 0x10c, 0x7, &(0x7f0000000500), &(0x7f0000000540)=0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000580)={r1}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000005c0)=0x8b, 0x4) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000600)=0x1) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000640), &(0x7f0000000680)=0x4) semop(r4, &(0x7f00000006c0)=[{0x3, 0x1, 0x1800}, {0x5, 0xb146, 0x1000}], 0x2) getsockopt$nfc_llcp(r2, 0x118, 0x3, &(0x7f0000000700)=""/165, 0xa5) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x8000, 0x3, 0x10, 0x4, "191d1ec92d3238bdbf2a4b822273f163c4e17a548b60d540bd5412041f4a5568986d5fa85cd4ad88b4b2c4d4de793e4c4b7ea715dc4c47780c4a347f5c35bab7", "b11cf5b2c7d686af19e139af2589b2080c338839bbc1a33032d2d33230de72e7", [0x3, 0x5]}) msgget(0x2, 0x80) ioctl$TIOCSBRK(r3, 0x5427) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000880)) openat$md(0xffffffffffffff9c, &(0x7f0000000980)='/dev/md0\x00', 0x4000, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000009c0)=0x4) syz_genetlink_get_family_id$fou(&(0x7f0000000a00)='fou\x00') 2018/04/30 14:08:34 executing program 7: 2018/04/30 14:08:34 executing program 3: 2018/04/30 14:08:34 executing program 6: 2018/04/30 14:08:34 executing program 1: 2018/04/30 14:08:34 executing program 5: 2018/04/30 14:08:34 executing program 4: 2018/04/30 14:08:34 executing program 2: 2018/04/30 14:08:34 executing program 7: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x200000) pwrite64(r0, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0x4d, 0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)=0x6, 0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000100)=0x1ff, 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x8000, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000180)=0x5) r2 = accept4(r1, &(0x7f00000001c0)=@in={0x0, 0x0, @multicast2}, &(0x7f0000000240)=0x80, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r1, 0x0, 0x1}, 0x14) rt_sigtimedwait(&(0x7f00000002c0), 0x0, &(0x7f0000000300)={0x77359400}, 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000340)={{0xba3, 0xeb}, {0x200, 0x5}, 0x2, 0x1, 0xffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = semget$private(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f00000003c0)=[0x9]) getpeername$inet(r3, &(0x7f0000000400)={0x0, 0x0, @dev}, &(0x7f0000000440)=0x10) getpeername$inet(r1, &(0x7f0000000480)={0x0, 0x0, @remote}, &(0x7f00000004c0)=0x10) getsockopt$llc_int(r1, 0x10c, 0x7, &(0x7f0000000500), &(0x7f0000000540)=0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000580)={r1}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000005c0)=0x8b, 0x4) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000600)=0x1) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000640), &(0x7f0000000680)=0x4) semop(r4, &(0x7f00000006c0)=[{0x3, 0x1, 0x1800}, {0x5, 0xb146, 0x1000}], 0x2) getsockopt$nfc_llcp(r2, 0x118, 0x3, &(0x7f0000000700)=""/165, 0xa5) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x8000, 0x3, 0x10, 0x4, "191d1ec92d3238bdbf2a4b822273f163c4e17a548b60d540bd5412041f4a5568986d5fa85cd4ad88b4b2c4d4de793e4c4b7ea715dc4c47780c4a347f5c35bab7", "b11cf5b2c7d686af19e139af2589b2080c338839bbc1a33032d2d33230de72e7", [0x3, 0x5]}) msgget(0x2, 0x80) ioctl$TIOCSBRK(r3, 0x5427) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000880)) openat$md(0xffffffffffffff9c, &(0x7f0000000980)='/dev/md0\x00', 0x4000, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000009c0)=0x4) syz_genetlink_get_family_id$fou(&(0x7f0000000a00)='fou\x00') 2018/04/30 14:08:34 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x240000) ioctl$TIOCCONS(r0, 0x541d) write$binfmt_elf32(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x0, 0xfe8, 0x5, 0xffff, 0x3, 0x3f, 0x200, 0x3d3, 0x38, 0x3ba, 0x1, 0x6, 0x20, 0x1, 0x6, 0x80000000, 0x800}, [{0x70000003, 0x5, 0x5, 0x101, 0x100000000, 0x4, 0x9, 0xfffffffffffffffe}, {0x60000000, 0x2, 0x8001, 0x101, 0xff, 0x3f, 0x8, 0x8}], "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", [[], [], [], [], []]}, 0x1578) ioctl$TCXONC(r0, 0x540a, 0x2) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000015c0)={0x2, 0x4e20, @rand_addr=0x1}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001640)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001680)={0x5, {{0xa, 0x4e23, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x50}}, 0x1, 0x1, [{{0xa, 0x4e23, 0x4, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x80000000}}]}, 0x110) statfs(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)=""/141) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001900)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000019c0)={&(0x7f00000018c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001980)={&(0x7f0000001940)={0x1c, r1, 0x200, 0x70bd27, 0x25dfdbff, {0x8}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/sequencer\x00', 0x800, 0x0) clock_gettime(0x0, &(0x7f0000001a80)={0x0, 0x0}) futimesat(r2, &(0x7f0000001a40)='./file1\x00', &(0x7f0000001ac0)={{}, {r3, r4/1000+10000}}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000001b80)={0xa, &(0x7f0000001b00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) r5 = accept$ax25(r0, &(0x7f0000001bc0), &(0x7f0000001c00)=0x10) removexattr(&(0x7f0000001c40)='./file0/file0\x00', &(0x7f0000001c80)=@known='system.sockprotoname\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001cc0)={0x0, 0x100, 0x5, 0x8, &(0x7f0000ffc000/0x4000)=nil}) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000001d00)={0x18, 0x0, {0x2, @random="ba351289c588", 'teql0\x00'}}) r6 = syz_open_dev$amidi(&(0x7f0000001d40)='/dev/amidi#\x00', 0xf4, 0x80) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001d80)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000001dc0)={0x0, 0x10001, 0x7fff, 0x100000000}, &(0x7f0000001e00)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000001e40)={r7, 0x4}, &(0x7f0000001e80)=0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001ec0)={r0, r6, 0x0, 0x1}, 0x10) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000001f40)={0x1, &(0x7f0000001f00)=[{}]}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)) openat$cuse(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/cuse\x00', 0x400000, 0x0) userfaultfd(0x80800) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r5) syz_open_dev$amidi(&(0x7f0000002000)='/dev/amidi#\x00', 0x2f8b, 0x0) 2018/04/30 14:08:34 executing program 3: unshare(0x40600) r0 = syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x3, 0x400000002, 0x0, 0x0, 0x10000000000}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000000)) 2018/04/30 14:08:34 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000e27000)='/dev/vcsa#\x00', 0x1, 0x800001) write(r0, &(0x7f0000000000)='\x00', 0x1) 2018/04/30 14:08:34 executing program 5: r0 = socket(0x10, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00002fbff0)={0x1, &(0x7f000012c000)=[{0x6, 0x0, 0x0, 0x7}]}, 0x10) r1 = add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000000c0)="998d3e2c13df8e30429fa76a2daf3370e4af5960b4cae98da7fd00a65f1c9eb102a4defed9cd57557f007b2b7ec471ff79aa3584fa9ee04020b63ace2d22d1a7a7685b84399bac8befaef26879d1ffb364e7e55445441a905bf8940f4ef639f232c69746af111c4cb145bf13cb582c01", 0x70, r1) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @multicast2=0xe0000002}}, 0x1e) write(r0, &(0x7f000061cfde)="1f0000000401ffd60000010720000000000001000000ffdcffffffffffde8f", 0x1f) 2018/04/30 14:08:34 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c1153c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$netrom(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) r2 = fcntl$getown(r0, 0x9) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000800)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000580)=[{&(0x7f00000001c0)="aa7aa5a52bba9dff6889dd9a552c577e9a73259fda98ce21213b8017500413fd267413a73a5e1676c2b6d7684ab42216edec550e9bfa8f5485d7108e7148fe67749becdc3959ac533bf2b082cbd59894e943c5c6acc676447c2cdf59887db6e7d58b3af3ba0f6af3fa6f12d15c713b2350b4e3f5402e4571413f3f80", 0x7c}, {&(0x7f0000000340)="770273c3a399c18ee286ce35e77a16c2c58541ea68dfc450e3b314e07a2391ad320504dc61ecc23c40bf41abbe6bc219e79a1bd4dc50f35cab4ebf863d23eea678a2ccf3ed5528d0a6f1195c1839cace55f8c7315beba267964d81bb3faa5aae9ee0f31a64e2986e347c6809072e7b4022564f730b3f3c54d478540dba9656f869447b3c981667c6179a51b2976bb1c3c7f15b669b2761c96bbe7b170218522306652abfb2c0ce2b182fb007d3838c6080cb26d4ce19215b12c48cb12c05a0a4f31760d0d008a95eb4c4670f9c99fea7ef91c1e9f809", 0xd6}, {&(0x7f0000000240)="f39238bb562c79a478096cd9545953d3f6b1d236b9268a7a2f744332e14c4b64ec9e2852bfa3a87966e6b623dbc4c5beed0f7c27f8f0c188aad427c5aad52799003dc83e414d95c91b26ea", 0x4b}, {&(0x7f0000000440)="23b93e05e57ecff07f480d83fccfad52b8df17c5b6628caa5d0c65eb9de0ad98418e4ddd721fcf8aecf0e2a52d34215051c09e789d9a9b95aca290f4c5b6e621f0a48da09d42b76425b389dbbbb5707ce28380da534074d58706eaaab16ea79d3bc244e711489636fd890d3dfb574a626ef6445fab3ed7908abe7a8145929b6a244e1ed4f73873e971f0720de8eef033c5b5d47b41801784b4b219a897b3851902b80f534c7a6d8b2c60d431274169ac1e7b", 0xb2}, {&(0x7f0000000500)="23204dd9bc9d", 0x6}, {&(0x7f0000000540)="9a0b668f24c3b94a5c1b1656ab59d123137c91792ff121f417ed524e092b9e7756e857", 0x23}], 0x6, &(0x7f0000000780)=[@rights={0x18, 0x1, 0x1, [r1, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}], 0x68, 0xc000}, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)=""/110, 0x6e) ioctl$sock_ipx_SIOCIPXCFGDATA(r0, 0x89e2, &(0x7f0000000840)) 2018/04/30 14:08:35 executing program 6: unshare(0x40602) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x280002, 0x0) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000000c0)={{0xffffffffffffffff, 0x0, 0x4, 0x3, 0xdcd8}, 0x5, 0x100000000, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x100000000, 0xffff, 0x40}) 2018/04/30 14:08:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={"6c6f0000ff00000000000029490bee00", &(0x7f0000000080)=ANY=[@ANYBLOB="4100000000000000000000000000000000000000000000619524990000000000fcffffff0000000000000000cfdbea8d7de2591de050f7e02d0f657031de63962f8ab1691fbb7a5d0ed96480c8b1bf50ec8a711701012ff900166a4a8cc87bb2"]}) listen(r0, 0x3) 2018/04/30 14:08:35 executing program 0: r0 = socket$inet(0x2, 0x80f, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/30 14:08:35 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000040)=@ll={0x11, 0x9, r1, 0x1, 0x10001, 0x6}, 0x80, &(0x7f0000000500)=[{&(0x7f00000000c0)="fd6ba311b1c19d38e93c9ded2b65132bd3ab395c53d13e1776da6fbd4930948aebf9a5225378494d284f4624dc21c717b344e7c0f8f458", 0x37}, {&(0x7f0000000100)="36cd1dc44250389939ad8698545af5d5389c1061b0db03eeaed96d4e840f6d277aac5ef758feb5431359d23dc6cf62a2464376226cb2d3efe2fa6b50684b03074ba1b7f0d1f5e49614f87b32", 0x4c}, {&(0x7f0000000180)="1c54c442b710400077f8f1dd1331eb9bd3c9615460643805222a05f1ea3b197c5bf17861518ddc143311932aa8b768b84a94649f7298a473f93efc2a917c5c64969bff94ed861b6db1dd950bbf4767a902f52cbc3a710b756606bd5beeecbfa63dd9ef", 0x63}, {&(0x7f0000000200)="257dc3f510bf685ef3c22cd6bbc3f1c4b9d65caf66c46d7e96e8b688c2ba119bda2477379465a4689775829d2ef1218fd877beda308d7493d46827d694eb0ab31e50048510b631aecb7cebd94ba26bf5428bf273b432f7fa81bd234676959097bd02a2e8ed380d3bfb243ce0a891643abc81", 0x72}, {&(0x7f0000000280)="aeba67db0888730f68ed8481437b4f144ec55657942f1260f6a25860b885ef97d21cdcebc9459afda7f9438d51feed1e3a45946e060e9a2774ab0853d4f3ef3aea97dcc21db928d49f06797b53f2d23beea26e2a56aef820af0f8130ccd071ba5fcdcef0c845744bdbe42ef841c392e1d48acf5d7ac4035c131f813aeac7379399f37b86e7e9db871f02854a6df93e98bf717bbf95f57102aeb4867e438f98c643864058afbede2217a9ffe8ee745b5edca2228c3de376117e4f6f8e1e58c47e66c7bc16b0c90b38cc2d9f88a9758547f98562f575887077584e97569b6eddb640d0c92f931e2430ea02", 0xea}, {&(0x7f0000000380)="15e14673e56a1cd0723aeba8a54f71a95e753a9f549049befc985c261d467f90a0d0ac", 0x23}, {&(0x7f00000003c0)="e817baad479fe9e9d8aacdb1d7053a0df3e7aad0dd7c3baf3cc634827f9ca3dbbadcd4df2106e734741707d0a1368658e7cc2dc36004706011bb6904aff7dde9c3052a472c27504e4b6470d451a7154f4774acf026109a67f286a39c7fa3609d59381e5813497b977c9c1fca37a729f6cd060106dee1582056d7927aeb3e30847707ad7282bca5e87363e983721c699eb15cb6d811", 0x95}, {&(0x7f0000000480)="7a1006135b57c2a95a6e2ff7c168087387b71b978d616d9a5a06339fe8a2791110133df5a98c0aa1147286047d5acb0164886710931fdc8b0455734fb41bc64a66bcc1bdd35f63ed76a92fbcf1c0f5e0f3dbc76df97190ac3752e8b2b828c3ae63b6", 0x62}], 0x8, 0x0, 0x0, 0x20000000}, 0x20040094) socket$inet6_sctp(0xa, 0x5, 0x84) sendto(r0, &(0x7f0000eaefef), 0x0, 0x0, 0x0, 0x0) 2018/04/30 14:08:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e40fee)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x80000) recvfrom$unix(r1, &(0x7f0000000100)=""/68, 0x44, 0x100, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) mknodat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) quotactl(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 2018/04/30 14:08:35 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0xffffffffffff0000, 0xfff, 0xe8, 0xffffffff, 0xffff, 0x3, 0x3e, 0x5, 0xee, 0x38, 0x2fe, 0x5, 0xfffffffffffffffe, 0x20, 0x2, 0x9e5aad, 0xffffffff, 0xfffffffffffff115}, [{0x60000007, 0x6, 0x80000000, 0x9, 0x1000, 0x100, 0x8, 0x7}, {0x7474e557, 0x3f, 0x8d8b, 0x1ff, 0x3, 0x4, 0x78e, 0x3}], "78bc26676081065aaf4be1f024a314dcd574197a818327b4102750b109681dbe2f226525f886a53ab19b36cadfbe093b32e0e155b8cb84b3f32c73388b6956ec72b4e83212e6180680342e3f5f2c8867985ce23b46a94f11066d3c0cde9baee2ace1e0ec8414cfab768a8e005662427e23476ebe836f3c230356e15d8deacf3c56e47aa2a8a95becfd8c8b65731f8b85de75e0b2762272aa08492ee42b3f976029b63acf149d03b2eb4cd9292f97de2c9a2d83ae0d169dd0cdfb4a08718035564c0f3d9157200f4ceaa087de9ea9f9879a3d9dd13f8f338cef62c571f7c6477657443e2a2f6641770501aace1b6bcbdd0fc225b1385c8f1e1bdb48", [[], [], [], [], [], [], []]}, 0x873) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) syz_emit_ethernet(0x20e, &(0x7f000000a000)={@broadcast=[0xff, 0xe0, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/30 14:08:35 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20000000000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000003000)={0x0, @in={{0x2}}}, &(0x7f0000000000)=0x100) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0xff, 0x105000) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000000)=""/147) 2018/04/30 14:08:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e40fee)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x400) 2018/04/30 14:08:35 executing program 3: sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='loginuid\x00') sendfile(r0, r1, &(0x7f0000000000), 0x2bf) 2018/04/30 14:08:35 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000000c0)={{0x6, 0x1}, {0xffffffffffffffff, 0x7}, 0x1, 0x6, 0x3a054}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)={{0xfffffffffffffffe}}) 2018/04/30 14:08:36 executing program 7: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000080)) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x19) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00009f7fc8)={&(0x7f00009f7000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000001000)={0x14}, 0x14}, 0x1}, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000040)={0x7, 0x7fff}) r1 = socket$netlink(0xa, 0x5, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x84, 0x76, &(0x7f0000000ffc), 0x8) 2018/04/30 14:08:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x40, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) ftruncate(r0, 0x1e3) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x81, 0x8000) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0x810a, 0x4) recvmsg$netrom(r1, &(0x7f0000000400)={&(0x7f0000000040)=@ax25={0x3, {"650f00a360b8d6"}, 0x4}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000500)="e9239fa9b90556a56e15d201e25b288923377f5b6e9482369a60e9d8cac10e22e4b8f489d0c56009eac6531f33ebe59ce6a573513e07daf7340dfb568d9feb34392f45a90d9f9ea3402b39ea7b76e73506f01607229afdd4c82927a5fdb8faf19d50bad6cb041137a2fd2b8479eeaac0be04946d67e00c52f58dcc48e239d2a92afab1a4acf53f97dcd8bb511051f764222d12938553274e963a1ab74c1d68cd9d7cfbc36659bfb2acb1ff388c97f7ddf9a99689a1b7c860bde12f", 0xbb}, {&(0x7f00000001c0)="b2fc716f2594628bfc1ed06d135595fdd0256a05311cfae9560c090a4d3a83cb1e42811519c3626a796ba5aa4ce4fedd6c816d49eca954828b91762afd333775b56d4e2d12bc35ee39aa9600dfd05c2b441be431d01b8be60c2f80476368ad356c088838d921a6d3f99b283ff9cd6697cb273558f51962c5bb0c9478100110083cd760af2bca8559e243f1e08b9db8397d1c2bb7d6615e46ea96dcd6b85974b808c1ebb67ecdd31b9c7f7867e7e54ef800875507df778d92d96edd6bd9c8184b1a04bc327ff81da23e8eaffc3440da83fadef63579d1d14a900ebb39e4ab17aaa179c46d48f8e4", 0xe7}, {&(0x7f00000002c0)="f2adae851003845b67897343f8a32420e2d525cde441bbdcbc6f323afc9808c46ab6849c96b86020f946c9b31dbfb89531f98b18c48aeeb0f1ae9d9adca1cbe26d47a8951b937a9942134854867e42dd05666a14aa592412bdc2a94d54c4705759c3b3846b153433c0abfd3b5774392e4cc45786", 0x74}], 0x3, &(0x7f0000000380)=[{0x78, 0x3a, 0x401, "37fbb7642ec3b5149631133a64051cc8632e525bf70748fb048ebc1bd1129eff81ba5998a313de0d5cc6143bca28b99a1a6d7cfc857fa739054e567f1b649c9004f1a9ba3bcfe192e42335d93b689dd21ad950c0b00f06226c0dfc694853f2e258a4bef8fb"}], 0x78, 0x10}, 0x40) read(r0, &(0x7f0000000440)=""/47, 0x2f) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="4a20a6a57ca861ba88157321334282502577554053017e22b3ee24deb5899e38464a5743f72a550a34dbbbaab03558b220883395ab85d0f8173a9e8bcd58f7cd23d1c63e6cbadf728bfbc56a5e75263551403b04681b1bd5cd323c596ee1fcbd0b3eae0e45b8043f121ac186aed9eb77d36a84b43944efbd"], 0x2) 2018/04/30 14:08:36 executing program 4: r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x8810000400000084) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xa8b1, 0x101000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@ipv4={[], [], @loopback}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000b80)=0xe8) connect$packet(r1, &(0x7f0000000bc0)={0x11, 0xfe, r2, 0x1, 0x3, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1f}}, 0x14) socket$inet6(0xa, 0xf, 0x55) shutdown(r0, 0x0) sendmmsg(r0, &(0x7f0000007a40)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000001540)=[{&(0x7f0000001500)="f8", 0x1}], 0x1, &(0x7f00000015c0)}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/30 14:08:36 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) request_key(&(0x7f0000001240)='blacklist\x00', &(0x7f0000001280)={0x73, 0x79, 0x7a}, &(0x7f00000012c0)='vboxnet0\x00', 0xfffffffffffffffa) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001200), 0x1000000000000082, 0x0) 2018/04/30 14:08:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000001c0)=0xffffffff, 0x4) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={r0, 0x3, 0x1, 0x100000003, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0xffffff6f) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000200)=""/4096) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000001380)=""/130) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/mcfilter6\x00') timer_create(0x7, &(0x7f0000000080)={0x0, 0x26, 0x7, @tid=0xffffffffffffffff}, &(0x7f0000001200)=0x0) timer_settime(r3, 0x1, &(0x7f0000001240)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000001280)) ioctl$KDADDIO(r2, 0x4b34, 0x80000000000004) ioctl$TIOCCBRK(r2, 0x5428) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0xfff, 0x20000) 2018/04/30 14:08:36 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f000000a000), 0x0, &(0x7f0000000000)}, 0x0) sigaltstack(&(0x7f0000001000/0x1000)=nil, &(0x7f0000000ff8)) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1000, 0x40000) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000080)=0x100, 0x4) sigaltstack(&(0x7f0000001000/0x4000)=nil, &(0x7f0000000000)) 2018/04/30 14:08:36 executing program 1: r0 = socket(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfa9, 0x440500) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000000c0)=""/151) connect$inet(r0, &(0x7f0000390000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) r2 = open(&(0x7f0000000080)='./file0\x00', 0x141046, 0x0) ftruncate(r2, 0x10000) sendfile(r0, r2, 0x0, 0x72439a6b) clone(0x0, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000804000)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000040)=0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000002c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000340)={r4, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f0000000400)=0x84) get_robust_list(r3, &(0x7f0000000240)=&(0x7f0000000200)={&(0x7f00000001c0)={&(0x7f0000000180)}}, &(0x7f0000000280)=0x18) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f00006fcff0)) 2018/04/30 14:08:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000d6d000)={0x0, 0x2000000000069, 0x0, 0x0, 0x2, 0x0, 0x1ff, 0x0, 0x0, 0x6}, 0xb) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) read(r0, &(0x7f00005f6000)=""/99, 0x63) 2018/04/30 14:08:36 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 2018/04/30 14:08:36 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) request_key(&(0x7f0000001240)='blacklist\x00', &(0x7f0000001280)={0x73, 0x79, 0x7a}, &(0x7f00000012c0)='vboxnet0\x00', 0xfffffffffffffffa) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001200), 0x1000000000000082, 0x0) 2018/04/30 14:08:36 executing program 6: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x16907e, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0xfd82) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{0x80000000, 0xffffffff}, {0x2, 0x2c}, {0x2, 0x1000}, {0x2, 0x8}, {0x101, 0x5a51}, {0x0, 0x7}, {0x200000000, 0x4af}, {0x0, 0x2e45}]}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f00000001c0)=""/53, &(0x7f0000000200)=0xfffffd01) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)={0x1, r0}) getsockopt$ax25_int(r0, 0x101, 0x4, &(0x7f0000000240), &(0x7f0000000280)=0x4) clock_getres(0x6, &(0x7f0000000180)) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000100)=0x8000) ioctl$TCSBRK(r0, 0x5409, 0x12000) 2018/04/30 14:08:36 executing program 3: r0 = add_key(&(0x7f0000dabff3)='dns_resolver\x00', &(0x7f0000d24000)={0x73, 0x79, 0x7a}, &(0x7f000076e000), 0xfcff, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000140)={0x3}, 0x8) userfaultfd(0x80800) keyctl$read(0xb, r0, &(0x7f0000000000)=""/193, 0xc1) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) 2018/04/30 14:08:37 executing program 7: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6b, 0x12000) r1 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000140)={{0x10001, 0x3, 0x4, 0x0, "e23f639c7788eebfabd7db100d270e4a172ca85d5ebfadb2bc73d4206177486303ae9faa00a302d58f33c7d1", 0x400}, 0x0, 0x0, 0x8000, r1, 0x81, 0x3, "97b4b48aa2eba92306fade9c45d9b614385903c2a0696e2d968305d0b39e3586a6e2f6e6e2ba89762d88e5a20155aa0a9d46b65b160b4629c56a21aa96baaf8d", &(0x7f0000000040)='lo\x00', 0x3, [], [0x401, 0x50, 0x7fff, 0x8001]}) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f000035d000)={&(0x7f000033c000)=ANY=[@ANYBLOB="02180000080000000000000000000000030006000000000002000000060000000000000000000000030005000000000002000000000000000000000000000000"], 0x40}, 0x1}, 0x0) 2018/04/30 14:08:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0xc200, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000680)={@empty, @broadcast, 0x0}, &(0x7f00000006c0)=0xc) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000700)={@local={0xfe, 0x80, [], 0xaa}, @empty, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x7, 0x1, 0x0, 0x100, 0x8, 0x200000, r2}) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000001c0)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x108) 2018/04/30 14:08:37 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x10000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x7fffffff, 0x2, [0x40, 0x4]}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r1, 0xcc0}, &(0x7f0000000140)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80001, 0x0) write(r2, &(0x7f0000000140), 0x0) write(r2, &(0x7f0000000400), 0xfc94) 2018/04/30 14:08:37 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) request_key(&(0x7f0000001240)='blacklist\x00', &(0x7f0000001280)={0x73, 0x79, 0x7a}, &(0x7f00000012c0)='vboxnet0\x00', 0xfffffffffffffffa) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001200), 0x1000000000000082, 0x0) 2018/04/30 14:08:37 executing program 6: r0 = socket$inet6(0xa, 0x2100000000000002, 0x7f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f0000000040)=@ethtool_cmd={0x27}}) 2018/04/30 14:08:37 executing program 1: r0 = socket(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfa9, 0x440500) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000000c0)=""/151) connect$inet(r0, &(0x7f0000390000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) r2 = open(&(0x7f0000000080)='./file0\x00', 0x141046, 0x0) ftruncate(r2, 0x10000) sendfile(r0, r2, 0x0, 0x72439a6b) clone(0x0, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000804000)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000040)=0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000002c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000340)={r4, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f0000000400)=0x84) get_robust_list(r3, &(0x7f0000000240)=&(0x7f0000000200)={&(0x7f00000001c0)={&(0x7f0000000180)}}, &(0x7f0000000280)=0x18) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f00006fcff0)) 2018/04/30 14:08:37 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f00000000c0)={0x1, &(0x7f00000001c0)=""/204, &(0x7f0000000040)=[{0xc3, 0xf7, 0x4, &(0x7f00000002c0)=""/247}]}) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfe}, 0xc) sendmsg(r1, &(0x7f0000000940)={&(0x7f0000000140)=@nl=@proc={0x10, 0x0, 0x25dfdbfe}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000780)}, 0x0) recvmsg(r1, &(0x7f0000002ec0)={&(0x7f0000002a80)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002d80), 0x0, &(0x7f0000002dc0)=""/246, 0xf6}, 0x0) 2018/04/30 14:08:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x40, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) ftruncate(r0, 0x1e3) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x81, 0x8000) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0x810a, 0x4) recvmsg$netrom(r1, &(0x7f0000000400)={&(0x7f0000000040)=@ax25={0x3, {"650f00a360b8d6"}, 0x4}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000500)="e9239fa9b90556a56e15d201e25b288923377f5b6e9482369a60e9d8cac10e22e4b8f489d0c56009eac6531f33ebe59ce6a573513e07daf7340dfb568d9feb34392f45a90d9f9ea3402b39ea7b76e73506f01607229afdd4c82927a5fdb8faf19d50bad6cb041137a2fd2b8479eeaac0be04946d67e00c52f58dcc48e239d2a92afab1a4acf53f97dcd8bb511051f764222d12938553274e963a1ab74c1d68cd9d7cfbc36659bfb2acb1ff388c97f7ddf9a99689a1b7c860bde12f", 0xbb}, {&(0x7f00000001c0)="b2fc716f2594628bfc1ed06d135595fdd0256a05311cfae9560c090a4d3a83cb1e42811519c3626a796ba5aa4ce4fedd6c816d49eca954828b91762afd333775b56d4e2d12bc35ee39aa9600dfd05c2b441be431d01b8be60c2f80476368ad356c088838d921a6d3f99b283ff9cd6697cb273558f51962c5bb0c9478100110083cd760af2bca8559e243f1e08b9db8397d1c2bb7d6615e46ea96dcd6b85974b808c1ebb67ecdd31b9c7f7867e7e54ef800875507df778d92d96edd6bd9c8184b1a04bc327ff81da23e8eaffc3440da83fadef63579d1d14a900ebb39e4ab17aaa179c46d48f8e4", 0xe7}, {&(0x7f00000002c0)="f2adae851003845b67897343f8a32420e2d525cde441bbdcbc6f323afc9808c46ab6849c96b86020f946c9b31dbfb89531f98b18c48aeeb0f1ae9d9adca1cbe26d47a8951b937a9942134854867e42dd05666a14aa592412bdc2a94d54c4705759c3b3846b153433c0abfd3b5774392e4cc45786", 0x74}], 0x3, &(0x7f0000000380)=[{0x78, 0x3a, 0x401, "37fbb7642ec3b5149631133a64051cc8632e525bf70748fb048ebc1bd1129eff81ba5998a313de0d5cc6143bca28b99a1a6d7cfc857fa739054e567f1b649c9004f1a9ba3bcfe192e42335d93b689dd21ad950c0b00f06226c0dfc694853f2e258a4bef8fb"}], 0x78, 0x10}, 0x40) read(r0, &(0x7f0000000440)=""/47, 0x2f) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="4a20a6a57ca861ba88157321334282502577554053017e22b3ee24deb5899e38464a5743f72a550a34dbbbaab03558b220883395ab85d0f8173a9e8bcd58f7cd23d1c63e6cbadf728bfbc56a5e75263551403b04681b1bd5cd323c596ee1fcbd0b3eae0e45b8043f121ac186aed9eb77d36a84b43944efbd"], 0x2) 2018/04/30 14:08:37 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) request_key(&(0x7f0000001240)='blacklist\x00', &(0x7f0000001280)={0x73, 0x79, 0x7a}, &(0x7f00000012c0)='vboxnet0\x00', 0xfffffffffffffffa) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001200), 0x1000000000000082, 0x0) 2018/04/30 14:08:37 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1ff, 0x600080) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000180)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0xff, 0x5, 0x4}, 0x3f1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000100), &(0x7f0000001100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000100), &(0x7f00000000c0)="8984b19ebce043531361675328bc50b986dd4ae61d5fe53dde47ba48d562900aa3b6d600000007e90ce69b55bdfcafd46884d3f64b5c17501cfa3e3af893b2cb69b8632de54cb85f130177da000000"}, 0x20) 2018/04/30 14:08:37 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f00000000c0)={0x1, &(0x7f00000001c0)=""/204, &(0x7f0000000040)=[{0xc3, 0xf7, 0x4, &(0x7f00000002c0)=""/247}]}) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfe}, 0xc) sendmsg(r1, &(0x7f0000000940)={&(0x7f0000000140)=@nl=@proc={0x10, 0x0, 0x25dfdbfe}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000780)}, 0x0) recvmsg(r1, &(0x7f0000002ec0)={&(0x7f0000002a80)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002d80), 0x0, &(0x7f0000002dc0)=""/246, 0xf6}, 0x0) 2018/04/30 14:08:37 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000100)={0x8}, 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000001200)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000004000002000000000000000000530000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x68) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'lo\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) fstat(r1, &(0x7f0000000140)) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/4096) 2018/04/30 14:08:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@ipv4_delroute={0x28, 0x19, 0x1, 0x0, 0x0, {0x2}, [@RTA_SRC={0x8, 0x2, @remote={0xac, 0x14, 0x14, 0xbb}}, @RTA_METRICS={0x4, 0x8}]}, 0x28}, 0x1}, 0x0) 2018/04/30 14:08:45 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) request_key(&(0x7f0000001240)='blacklist\x00', &(0x7f0000001280)={0x73, 0x79, 0x7a}, &(0x7f00000012c0)='vboxnet0\x00', 0xfffffffffffffffa) 2018/04/30 14:08:45 executing program 6: ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000000c0)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000200)={r0}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000240)={0x0, r0, 0x80}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000280)={r0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000002c0)={r0}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000300)={0x0, r0, 0x1000}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000001c0)={r2, r0, 0x100000001}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000140)={0x0, 0x0, 0x2}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000180)={r3, r4}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000340)={'bridge0\x00', 0x1000}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r6, 0x800455d1, &(0x7f0000000040)=""/93) syz_emit_ethernet(0x4e, &(0x7f00000003c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "bd5202", 0x18, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}}}}, &(0x7f0000000600)) 2018/04/30 14:08:45 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000040)={'\x00', {0x2, 0x4e22, @broadcast=0xffffffff}}) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[], 0xfffffffffffffd5f) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000240), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000007060804002000fffc0c6565643b799365195f1b76"], 0x1000) 2018/04/30 14:08:45 executing program 7: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x180, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000556ff0)='/dev/sequencer2\x00', 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x400, 0x41) unshare(0x40600) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000b18000)) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 2018/04/30 14:08:45 executing program 5: r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x414000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nr0\x00', 0x601}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0xfffffffffffffffc) 2018/04/30 14:08:45 executing program 3: unshare(0x60000000) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x210004, 0x0) ftruncate(r0, 0x1) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000140)=0x8) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0x7) 2018/04/30 14:08:45 executing program 1: r0 = socket(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfa9, 0x440500) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000000c0)=""/151) connect$inet(r0, &(0x7f0000390000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) r2 = open(&(0x7f0000000080)='./file0\x00', 0x141046, 0x0) ftruncate(r2, 0x10000) sendfile(r0, r2, 0x0, 0x72439a6b) clone(0x0, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000804000)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000040)=0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000002c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000340)={r4, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f0000000400)=0x84) get_robust_list(r3, &(0x7f0000000240)=&(0x7f0000000200)={&(0x7f00000001c0)={&(0x7f0000000180)}}, &(0x7f0000000280)=0x18) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f00006fcff0)) [ 96.756453] IPVS: ftp: loaded support on port[0] = 21 [ 96.761928] dccp_invalid_packet: invalid packet type 2018/04/30 14:08:45 executing program 5: unshare(0x40600) r0 = syz_open_dev$evdev(&(0x7f00003b4000)='/dev/input/event#\x00', 0x0, 0x0) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) r2 = getpid() getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)=0x0) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000980)=0xe8) r7 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0)={0x0}, &(0x7f0000000a00)=0xc) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00)={0x0}, &(0x7f0000000b40)=0xc) r12 = getuid() stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000c40)={0x0, 0x0}, &(0x7f0000000c80)=0xc) getgroups(0x4, &(0x7f0000000cc0)=[0x0, 0x0, 0x0, 0xffffffffffffffff]) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000002180)=0x0) r18 = geteuid() r19 = getegid() r20 = getpid() fstat(r0, &(0x7f00000021c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000002340)=[{&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000140)="39b816a4e24653c730a430d0919ee27157febad8ac1c8a7a6d0c1db784e0f4b587ad7085363a304d06372ab0f476a5de70c272af1351396389b544f137119e5da415297eed910d58802d3a6e82492904d24f9bf93ed827ca9a8b6ad56ae16627931dd7675a56efa7d869cbbe45dbad3404c51214a6b6577b373c7a", 0x7b}, {&(0x7f00000001c0)="5e2e0460875b69a6cf0037db9265162c2a2a18696e154d59b0c34c969ae6ee88da6aca07c50a08", 0x27}, {&(0x7f0000000200)="872f4f7d8dfe82576bb6ffccb0a2bd24230e44d555e452bbab9d1613c35d9b6a9e793522cffa6ce44aa207c41393852b6874d029ff9d134ca25ac3b367f17d5e147656aa825cd49583d6e7a0de8a92c5d1c4196dd92288e73d0eb9d6b67efdab0813ae8b22f068d8dfbae5f03cb23b9ba774c1776de3ed505678a25089d39c370b3a6b1baab89426abd622ce5506a0c9b5c98f1a7f7f3673b883e3d72d875a6c754c214b5f9246fc82f6b667c8aee903c540192b2a76c6f682575197a62287e720cae220f34fe0c95c0a8dca188fcb891aa4bc6e9adef8aae1c9fc67f465709ebea0763bcb377d", 0xe7}, {&(0x7f0000000300)="cd03e142b50149e2df4438587951f653e4b383dc924adf2f6a859be83d6ea33e075b0cb7b4c27bb769c134a0c3d8bdc009891aa501626d342a31b0e2524e9b0e9e806eb78156976ecf2f208474cca309c7d7c9800b1d53a5d7a3e8507bc1f2bd8c8e129adbc0a4eca54dd55f06adee14d7", 0x71}, {&(0x7f0000000380)="78b4b5a18251121e47073b4c8f73663ea908d15bdb6fb029ffe898cc52f4d145348d97b58dda3ee5b8e83bb7044da6b022d13c7114f04f7ff75be6f61c9e0627501853097a99306eaac497244ab91394ef97d4915d913cd8b79f693c78bcaecd0cabf43dcbf6e549fcbc14a968da550b70533f12618ed7ffd87830d47ee4b8fe4f4ec9fbd621dce61e8f549e88518c6f1707b6a9014756bb2d03491c5615e32d5f30", 0xa2}, {&(0x7f0000000440)="a1620c7fa6dbc27afb26334e7d1a", 0xe}, {&(0x7f0000000480)="a9caf5f071521fd5cbd2243273110bb1238fd28df2e59e85f1c4cf9b2e4bb8bae96b67ab120ab07c9f6f26dbd75d5056cf49629436b09ff6bc7336ec17dabce19f3c718ad6d8562bbdc451991adac348d33c22dbd4e15e18a514a3d14435d8d9b0c62667039ac2e6eaa586299c44726fd5", 0x71}, {&(0x7f0000000500)="7f246ccde26e59b8e5d9bab900295d043d83cb34de11c8010da29f2f51e76a9ad1dbcbf06acc033fe4b1e2de25cd93060a9133abd5320490c913ec43dca40c1c5ec91f7849f75dadeb8047469bb18c6e532cea0d6b220b2adfde0c8b4a4cccaa82b86c9fdbaaa1b20e04f0187fc5663c5c6555020d226b28b9f672742bf52292b54d73ffcc130c7dacdc49330c4fbb8e36", 0x91}, {&(0x7f00000005c0)="d245d14cbdda7104028b3c8bebe93f511c7cdf589c3cc13f9a2655dffd6d6beb8f7f4fee2cc4019ee9765a60a732e39002224aa3516890d9a733361481bb0e87a7f2da6ff7137e61b9ec4c25d75ac7457b953218d0084ddc567ab19571c39eac9e1e222f2e48d2a7a30c04e177", 0x6d}], 0x9, &(0x7f0000000d00)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0x100, 0x4000}, {&(0x7f0000000e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002100)=[{&(0x7f0000000e80)="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", 0x1000}, {&(0x7f0000001e80)="dcfec32573806a7df31ef0812e1916f97efbd86a4c4c9dc219e42c88137c0f945ef2b4e72dd712ee07cb23f4d0", 0x2d}, {&(0x7f0000001ec0)="beb895827cd677ac4404145c60706994da7d6e73717d2d5e6ed87dd5df926d1c1a7e1dfddc236ac53633d86dc390b93b38faa5e356ee09fbe8c10e1942fd18673f94", 0x42}, {&(0x7f0000001f40)="ff6a0f7fb836749b17fa02de14f74dce9b9dd854cd4211f2867c25c0728447ad70e85039e0a547c5dbc850e77a355849ee509a4ae0a73ae714de87f8e64bc50340fd643e957a65c2fe2ccd42bde05534419e763b568032dcacd41eb57873d198f534b2309814b20f15a8e443e6e79d43e11dce7b756d5965535e9130331255b3fd1de81425e50c980a480f3d65f30e5185b79e0c4d7c2f26e15acd6ed0", 0x9d}, {&(0x7f0000002000)="5c128b505d52cc", 0x7}, {&(0x7f0000002040)="112e5320e677ea848e52e506bd8b74199c41860299395c4e127ec435a086638d050cadc9d87b7e9ec14b1cad1359a20ca5b7ceded5a2065eaa214c612f9cf12bb7d6b50e2d308d24f877b9f19e4917feb5452989fd090102a1d0d43cb79828278aed349769a7620624ea59fcd2a2bb919e5fdec5f05d3f9f82e263e1f54d3b9f326937482d0bfdd2f6ae17003072d68aa86802be8c975159f07c10cc7e8c81ad76c2a837", 0xa4}], 0x6, &(0x7f0000002300)=[@cred={0x20, 0x1, 0x2, r17, r18, r19}, @cred={0x20, 0x1, 0x2, r20, r21, r22}], 0x40, 0x40}], 0x2, 0x80) ioctl$EVIOCGREP(r0, 0x40084508, &(0x7f00007fb000)=""/220) 2018/04/30 14:08:45 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:45 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sockfs\x00', 0x1000, 0x0) open(&(0x7f0000000000)="e91f7189591e9233614b00", 0x10000, 0x80) chdir(&(0x7f0000cd2ff8)='./file0\x00') umount2(&(0x7f00000002c0)='../file0\x00', 0x2) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000180)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) dup2(r0, r1) 2018/04/30 14:08:45 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) unshare(0x40600) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)=@vsock={0x0, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000100)=""/96, 0x60}, {&(0x7f0000000180)=""/7, 0x7}, {&(0x7f00000001c0)=""/82, 0x52}], 0x4, &(0x7f0000000280)=""/170, 0xaa, 0x4}, 0x6}, {{&(0x7f0000000340)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001400)=[{&(0x7f00000003c0)=""/16, 0x10}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x2, &(0x7f0000001440)=""/72, 0x48, 0x7}, 0x9}], 0x2, 0x40000042, &(0x7f0000001540)={0x0, 0x1c9c380}) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000001580)) 2018/04/30 14:08:45 executing program 6: r0 = perf_event_open(&(0x7f00003a8000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400001, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)="76652c41957f1aeec12a60c3245c68c7634835871a8fa07c20002050d01ff0445e2071e3aedb9daca078dba83cdb774575d2e0c43d5c7c2a1480a4a5ad16ca5326da7a163f8c2326804a965c9f062475e63c4b1c7b714117627b405bfe13e02584199a6f67b0ad3c8bd13a5fc39304ab3e360000000000") 2018/04/30 14:08:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000740)='\x00', 0x1, r2) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) move_pages(r4, 0x3, &(0x7f0000000300)=[&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil], 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000000100, 0x1) move_pages(r4, 0x1, &(0x7f0000000340)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) accept4$bt_l2cap(r5, &(0x7f00000001c0), &(0x7f0000000280)=0xe, 0x800) r6 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280), 0x0, r1) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x4, &(0x7f0000c61fc8)={&(0x7f0000000140)={'sha256\x00'}}) 2018/04/30 14:08:46 executing program 1: r0 = socket(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfa9, 0x440500) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000000c0)=""/151) connect$inet(r0, &(0x7f0000390000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) r2 = open(&(0x7f0000000080)='./file0\x00', 0x141046, 0x0) ftruncate(r2, 0x10000) sendfile(r0, r2, 0x0, 0x72439a6b) clone(0x0, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000804000)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000040)=0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000002c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000340)={r4, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f0000000400)=0x84) get_robust_list(r3, &(0x7f0000000240)=&(0x7f0000000200)={&(0x7f00000001c0)={&(0x7f0000000180)}}, &(0x7f0000000280)=0x18) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f00006fcff0)) 2018/04/30 14:08:46 executing program 2: shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:46 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sockfs\x00', 0x1000, 0x0) open(&(0x7f0000000000)="e91f7189591e9233614b00", 0x10000, 0x80) chdir(&(0x7f0000cd2ff8)='./file0\x00') umount2(&(0x7f00000002c0)='../file0\x00', 0x2) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000180)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) dup2(r0, r1) 2018/04/30 14:08:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x5}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r1, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xc40b, 0x2}, 0x90) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000040)=0x3, 0x4) setrlimit(0x7, &(0x7f0000000000)) accept4(r0, 0x0, &(0x7f0000000000), 0x0) 2018/04/30 14:08:46 executing program 3: r0 = epoll_create1(0x80000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00008d2000)='/dev/sequencer2\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000019ff4)) ioctl$VT_SETMODE(r1, 0x5111, &(0x7f0000697000)) epoll_pwait(r0, &(0x7f0000461fc4)=[{}], 0x1, 0x0, &(0x7f0000ce5ff8), 0x8) 2018/04/30 14:08:46 executing program 2: shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:46 executing program 5: unshare(0x1000000060000000) r0 = syz_open_pts(0xffffffffffffffff, 0x111080) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x100000000000000) ioctl$VT_DISALLOCATE(r0, 0x5608) 2018/04/30 14:08:46 executing program 4: r0 = inotify_init1(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x400) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f00000000c0)={0x8, 0xfffffffffffffffd, 0x6}, 0x10) get_robust_list(r1, &(0x7f0000000100)=&(0x7f00000001c0), &(0x7f0000000180)=0xc) fcntl$setown(r2, 0x8, r1) 2018/04/30 14:08:46 executing program 6: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000040)={@mcast2, 0x0}, &(0x7f0000000080)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', r1}) unshare(0x28060400) connect$inet6(0xffffffffffffffff, &(0x7f000004bfe4)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/30 14:08:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000adc000)="6e756d615f6d61707300b5c62eeedbc2799e2c854cfb9ead220e698a9e8de9f243640adf803c64577aa9e4e33f9f72e5185191246f8fe224cc925050e2a9e57dbf6b530a5ebbec861baf4dc4f84bb1df13f0b152aa3b6e781c81b6a8d091f88658ef4f16a21417d83d") r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x300, 0x70bd29, 0x25dfdbfc, {0x8}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044000}, 0x40000) pread64(r1, &(0x7f0000df6000), 0x0, 0x800000000000) 2018/04/30 14:08:46 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000c7df60)={0x7ff, @in6={{0xa}}, 0x0, 0x240000000000, 0x2}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r1, 0xf8}, 0xc) 2018/04/30 14:08:46 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000a80)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000200)="5601", 0x2, r1) syz_open_procfs(0x0, &(0x7f00000005c0)='net/unix\x00') r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x1b8, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/30 14:08:46 executing program 2: shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:46 executing program 7: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) unshare(0x8000400) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x7, 0x1, 0xe0c5, 0x7, 0x3, 0x3f, 0x7, 0x5f, 0x38, 0x2e4, 0xbdc, 0x10000, 0x20, 0x2, 0x800, 0x3, 0x1}, [{0x6474e555, 0x8b09, 0x8, 0x7, 0x5, 0x7, 0x31f, 0x1c7}, {0x7, 0x4, 0xffffffffffff861b, 0x0, 0x3f, 0x3, 0x4c, 0x4}], "8d4f4dca164ba8896aa7aec34785b7fb7638a41f1c24f16e6403fcd3750034b932788429ecc2378565a3a96fc345c8431d8b56bf87644b40af2bd1403a1bdb59cde9e14643b11174adb10b7416484d75dc8ead0572948bd435", [[], [], [], []]}, 0x4d1) ioctl$int_in(r0, 0xaf02, &(0x7f00001e3000)) 2018/04/30 14:08:46 executing program 6: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={0x0, 0xff}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080)={r1, 0xa2, "f744b1889586db62347f79239b08957dcf27f144d1e48b9e994eae1db34a1c6d901091c596cbaa61acbb84d3c4270eb350670a49c433a17d8a5a166f52dce019ed78eee80d6adf2b8e878a67c658dd2c688f8b4270c5a417d8d76ee28f691c0ffdc69091a9aeb91d4bbae0261a33961e472162e4f46d556c71f1e2bb134d0e829ec2270f248212ce50fa2d2299d6f1e6867a337f984d61792b55b97c36ddbed85449"}, &(0x7f0000000140)=0xaa) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x3, 0x40037a, 0x0, 0xffffffffffffffff, 0x100000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="01000000010000000000000000000000000000000000000000000000000000009500000000000000"], &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x220, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/30 14:08:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000967000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') sendto(r1, &(0x7f0000000200)="224b49fd1e318c215feac34bbc176bfc0006f72f9a0f4a6f3f21009562f8c0e3e81bb3ffbfc896d61f3f2d0b9d7bcffc88dbe6b7acdc870f6aee9cc998d0021036486bc45228c0dd1e38e4ce49ba4d1e9e6a60eb9b33035f9ca47b27777f6352569799c71dfabe6b258a9219", 0x6c, 0x80000000, &(0x7f0000000640)=ANY=[@ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="9ed5e32dd2af2e3a25f3686088fcd898c661a8482c9a42d35298764720068bd57ff94082fe2646a2aa83b8464fe6314937326c060fe76d7f6b1b6a517f923a0225a7e7eb4583161a0a6a7df8f9276fd5b4b4c2fb56d88ef2608555b9ad15e7a6112d06048c117dc10f93224a4ef8b52f9e97434538d7952a53700cdc42b0a1959efbaf41fc6e71e18826e188639087c03b1b19e561c0f0f742eb76b62b422fa47c59831bb3aae89b941221fa8b666889f0465169c62c8154052cbaffaa2d9bf700edfa730d38338834923941c3ac798daa13722d7464589ba509a09b", @ANYRES16=r0, @ANYRES32=r1, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=r0, @ANYBLOB="d4bd21ae44164ad15f1a1f6a2cd7d74352af2e998de4533dd0b218f7fac90e83c7f84e56f7cac295e304a7eaf207726b4bf5b71b486ac082958e32a86f31", @ANYPTR64, @ANYRES32=r0, @ANYPTR, @ANYBLOB="9837456f0fe08b69f4116e66070d6068fa00c3319fd00b1126880c24fb271ec5cf92cb1aab85b7d8d08b9e27b3238cf3cd1fd69fd83d6db9f70510e7d55b1348a3245d79afc52325675f83963a0f17cfd88115cf8dbc9487a89195ee06e092f37b4c85e5d09c63156e96264ad96bb7e3e2c34861e863fa5d590149fd32c339eaa0635d527a9e88ca13fec5c7c08681f6c76d501e1c437a387159b09927c1e93ca9a23930fa50c9cb89649f4fc46a7369b676e5a5941ca868a1617034e426130659529217f371d71cbd53c03ec250c36c7602c69ff43e111b542320fe241af2b21026559e6ca6fd647664"]], @ANYRES16=r0, @ANYPTR64=&(0x7f0000000540)=ANY=[@ANYBLOB="9d279f359c216b72607b1e60cc06f018556f17453c5ed49233c5d18743617801b11518fa3b8606a0eaf9270ad44a53c357766e3d6d325a8bccde7a389a16a0212a4f1ed929d9cb74de12a3ecb9e2a8eab1f02c80bc8910d544f9fdec6c0f4b78de15746b3c4c3d1dd4659293909d50b6d1f68a4a1ea477d638b4241a10230c70f1b046c8df78666725df", @ANYRES32=r0], @ANYBLOB="8533ceb7ebb3997b77b875c7e76eb9f868757db57692dc4c87723fe7119d0326558d649e74ca491b6a657ac99b65d96863d751f8be2bbe1f3d21", @ANYBLOB="a48cd35d348a289e5d6cbae8a4567e3ebf0a9d14daf390118f956856caee9ffd9bb407aad1cc99aaba2238042172da447dd450e6838fcdbc6a9510a06fb80b73e310a484e969d790051e94c5f2a674a90c8969"], 0x5) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/30 14:08:46 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x2a8, 0x140, 0xffffffff, 0xffffffff, 0x140, 0xffffffff, 0x250, 0xffffffff, 0xffffffff, 0x250, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x3) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000400)=@add_del={0x2, &(0x7f00000003c0)='ip6_vti0\x00', 0x40}) 2018/04/30 14:08:46 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) unshare(0x40600) connect$unix(r0, &(0x7f0000000000)=@abs, 0x345) 2018/04/30 14:08:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x3) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000006, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xa, 0xfffffffffffffff8, 0x580d, 0x5, 0x2, 0xffffffffffffffff, 0x5}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x1, 0x0, 0x0, 0x0, 0x1}, 0x2c) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x400) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f00000002c0)=0x3) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000100)="531a8b2b3c8f37b8b03a6f660d29953a92f52de43557f9b5d78e9f6cb4b7975186128dbe46813fc1998b784a20bca37857c27a18d72956a0b0ad6edc4c7811d229f16dba965a03a36a5d65094fdce89a10b5937462d6d8cdd230498fd6fddae4a7231a346df180e5bf293bb4c303a5897a0ff13ff19f6af7005e432381e1afa14803adcd178f7ce33e5bbc09ae130060febd74b4c4be3927a0bcb200ada5606e78bcd525504cf0b124b022a896143e3eafff1cbe16960a80d48d0f9f6fb7ba", &(0x7f00000001c0)="0e8ffc824ca15fdb6695303ad3bd1a6a4c6f94b587300c305e64c62709b37c91583bd9d93c61d8a7a24ffa41bb6ac8fe59e33a812121d5c0fca902d9ed8b73a16723996570a80a10c698b968cdef0a1637942dd4e5ea24b63dc6d4d92cb41b1807d5df5b57c9a4bd20bd8397f44ef77a3c4c5cd2e384f2ace665a17ab79bcf1285452825eec7276eacf8774dccad671e382efe11b769508d0ae543a7f9d670354d5264b3f20965bd34f5bb869d44503cec614463d332f7eac0d30acf2fce82983c34a2784e2f8813dca7686188d6b6bd1f4f7f8bbb0405d8509fd92df3cd286bcac61589b06c9f57822fd55a7e67f19c55540fed", 0x3}, 0x20) 2018/04/30 14:08:46 executing program 2: perf_event_open(&(0x7f0000012000)={0x0, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:46 executing program 0: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x3, 0x1, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000180)={'syzkaller1\x00', {0x2, 0x4e20, @loopback=0x7f000001}}) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000280)=0x9428, &(0x7f00000002c0)=0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getdents(r0, &(0x7f0000000340)=""/173, 0xad) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000440)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x230, 0x118, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000400), {[{{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x1f, 0x47c9}}}, {{@arp={@empty, @dev={0xac, 0x14, 0x14, 0x12}, 0xffffffff, 0xffffffff, @empty, {[0x0, 0xff, 0x0, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff]}, 0x7, 0x7d, 0x3f, 0x20, 0x100000000, 0x1, 'ip6gre0\x00', 'bpq0\x00', {}, {0xff}, 0x0, 0x1}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@arp={@loopback=0x7f000001, @remote={0xac, 0x14, 0x14, 0xbb}, 0xffffff00, 0x0, @mac, {[0xff, 0xff, 0xff, 0xff, 0x0, 0xff]}, @mac=@random="62ebfce2f04f", {[0xff, 0x0, 0x0, 0xff, 0xff, 0xff]}, 0x5, 0x1, 0x4, 0x2, 0x4, 0x3, '\x00', 'ip6_vti0\x00', {0xff}, {}, 0x0, 0x18}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @dev={0xac, 0x14, 0x14, 0x1c}, @empty, 0x1, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) setsockopt$inet_buf(r1, 0x0, 0x2000000000004, &(0x7f0000000000)="83170400000200000060f0055f0d10a238b088d169", 0x15) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x67, &(0x7f0000000080)=0x80000000, 0x4) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000300)=""/49) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000900)=0x9, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r3, 0x1}, 0xc) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/30 14:08:47 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000140)=0xba, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000280)=0x1f, 0x4) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) quotactl(0x2, &(0x7f0000000380)='./file0\x00', r2, &(0x7f0000000300)="dc6465006e499bf0640473f06773124a726429a6c1af371530752161e205aad6413d6809cb6586a23db1c6d5f6bcdedf67b2fb5052f328cf6962312f631418a9850d5c4f4929dcb93141094e17321b70de56b323cdf60e662e0805909aafa28a79319ef7042dc0eb4a8f79f01d0ac57ee5c6") recvmmsg(r1, &(0x7f0000007840)=[{{&(0x7f0000006f40)=@ax25, 0x80, &(0x7f00000076c0), 0x0, &(0x7f0000007740)=""/207, 0xcf}}], 0x1, 0x0, &(0x7f0000007940)) r3 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x6, 0x200) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xd08) write$binfmt_elf32(r0, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0xdc30, 0x1, 0xffffffff80000000, 0x4, 0x2, 0x3, 0x3e, 0xff, 0x2c2, 0x38, 0x318, 0x1, 0x7, 0x20, 0x1, 0x8, 0x3, 0x7}, [{0x70000000, 0xfffffffffffffffa, 0x3, 0x29e, 0x1139, 0xc4e, 0x1, 0x6}], "0b9d36379c3a5defed5db3cd0ed0d1c8e81be0448efdfcaf4b4417140b01ca82d552601385a8e5ad9c203c687b6ae7083a1e182e653880d1ebdafcecd2773e55527a20c2f31681baa33deeaa4a390ac28822e60c0dae2845f7936a5c8d449e2254f3ba05708ca43784ab5325e49e5fc9c107793da16ac9f4d899f76408e943cfba3a4053343e926743e19498b0bcdce5cf5b509c343934b90dd6e375943f08fc2896aed0b0c93ff1fed11f2a4ed6b2517564333ae435ca3d0bf5d945de5cf07fe86c64bd2b9c849aae0865273ff5b4f028", [[], [], [], [], [], [], []]}, 0x829) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x10000) 2018/04/30 14:08:47 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x1, 0x418000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000001000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r2, &(0x7f00000002c0)=[{&(0x7f0000000540)=""/140}, {&(0x7f0000000140)=""/89}], 0x2) 2018/04/30 14:08:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="f1adaa550487fd0145422799f3ee36fc9a8a4a36e87f18a8eaa57d1b0754a6c2e9a3d4944f49d8") getdents(r0, &(0x7f00000000c0)=""/48, 0x30) r1 = semget$private(0x0, 0x4, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getgroups(0x9, &(0x7f0000000380)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f00000003c0)={{0x1, r2, r3, r4, r5, 0x20, 0x2}, 0x6, 0x7, 0x8d8}) 2018/04/30 14:08:47 executing program 6: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) read(r0, &(0x7f0000000440)=""/4096, 0x1000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001480)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f00000000c0)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) 2018/04/30 14:08:47 executing program 2: perf_event_open(&(0x7f0000012000)={0x0, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:47 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="a2", 0x1}], 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) close(r0) syz_mount_image$vfat(&(0x7f0000001800)='vfat\x00', &(0x7f0000001840)='./file0\x00', 0x0, 0xaaaaaaaaaaaae91, &(0x7f0000000440)=[{&(0x7f0000000380), 0xffffffffffffffb6}], 0x0, &(0x7f00000000c0)=ANY=[]) pwrite64(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) fchown(r0, 0x0, 0x0) 2018/04/30 14:08:47 executing program 0: syz_emit_ethernet(0x1c, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="9c3503ea0509", [{[{0x9100, 0x2, 0x5, 0x4}], {0x8100, 0x7, 0x4000000}}], {@generic={0x8863, "b53e6b085888"}}}, 0x0) 2018/04/30 14:08:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000292f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10000a}) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f00000000c0)={0x10000008}) r2 = dup2(r1, r0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000080)) fcntl$setstatus(r0, 0x4, 0x46800) ioctl$TIOCCBRK(r2, 0x5428) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000e12000)='/dev/sequencer2\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/30 14:08:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0x2, 0x1}, 0x20) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xb7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={r1, 0x2, 0x0, 0x3, 0x2}, &(0x7f0000000100)=0x18) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x2000, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) 2018/04/30 14:08:47 executing program 2: perf_event_open(&(0x7f0000012000)={0x0, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:47 executing program 5: perf_event_open(&(0x7f0000012000)={0x0, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:47 executing program 0: r0 = open(&(0x7f0000000100)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getrandom(&(0x7f0000000200)=""/112, 0x70, 0x8e3b09eeb349952f) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000040), &(0x7f00000000c0)=0xc) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000001600)='./bus\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000015c0)=ANY=[]) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x3fc) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) getrusage(0xffffffffffffffff, &(0x7f0000000140)) 2018/04/30 14:08:47 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000adcff8)=[{0x6, 0x0, 0x0, 0x9f}]}, 0x10) sendto$inet(r0, &(0x7f0000e9bf14), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={0x0, 0xfffffffffffffffa, 0x30, 0x400, 0x3c}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={r1, 0xd2, "8595447b8dac2d45fc05a94ae7acc118941e6305240047e94afee6ee653e3a18550f7d9bad3f7c48aa491df2640f98a8ec7230904bd3493a6a812d460fbd8d2d3a2426c88ba87f5fa09153dd64f4d86ec60be4b9b16812c819bc96af98275ae4ee98971c788f2e9b4511c5cbef726ba5a06d657a9172bb6ef45246c280fa007c2d429d15f5e12dae2eff4a50b757c1747e2507b189e48b5188378607ce97106d0cef93a0593645a91f4d139ce52c8bbe21ec12d8b0ae8bda359d6d33a465fece6b9d4edf92b354175a3ef4731f7e10b2bed1"}, &(0x7f0000000200)=0xda) sendto$inet(r0, &(0x7f0000618ec1)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0d61c0d32e11b38e9dd18c58f6bd779650fc30d93653bdaecf323c9f62ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e3168", 0x80, 0x51, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 2018/04/30 14:08:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_names\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) connect$llc(r0, &(0x7f0000000140)={0x1a, 0x30e, 0x0, 0x1, 0x8, 0x10000, @random="8651c74a09da"}, 0x10) r1 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000)=0x40, 0x4) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000180), &(0x7f00000000c0)=0x68) 2018/04/30 14:08:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000a8503d83488e700aa1f59072e0895ee30e1233184875810b33a087ccf1fdcf55c123cbac81251029c04b9f70f656e43c02e519dc1144ce87d3ef2213b2c85a77167856ba811117bc39551d4b3aee253becbc19828c9fb489564174ec9b3e6d7520c1fb99842c722d3b84f661b2403272e319decaf426ec5f7e571d0c0411e49625b0bb82e344e1d4e25d0ffdd7f77166d75ccf6d016bc90d2791da432c8491df276faf3855e5b78bda050031daa0f5729cc024fb"], 0x8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) 2018/04/30 14:08:47 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000292f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10000a}) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f00000000c0)={0x10000008}) r2 = dup2(r1, r0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000080)) fcntl$setstatus(r0, 0x4, 0x46800) ioctl$TIOCCBRK(r2, 0x5428) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000e12000)='/dev/sequencer2\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/30 14:08:47 executing program 0: r0 = socket$inet6(0xa, 0x2100000000000006, 0x200007) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0xcda, @mcast2={0xff, 0x2, [], 0x1}, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x7}, 0x1c) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='bridge_slave_0\x00') sendmmsg(r0, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000480)}}, {{&(0x7f0000000400)=@in6={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f0000000900)}}], 0x2, 0x814) r1 = userfaultfd(0x80000) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x2}) 2018/04/30 14:08:47 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x1024, 0x1) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000100)="f55133ac583c178fa93295ef91aafd8c1c8067fb6f7d8fd55ae7ea4a157490d8ec229b2de8a854b1a8b193808083aff1af98fcb82a95dd7b42b4291ac16ef15db41995d82e8d3b53e135219479512ea95d4b93ab48739efb03a499e7fb6481fc58966db09d0e8ce209e9cf629aadda8622b77e4352e6da79193114534b33a8cff0f361d271faff63297041bb4c6cad38946325bea0411db0361146d0b038796f9253723ed8fd993d97c5cf000000", 0xae, 0x20000802, &(0x7f0000000200)={0x2, 0x4e23}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0xff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000740)='syz_tun\x00', 0x47b) close(r0) 2018/04/30 14:08:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_names\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) connect$llc(r0, &(0x7f0000000140)={0x1a, 0x30e, 0x0, 0x1, 0x8, 0x10000, @random="8651c74a09da"}, 0x10) r1 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000)=0x40, 0x4) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000180), &(0x7f00000000c0)=0x68) 2018/04/30 14:08:48 executing program 6: r0 = syz_open_dev$dspn(&(0x7f0000006ff6)='/dev/dsp#\x00', 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000003ff8)) 2018/04/30 14:08:48 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0xb2, 0x7, 0xffffffff00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000100), &(0x7f0000001100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000040), &(0x7f0000000100), 0x2}, 0x20) 2018/04/30 14:08:48 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x80004000000dc, &(0x7f00000000c0), &(0x7f0000000080)=0xfffffffffffffd06) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0xaf, @multicast2=0xe0000002, 0x4e21, 0x4, 'lblc\x00', 0x20, 0xa43, 0x35}, 0x2c) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x33, @rand_addr=0x3, 0x4e23, 0x2, 'fo\x00', 0x2, 0xb5b4, 0x23}, 0x2c) 2018/04/30 14:08:48 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000000)=[{}, {0x0, 0x8091}], 0x2, &(0x7f0000034000)={0x77359400}) getuid() semctl$GETNCNT(r0, 0x0, 0xe, &(0x7f0000000040)=""/139) 2018/04/30 14:08:48 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:48 executing program 0: r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000000)={0x6, 0x20a, 0x4, 0xffffffff, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r1, 0x4c53d90b, 0x4, 0x80000001, 0x0, 0x100000000}, 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) unshare(0x40600) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='+!md5sumselinux{#user*eth1vboxnet0\x00', 0xfffffffffffffffd) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x84000, 0x0) shutdown(r3, 0x0) recvmmsg(r2, &(0x7f0000000040), 0x948, 0x0, 0x0) 2018/04/30 14:08:48 executing program 4: ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f0000000000)={0x2, 0x6}) r0 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000100)=0x10, 0x800) r1 = dup3(0xffffffffffffffff, r0, 0x80000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0x8b, "7794ed86136d4661ef47182856d7dcc51d8be5f3a2361d94f7594a67f041bad3fc26d089af6e6f3bf0d61ba638d4e058ad844dfba749560de669aa5b79e5a994f2721bac6e78fc5c87b66d453c663041b06d137b1c5c9db647bcadca763bfbc89516b8e8ecc8c056396514b728f52dd09a431159df6752a7e14217733452f030d94c6bc6b6ff1f0920e7a2"}, &(0x7f0000000200)=0x93) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={r2, 0x7, 0x7fffffff}, 0x8) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8921, &(0x7f00000000c0)="1f003e88afb198decf00") setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000340)=0xffff, 0x4) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000380)=""/42) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0xfff, 0x0, 0x1, 0x3}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000002c0)={0x100000001, r3, 0x10000, 0x4}) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) 2018/04/30 14:08:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x44}, {0x6}]}) r0 = syz_open_dev$vcsa(&(0x7f0000002ac0)='/dev/vcsa#\x00', 0x80, 0x0) recvmmsg(r0, &(0x7f0000002940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/25, 0x19}, {&(0x7f0000000140)=""/112, 0x70}], 0x2, &(0x7f0000000200)=""/224, 0xe0, 0x6}, 0x100}, {{&(0x7f0000000300)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x1f7, &(0x7f0000001800)=[{&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/75, 0x4b}, {&(0x7f0000000440)=""/145, 0x91}, {&(0x7f0000000500)=""/38, 0x26}, {&(0x7f0000000540)=""/112, 0x70}, {&(0x7f00000005c0)=""/125, 0x7d}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/105, 0x69}, {&(0x7f00000016c0)=""/47, 0x2f}, {&(0x7f0000001700)=""/222, 0xde}], 0xa, &(0x7f00000018c0)=""/5, 0x5, 0xffffffffffffffff}, 0x7}, {{&(0x7f0000001900)=@in={0x0, 0x0, @remote}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001980)=""/55, 0x37}, {&(0x7f00000019c0)=""/201, 0xc9}, {&(0x7f0000001ac0)=""/9, 0x9}, {&(0x7f0000001b00)=""/93, 0x5d}, {&(0x7f0000001b80)=""/67, 0x43}, {&(0x7f0000001c00)=""/70, 0x46}, {&(0x7f0000001c80)=""/91, 0x5b}, {&(0x7f0000001d00)=""/186, 0xba}, {&(0x7f0000001dc0)=""/124, 0x7c}], 0x9, &(0x7f0000001f00)=""/166, 0xa6, 0x5}, 0x1}, {{&(0x7f0000001fc0)=@ll, 0x80, &(0x7f0000002a80)=[{&(0x7f0000002040)=""/225, 0xe1}], 0x1, &(0x7f0000002180)=""/35, 0x23}, 0x4}, {{&(0x7f00000021c0)=@nfc_llcp, 0x80, &(0x7f0000002800)=[{&(0x7f0000002240)=""/102, 0x66}, {&(0x7f00000022c0)=""/46, 0x2e}, {&(0x7f0000002300)=""/72, 0x48}, {&(0x7f0000002380)=""/48, 0x30}, {&(0x7f00000023c0)=""/183, 0xb7}, {&(0x7f0000002480)=""/135, 0x87}, {&(0x7f0000002540)=""/150, 0x96}, {&(0x7f0000002600)=""/242, 0xf2}, {&(0x7f0000002700)=""/161, 0xa1}, {&(0x7f00000027c0)}], 0xa, &(0x7f00000028c0)=""/118, 0x76, 0x80000000}, 0x8000}], 0x5, 0x40000000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000002140)=[@in={0x2, 0x4e24, @rand_addr=0x100000001}], 0x10) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0xfff) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000027c0)=0xffffffff, 0x2) 2018/04/30 14:08:48 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000040)=@l2={0x1f}, 0x80, &(0x7f0000001700)=[{&(0x7f0000001680)='&', 0x1}], 0x1, &(0x7f0000001780)}, 0x8001) sendmsg$rds(r1, &(0x7f00000009c0)={&(0x7f00000000c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/128, 0x80}, {&(0x7f0000000180)=""/132, 0x84}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000340)=""/92, 0x5c}, {&(0x7f00000003c0)=""/32, 0x20}, {&(0x7f0000000400)=""/14, 0xe}, {&(0x7f0000000440)=""/157, 0x9d}, {&(0x7f0000000500)=""/39, 0x27}, {&(0x7f0000000540)=""/77, 0x4d}], 0x9, &(0x7f00000008c0)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000680)=""/204, 0xcc}, &(0x7f0000000780), 0x40}}, @mask_cswp={0x58, 0x114, 0x9, {{0x5, 0xfff}, &(0x7f00000007c0)=0x401, &(0x7f0000000800)=0x9, 0xfffffffffffffffd, 0x1f00000000000000, 0x1c000, 0x5, 0x4, 0x8}}, @mask_fadd={0x58, 0x114, 0x8, {{0x7, 0x3}, &(0x7f0000000840)=0x9, &(0x7f0000000880)=0x2, 0xa2, 0x8001, 0x7, 0x6, 0x15, 0xb7f}}], 0xe0, 0x80}, 0x20004085) [ 99.541384] audit: type=1326 audit(1525097328.540:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7046 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455979 code=0x0 [ 99.597458] IPVS: set_ctl: invalid protocol: 175 224.0.0.2:20001 lblc [ 99.638984] IPVS: set_ctl: invalid protocol: 51 0.0.0.3:20003 fo [ 99.681540] IPVS: set_ctl: invalid protocol: 175 224.0.0.2:20001 lblc [ 100.315244] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 100.315244] The task syz-executor3 (7065) triggered the difference, watch for misbehavior. [ 100.431777] audit: type=1326 audit(1525097329.430:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7046 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455979 code=0x0 2018/04/30 14:08:49 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0xb2, 0x7, 0xffffffff00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000100), &(0x7f0000001100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000040), &(0x7f0000000100), 0x2}, 0x20) 2018/04/30 14:08:49 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:49 executing program 4: r0 = getpid() sched_setaffinity(r0, 0xffffffffffffffd6, &(0x7f0000000340)=0xfffffffffffffffe) r1 = syz_open_dev$sndseq(&(0x7f0000783000)='/dev/snd/seq\x00', 0x0, 0x0) clock_nanosleep(0x6, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x80, 0xc0) sendto$unix(r3, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) close(r2) 2018/04/30 14:08:49 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xa, 0x10000) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000280)={0x1, 0x8, 0x7, 0x3, 0x2, 0x3ff, 0x8001, 0x0, 0x1a975a6c, 0x1, 0x7fffffff, 0x3}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="b400000000000000250a0000000000009500000000000000c0799a3caa5c2f7fac190f0dc674f689fc8dec69dcf02b5a2617d7b4ea019dfa2cecb7892820912d010115aced53ea0826bcbea562519852c572ed43831fd4d9701ea728d402cac71060f19e91e11a807ebca7d00590eaa7d902d791bc95785ed1ffc8b8bdc845a64b1909fe48481676648feceba6a05d4791b64d92bcbf"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/30 14:08:49 executing program 1: r0 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"64596df17c0e4200", 0x4000000000000401}) ioctl$TUNDETACHFILTER(r0, 0x400454d8, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x3, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) 2018/04/30 14:08:49 executing program 3: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) sendmmsg(r1, &(0x7f00000079c0)=[{{0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)}}, {{&(0x7f0000000c80)=@ipx={0x4, 0x0, 0x0, "3c440b75451e"}, 0x80, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)}}], 0x2, 0x0) close(0xffffffffffffffff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x101000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x2) 2018/04/30 14:08:49 executing program 5: r0 = socket(0x2, 0x3, 0x1) unshare(0x400) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000240), 0x4) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x2000) ioctl$TIOCSTI(r1, 0x5412, 0x7) ioctl$KIOCSOUND(r1, 0x4b2f, 0x400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x20002, 0x0) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000040)) 2018/04/30 14:08:49 executing program 0: setrlimit(0x8, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000180)="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") mlock2(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x410800, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000012c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000011c0)=0x1c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000001200)={r1, 0x400000000, 0xffffffffffff0000}, &(0x7f0000001240)=0x8) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000080)=""/208) 2018/04/30 14:08:49 executing program 0: rt_sigprocmask(0x0, &(0x7f000078b000)={0xfffffffffffffffa}, 0x0, 0x8) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x111000) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000140)=""/41, &(0x7f0000000200)=0x29) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x77359400}, {0x7, 0xe4c}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x77359400}, {0x77359400}}, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000080), &(0x7f0000000fc0), &(0x7f0000013fc0), &(0x7f0000000000)={0x0, 0x989680}, &(0x7f0000000ff0)={&(0x7f0000000040), 0x8}) 2018/04/30 14:08:49 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bridge0\x00', 0x1002}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0x3501}) fsetxattr(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f731400e24865499d2c4f453053c4aacabd2a3d5e1b73db25bb86184b2eb725183dab0f06dfab000000000000000000"], &(0x7f0000000100)='/dev/net/tun\x00', 0xd, 0x2) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bridge0\x00', {0x2, 0x0, @loopback=0x7f000001}}) r2 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x400000008003, 0x80000) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 2018/04/30 14:08:49 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:49 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) prctl$getname(0x10, &(0x7f0000000180)=""/109) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x7) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x3ff, 0x30}, &(0x7f0000000240)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) r4 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000480)={{{@in=@dev={0xac, 0x14, 0x14, 0xe}, @in6, 0x4e21, 0x800, 0x4e23, 0x0, 0xa, 0x0, 0x20, 0x2e, r3, r4}, {0x5, 0x2, 0x7, 0x7fffffff, 0x0, 0x5, 0xffffffffffffff80, 0x9371}, {0x3, 0x4, 0x2, 0x400}, 0x1, 0x6e6bb3, 0x0, 0x0, 0x1, 0x3}, {{@in=@rand_addr=0x7, 0x4d2, 0x33}, 0xa, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x3503, 0x2, 0x1, 0x101, 0x2, 0x5, 0x2}}, 0xe8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000002c0)={r2, 0x7}, &(0x7f0000000300)=0x8) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000ff0)=[{&(0x7f0000000280)="e6194c", 0x3}], 0x1, &(0x7f0000026000)}, 0x2000c080) write(r0, &(0x7f0000000040)="f23c", 0x2) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/protocols\x00') getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) 2018/04/30 14:08:49 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x220040, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x12002, 0xe0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9, 0x0, r1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x86, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000eed000), &(0x7f0000000000)="13"}, 0x20) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/129}, 0x18) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000240)={r4}) 2018/04/30 14:08:49 executing program 1: unshare(0x28060400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x100, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f00000000c0)={0x1, 0x7, 0x10000, 0x6, "032cabb26cb708af8f74a452fba0a206a5c599aa47441edd02ba7cd0d3eef2b6b142dc75e2d622a887ccb73d", 0x800}) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x7f}) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x2d5, 0x200000) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000140)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0x1c, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f00000001c0)={0x0, 0x4, [0x9d]}) bind$netlink(r2, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc) 2018/04/30 14:08:49 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x4e23, @multicast1=0xe0000001}, {0x0, @random="3366befb1df7"}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) pread64(r0, &(0x7f00000003c0)=""/8, 0xfdb4, 0x63) getpeername$ipx(r1, &(0x7f0000000000), &(0x7f0000000080)=0x10) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f00000001c0)={0xf0b9, @random="b90d86e24446"}) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x100, 0x0) [ 100.757941] device bridge0 entered promiscuous mode 2018/04/30 14:08:49 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x80000000, 0x400) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000140)={0xffffffffffffffaf}, 0x4) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x24200, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000100)=r2) poll(&(0x7f0000000040)=[{r0, 0x8000}, {r0, 0x200}, {r0, 0x7cf376890de9f975}, {r0, 0x20}, {r0, 0x2}], 0x5, 0x7) r3 = openat$cgroup_int(r0, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0xff) 2018/04/30 14:08:50 executing program 3: r0 = getpid() sched_getparam(r0, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x388, 0x2000) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x40800, 0x0) renameat2(r1, &(0x7f0000000040)='./file0/file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x4) sendto$ipx(r1, &(0x7f0000000280)="fa84141a4aac64cdd2972fe5bf7dabe10d46fdfa3c68a7a3b3733b22e98168b77a9ceef0e6a8891fd05a46803e6e7e1c6e65309a804fd6da3d54501d42c617090603d5b9ab051122ffe03d2372402f7711e4eabcadfa41980bf60cb5e80c4024b999a5fc34d1fb9a4d2c6996885dcfef77fc9d215c60599b5ae72f63f01fc23f2de654317174badeebbaf551db71d4f3ec7719cbde8ac1f5972c6ab0ab7f6e9754a2c9b72558d6aeceb286d16de22cf8c5e2ae963ede345bf582a025c3f1fe6b678b17ea3cd6c4c6c7f2d7765fe68030596e0952efaa1a8ec239b7f5b231f50b7bc6a4c4ec04", 0xe6, 0x20004000, &(0x7f0000000180)={0x4, 0x800, 0x8, "73b74ff8bbb1", 0x8ee}, 0x10) unshare(0x40600) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) fanotify_mark(r3, 0x2, 0x20000, 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00') 2018/04/30 14:08:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001480), 0x0, &(0x7f0000000180)=[@sndrcv={0x30, 0x84, 0x2}], 0x30}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$vnet(r1, &(0x7f00000001c0)={0x1, {&(0x7f0000000040)=""/119, 0x77, &(0x7f00000000c0), 0x2, 0x1}}, 0x68) 2018/04/30 14:08:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000580)={0x2, 0x2, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x70}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0xb, 0x7, 0x2, 0x6, 0x0, 0x70bd2d, 0x25dfdbfe, [@sadb_spirange={0x2, 0x10, 0x4d2, 0x4d5}, @sadb_ident={0x2, 0xb, 0xc8, 0x0, 0x200}]}, 0x30}, 0x1}, 0x40000) r1 = syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0xe2, 0x400) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100)=0x9, 0x4) 2018/04/30 14:08:50 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:50 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x801, 0x0) pwritev(r0, &(0x7f00000018c0)=[{&(0x7f0000000380)}, {&(0x7f0000001440)="5e8d414308c0d35ade067009cc705c3f5cb33360ee9dbb07137790c8bfdc95801f5cc123807a5af6bf4640fd5297fe3ba25e26da729155a63896f604857486d6b017bf069b083f52333b58944f686310f5ef0e06c5858687c6827e3c7a44b916ab6b832de04d57382b9d1c699e34da7bf42052c9e3bcbbae1f4353bfd5a322202c9f08964091306903be043b23544a6833bf81563b644081f5f55e0c3041f76b176ceba3e64e9d0e9c9df34ce10443e7800c318edfd58b102f111d798201cb7a521f73b2e7614b9e01b3b007899403076ceb9b2675acce94cdedd1083c", 0xdd}, {&(0x7f0000001640)="b02239f69d94ee883099212f980df28399a0c1d28300df95d10fbf8d12fc2ecae6c3acf7b06468204da11db298f95a3dc6388185f82086ea0bea42183248b9989440e0d2a9520c08ec0f61b1b3edda18b33714b2d3c483964c0f3a1464d368881c742ae3ac6f726dc491840be11dd478cd40363a125fe9f7e7c24f5bd865aa81f8d7621015af6712149bccc6be2955aae2dd8166a055c1fbe49406dd90ddf31edd56ff1fd31c5d532708afbfb65d703904dafe4097c02f5dc333686f06f6783823737b58e06e45c3", 0xc8}, {&(0x7f0000001780)="ee38ef7d4526d8eb109375668eb1e7f24ca709d1bd92aa2094e826d4a01fcd5852cb8a48bc66a3bdcbd860866a321f0f860b95aee06fba50e4ebb6d3df7c8dc53ef5502acf372fc5578bef9e5c52ed585ab65822180ee841618bc76dcbbe53f399e252ae50ddff0276bdea9469949c3d42bed2691064ceab961a1c08bc9b331334eab3b393b90a9dab0a9fbf693b47f1e1859fd23b28809218633ae0435081c195f1fc64b556fa73fde01787a9b97dc953156bd2b388a2191911e449c4241c91b9913d495690e7616ecfbde7da911d09d4e4b2", 0xd3}], 0x4, 0x4) syncfs(r0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40, 0x0) 2018/04/30 14:08:50 executing program 4: r0 = getpid() sched_setaffinity(r0, 0xffffffffffffffd6, &(0x7f0000000340)=0xfffffffffffffffe) r1 = syz_open_dev$sndseq(&(0x7f0000783000)='/dev/snd/seq\x00', 0x0, 0x0) clock_nanosleep(0x6, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x80, 0xc0) sendto$unix(r3, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) close(r2) 2018/04/30 14:08:50 executing program 7: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x55, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000340)='veth0_to_bond\x00', 0x10) sendto$inet6(r1, &(0x7f0000000000)="19", 0x1, 0xc0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x27ffe) sendfile(r0, r2, &(0x7f0000000200), 0x7ffe) 2018/04/30 14:08:50 executing program 5: socket$inet6(0xa, 0x80003, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_BROADCAST={0xc, 0x2, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}]}, 0x2c}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000280)=ANY=[@ANYBLOB="66696c746572000000000000a20b0000000080000000000004000000a804e200400100000000000040010000c0e3ffffbf030000c003000004000000000000000000000000000000850bfe3b05b0d9c49644b8cdff0100006f0000005eca241301e7dd2b7d1b2193fbdc769319170d535104472aab038110e9a3b22389"], 0x1) gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r2, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000000d000)) 2018/04/30 14:08:50 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:50 executing program 6: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xad, &(0x7f0000000000), &(0x7f0000000040)=0x4) mkdir(&(0x7f00001af000)='./file0\x00', 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffff9c}) setsockopt$inet_int(r1, 0x0, 0x14, &(0x7f0000000140)=0x8, 0x4) mount(&(0x7f00000d0ff8)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='hfs\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x3, 0xffffffffffffffff) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000180)={0x5, 0xd8, 0x80000000, 0x80000000, 0x1, 0x1000}) fcntl$dupfd(r2, 0x0, r2) getsockname$unix(r2, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) 2018/04/30 14:08:50 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x1f0, 0x8, 0x20, r1, 0x9}, 0x2c) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000007ff0)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x0, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) 2018/04/30 14:08:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') getdents(r0, &(0x7f0000000140)=""/98, 0x28) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000002000)=""/4096, 0x1000) fstat(r0, &(0x7f00000001c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000000)={0xa24, 0x6, 0xffffffff00000001, 0xe8b, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}]}) 2018/04/30 14:08:50 executing program 7: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0xfffffffffffffff9, 0x8000, 0xd9a, 0x6c587c11, 0x0}, &(0x7f00000000c0)=0x10) syz_extract_tcp_res(&(0x7f0000000200), 0x8, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={r1, 0x7648}, &(0x7f00000001c0)=0x8) r2 = eventfd2(0x20, 0x4) read$eventfd(r2, &(0x7f0000000140), 0x8) io_setup(0x800000020, &(0x7f0000000040)=0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000ddc000), 0x0, 0x0, 0x0, 0x1, r2}]) 2018/04/30 14:08:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000580)={0x2, 0x2, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x70}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0xb, 0x7, 0x2, 0x6, 0x0, 0x70bd2d, 0x25dfdbfe, [@sadb_spirange={0x2, 0x10, 0x4d2, 0x4d5}, @sadb_ident={0x2, 0xb, 0xc8, 0x0, 0x200}]}, 0x30}, 0x1}, 0x40000) r1 = syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0xe2, 0x400) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100)=0x9, 0x4) 2018/04/30 14:08:51 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:51 executing program 3: r0 = open(&(0x7f0000fedff8)='./file0\x00', 0x141042, 0x0) ioctl$sock_ipx_SIOCIPXNCPCONN(r0, 0x89e3, &(0x7f0000000000)=0x3f) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0xffff}) fstat(r0, &(0x7f0000000180)) io_setup(0x4f5, &(0x7f0000000040)) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x8) sigaltstack(&(0x7f0000001000/0x1000)=nil, &(0x7f0000000140)) sigaltstack(&(0x7f0000000000/0x3000)=nil, 0x0) bind$vsock_dgram(r0, &(0x7f0000000200)={0x28, 0x0, 0xffffffff, @any=0xffffffff}, 0x10) 2018/04/30 14:08:51 executing program 0: r0 = memfd_create(&(0x7f0000000040)='userloppp1ptoc\'\x00', 0x6) r1 = fcntl$getown(r0, 0x9) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @remote}, &(0x7f0000000100)=0xc) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r1) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000001640)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="d8", 0x1}]) 2018/04/30 14:08:51 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000000040)="eb", 0x1}], 0x1) ioctl$TCSETA(r0, 0x5402, &(0x7f0000a26fec)) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x100, 0x0, 0x0, 0xfe}) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000180)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00ff139a34a3acd4175cb469c63cd18021ffa0e19fbdd3aad43922ce5755aadfc10a48e221aace14856ace44dc5b"]) r1 = shmget(0x1, 0x4000, 0x100, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000100)=""/98) 2018/04/30 14:08:51 executing program 6: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x0, 0x80010, 0xffffffffffffffff, 0x0) unshare(0x400) r0 = socket$inet6(0xa, 0x3, 0xe2) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000040), 0x4) 2018/04/30 14:08:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000adafa0), 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000040)=@req={0x28, &(0x7f0000000000)={'ip6tnl0\x00', @ifru_flags=0x8000}}) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x10001, 0x20000) r2 = dup3(r0, r0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000000c0)=r2) sendto$inet6(r1, &(0x7f0000000280)="c45b850d8ffa86053c8f6481fdb7046547ed8a8b9c314f040e9b5bc0fbb6dc29205589b291d7e72c7b58060c52c23d225a77ac9eb8a946c142a72744fc72640cad653a9ca674be38cfc2ee89c2d5341d54bd2e77154193841461cd3b2cb12c3dca1ab198bea49eb1bdb1ff4c711189239536933934de311fccb3fea63722fb16d0d20a5a45de2921c40efd51cfe941462fa4377e2bef3e7232aa2f0e1c6d6598876611bea06f738dbecc3284aa669a9ced7cd87dce9891d169773c04d91e8319d418ae405f132ba0be2eba3df1b8a32f9124d925eb7b9a3c17210eb32cfbea9b9af81a11a329066e28f01ca4f025198487c3", 0xfffffffffffffe9d, 0x4001, &(0x7f0000000240)={0xa, 0x4e27, 0x7f, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x1732}, 0xfffffffffffffddc) getsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000325f23)=""/221, &(0x7f0000108000)=0xdd) 2018/04/30 14:08:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="400000001400110100000000000000000a000000", @ANYRES32=r1, @ANYBLOB="1400020000000000ffffffff00001e00000000001400010000000100000000000000000000000000"], 0x40}, 0x1}, 0x0) 2018/04/30 14:08:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="070a0a800001ff00b1", 0x9) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000e80)=@mangle={'mangle\x00', 0x1f, 0x6, 0x688, 0x0, 0x0, 0x1e0, 0x2f0, 0x3d8, 0x5f0, 0x5f0, 0x5f0, 0x5f0, 0x5f0, 0x6, &(0x7f0000000040), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x17}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0xff, 'ip6gretap0\x00', 'ifb0\x00', {}, {0xff}, 0x2, 0x3, 0x10}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x1}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1ff, [0xee, 0x8000, 0x40, 0x0, 0x8, 0x1f], 0xfff, 0x20, 0x1}, {0x5, [0xffffffff, 0x6, 0x4, 0x0, 0xc3, 0x7], 0x0, 0x6, 0x80000000}}}}, {{@ip={@empty, @rand_addr=0x5, 0xff000000, 0xff0000ff, 'veth0_to_bond\x00', 'veth0_to_team\x00', {}, {0xff}, 0x7f, 0x2, 0x40}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@icmp={0x28, 'icmp\x00', 0x0, {0x12, 0x5481, 0x8333}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x3, 0x8000}}}, {{@ip={@empty, @remote={0xac, 0x14, 0x14, 0xbb}, 0xff, 0x0, '\x00', 'gretap0\x00', {}, {}, 0x5e, 0x1, 0x9}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x3}}]}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x1, 0x7}}}, {{@uncond, 0x0, 0x1f0, 0x218, 0x0, {}, [@common=@inet=@hashlimit3={0x158, 'hashlimit\x00', 0x3, {'veth0_to_bridge\x00', {0x2, 0x2, 0x4, 0x400, 0x41f9541a, 0xc5, 0x4, 0x7f, 0xfa1e96d630f383bf}, 0x3}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x6e8) 2018/04/30 14:08:51 executing program 0: unshare(0x20000400) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='/dev/loop#\x00', &(0x7f00000000c0)="626465768a7d00"], &(0x7f0000000140)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x80001, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r0, 0x0, 0x0, 0xffffffffffff3189, &(0x7f0000000180)=[0x0], 0x1}, 0x20) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl(r1, 0x4c01000000001267, &(0x7f0000000140)) 2018/04/30 14:08:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="400000001400110100000000000000000a000000", @ANYRES32=r1, @ANYBLOB="1400020000000000ffffffff00001e00000000001400010000000100000000000000000000000000"], 0x40}, 0x1}, 0x0) 2018/04/30 14:08:51 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff8b, 0x101001) ioctl$TIOCEXCL(r1, 0x540c) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={"00000000c1653000d2310b832f4e82af", @ifru_map}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 2018/04/30 14:08:51 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000006c0)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) symlinkat(&(0x7f0000000000)='/\x00', r0, &(0x7f0000000040)='./file0\x00') ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xf8c08ac) 2018/04/30 14:08:51 executing program 3: pkey_mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x10801, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000180)={{0x3, 0x0, 0xfffffffffffffff8, 0x0, 0x4}, 0x10000, 0x9, 0x5}) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/161, 0xa1) pwritev(r0, &(0x7f0000000440)=[{&(0x7f0000001000)='{', 0x1}, {&(0x7f0000000340)="07cff578dbe52d6185561606ec8a18", 0xf}], 0x2, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x8) 2018/04/30 14:08:51 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:51 executing program 7: clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x264, 0x0) ppoll(&(0x7f0000b7fff0)=[{r2, 0xfffffffffffffff8}], 0x1, &(0x7f0000345ff0)={0x0, r0}, &(0x7f0000d5c000), 0x8) connect$unix(r1, &(0x7f00006edffb)=@file={0x0, './file0\x00'}, 0xa) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000080)=0x2, 0x4) 2018/04/30 14:08:51 executing program 4: r0 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x60) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1, &(0x7f0000000180)=""/80, 0x50, 0x7}, 0x2}, {{&(0x7f0000000200)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffec}], 0x2, 0x20, &(0x7f0000000340)={0x0, 0x1c9c380}) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x20000000000002c0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000002000), 0x0) 2018/04/30 14:08:52 executing program 1: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f00000000c0)) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000687000)=0x5c802861, 0x4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e20, 0x1ee, @loopback={0x0, 0x1}, 0x5}, {0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0xffffffffffffff80}, 0x5, [0xffffffff7fffffff, 0x39f5d70c, 0x3, 0x3, 0x1000, 0x0, 0x1400000, 0x3]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000ad2ffc)=0x1, 0x4) bind$inet6(r0, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000240), 0x0, 0xfffffefffffffffe, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000501000)=""/95, &(0x7f0000f12000)=0x5f) 2018/04/30 14:08:52 executing program 0: socketpair$unix(0x1, 0xede56a738a503cd7, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f000000d000), 0x0, 0x0, &(0x7f000000dff8)=@file={0x0, './file0\x00'}, 0x2f3) 2018/04/30 14:08:52 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x10042) r1 = openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) pwritev(r1, &(0x7f0000000100)=[{&(0x7f0000000080)='\x00z', 0x2}, {&(0x7f00000000c0)="de549e6904804840", 0x8}], 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0xff) 2018/04/30 14:08:52 executing program 4: r0 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x60) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1, &(0x7f0000000180)=""/80, 0x50, 0x7}, 0x2}, {{&(0x7f0000000200)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffec}], 0x2, 0x20, &(0x7f0000000340)={0x0, 0x1c9c380}) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x20000000000002c0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000002000), 0x0) 2018/04/30 14:08:52 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:52 executing program 7: r0 = socket$inet6(0xa, 0x800000806, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f000037fffd)={0x3}, 0x8) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) getegid() r1 = dup(r0) ioctl$TIOCCONS(r1, 0x541d) close(r0) 2018/04/30 14:08:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000002fe4)={0xa}, 0x1c) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x7}, &(0x7f0000000140)=0x8) r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r2, r3, 0x34, &(0x7f0000000040)={0x17, 0x3ff, 0x500000000000000, 0xffffffff}) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x6, 0x40000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={r1, 0x12, "d2d088f6ccd528140a8f224b905c239b41b7"}, &(0x7f00000001c0)=0x1a) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="a61ec19128ffe8dd17a5bc500c772d64", 0x10) getsockname$inet6(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f00000000c0)=0x1c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000ff0)=[{&(0x7f0000000280)="e6194c", 0x3}], 0x1, &(0x7f0000026000)}, 0x2000c080) write(r0, &(0x7f00000002c0)="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", 0x107) 2018/04/30 14:08:52 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x10042) r1 = openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) pwritev(r1, &(0x7f0000000100)=[{&(0x7f0000000080)='\x00z', 0x2}, {&(0x7f00000000c0)="de549e6904804840", 0x8}], 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0xff) 2018/04/30 14:08:52 executing program 4: ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) r0 = socket$inet6(0xa, 0x8000000001, 0x8010000000000084) accept$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) sendto$inet6(r0, &(0x7f0000001a40)="81", 0x1, 0x0, &(0x7f0000001a00)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x6}, 0x1c) recvmmsg(r0, &(0x7f00000032c0)=[{{&(0x7f0000002000)=@pppoe={0x0, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000003180), 0x0, &(0x7f00000031c0)=""/193, 0x40}}], 0x4000000000003f4, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f00006a7ffc), 0x4) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0xa0400, 0x0) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x503540) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000100)={0x3, r2}) 2018/04/30 14:08:52 executing program 2 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:52 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58) bind$ipx(r0, &(0x7f00000007c0)={0x4, 0x3, 0x8, "2cdb93b15ba1", 0xfffffffffffffff7}, 0x10) writev(r0, &(0x7f0000000740)=[{&(0x7f0000000380)="a95bdb7a9645a0f53ed9291856b574c60e463361e91e7655d4b301c50bd5fd681e5797236d1a938cfbeca7e579f8728c294e576bd82ba6a253533313d8bf177374782897d0415df4", 0x48}, {&(0x7f0000000480)="d727353564541f3840d07d69cd3d3225185f4cf46197cb767a2b259736f4c0bb20037163d755d74d310bcf74830cf75b1918b88738f02701d1acebec6670746cd0823830b53b20acdb5d65893804b1756948be1f1f3e8487eeba518e95114c54795cdba27f0dbdbcc88c709dccbdd31cbcb24cdd0ca4a79102864410b308b0f6b965e5535f2a9036c6d9ab13370bfaaa5943116fd633be213ac09cd844504a6adf7eb62fe91c6d4fc9d626ec60c73ce972388cc38a143f5b474c79ead078b312e45f039736d919cb4b624c0eaeb3e1f99b47f80bd9121372b2bf59f196500d909fd18b9ba732249d78de43bcc203ceeffe9e", 0xf2}, {&(0x7f0000000580)="11d1d1f6129175a553a7b614b41e07d8d1eb8d7673328d6950b8719c3980d5874d218bf435f56ae2112617e0583972b374be02032c0b959102f59aa31f6c89aaa21e868667b650202f857a984695ac0c27d7a99f2bea36debf92373ab16655ab356dfd3482732512d1b5440feaccedc07236e8b0e3ce337d09a9e636bcddece86356d9399f5169dc37e0453587b12d7df58a8487c35f554e4e1eacd10a49f997953d376e27e6b1408eaf0258f6543b355b430464e92938632e39d63d4d41d67cfd9836793fee986a5caf5f9a9d85edaa7d9686b363612a6421dea773f8537469a4b248a0", 0xe4}, {&(0x7f0000000400)="03", 0x1}, {&(0x7f0000000680)="3f47106dedf2349ea5703f4d4670b4933f4adc64d77ca5bdf6488b5b77d80f4d054fa995181f528c406d71abf98abfa9f925e9414119a7217a4769f109782d5e8e919ab49035494e5c68be551e13e138e6da18a5630e6f1b931699269a26291dfee241899964fb36cb6cdef23fe2f6c383d8adab1f55c47f9c4fd236fc2c93d35d840f62e69cbaff54a63d0500dcf24f03da5d6f36c04f573ead62db09656972c965073a2e40c43e3ba30b456ec5ede82e3c5e", 0xb3}], 0x5) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x10) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$rds(r2, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x0, @multicast2=0xe0000002}, 0x10, &(0x7f0000000440)=[{&(0x7f0000001f80)=""/4096, 0x128c}], 0x1, &(0x7f00000001c0)}, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000840)='/dev/midi#\x00', 0x8, 0x20000) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000880)={0x100000001, 0x4, 0x9, 0x0, 0xbc7a, 0x2, 0x0, 0x7, 0x3, 0xff}) readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/58, 0xfffffe6c}], 0x1) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x80000, 0x0) getsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f0000000200)=0x7ff, &(0x7f0000000300)=0x4) socket$alg(0x26, 0x5, 0x0) accept4$bt_l2cap(r4, &(0x7f0000000340), &(0x7f0000000800)=0xe, 0x80000) 2018/04/30 14:08:53 executing program 5: r0 = inotify_init1(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)) setitimer(0x2, &(0x7f0000000000)={{}, {0x0, 0x2710}}, &(0x7f0000000080)) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000000c0)) 2018/04/30 14:08:53 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x20000008000) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f00000001c0)={0x0, 0x401, 0x1}) r1 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140)='asymmetric\x00', 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000180)='asymmetric\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, r2) [ 104.050168] FAULT_INJECTION: forcing a failure. [ 104.050168] name failslab, interval 1, probability 0, space 0, times 1 [ 104.061904] CPU: 0 PID: 7296 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 104.069037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.078738] Call Trace: [ 104.081377] dump_stack+0x185/0x1d0 [ 104.085053] should_fail+0x87b/0xab0 [ 104.088871] should_failslab+0x279/0x2a0 [ 104.093024] __kmalloc_node+0x22e/0x1190 [ 104.097142] ? kvmalloc_node+0x1a1/0x2e0 [ 104.101267] kvmalloc_node+0x1a1/0x2e0 [ 104.105207] newseg+0x371/0x12a0 [ 104.109087] ? rcu_all_qs+0x32/0x1f0 [ 104.112857] ? shm_get_policy+0x190/0x190 [ 104.117080] ipcget+0x270/0xd40 [ 104.120403] ? prepare_exit_to_usermode+0x4a/0x3a0 [ 104.125393] ? kmsan_set_origin_inline+0x6b/0x120 [ 104.130285] ? SyS_shmget+0x54/0x80 [ 104.133993] SYSC_shmget+0x14e/0x1d0 [ 104.137803] SyS_shmget+0x54/0x80 [ 104.141335] do_syscall_64+0x309/0x430 [ 104.145278] ? is_file_shm_hugepages+0x90/0x90 [ 104.149905] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 104.155131] RIP: 0033:0x455979 [ 104.158334] RSP: 002b:00007f24739dac68 EFLAGS: 00000246 ORIG_RAX: 000000000000001d [ 104.166099] RAX: ffffffffffffffda RBX: 00007f24739db6d4 RCX: 0000000000455979 [ 104.173395] RDX: 0000000000000800 RSI: 0000000000003000 RDI: 0000000000000000 [ 104.180701] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 104.188005] R10: 0000000020ffb000 R11: 0000000000000246 R12: 0000000000000014 2018/04/30 14:08:53 executing program 0: socket$inet6_dccp(0xa, 0x6, 0x0) socket$pppoe(0x18, 0x1, 0x0) [ 104.195304] R13: 000000000000065b R14: 00000000006fd928 R15: 0000000000000000 2018/04/30 14:08:54 executing program 5: socketpair(0x11, 0x1, 0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000000c0)=0xffffffff) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x800) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000340)=""/176) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000140)=ANY=[], 0x0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0c0583b, &(0x7f0000000080)={0x3c7, &(0x7f0000000200)}) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000040)=0x400000) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f00000001c0)=0x749345cf9463dd35, 0x4) 2018/04/30 14:08:54 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x400000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') ioctl(r0, 0x10001, &(0x7f00000000c0)="9ad40d1555df435826e80d34e8ca2476b447c5bfcd04334c076c42ea3169493b512fd3399d0b307b3c45273cfb5fd1266dd3274d05bf") accept$inet(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10) preadv(r0, &(0x7f0000000100), 0x361, 0x10400003) 2018/04/30 14:08:54 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={&(0x7f000068f000)={0x10}, 0xc, &(0x7f0000197000)={&(0x7f0000000480)=@migrate={0xd8, 0x21, 0x1, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xaa}, @in6=@dev={0xfe, 0x80}}}, [@migrate={0x5c, 0x11, [{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@loopback=0x7f000001}, {@in=@rand_addr}]}, @user_kmaddress={0x2c, 0x13, {@in=@rand_addr, @in=@multicast2=0xe0000002}}]}, 0xd8}, 0x1}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x40) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', r2}) 2018/04/30 14:08:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x200000000005) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x6, [], 0x1}}, 0x1c) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x4000, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r2, r3) accept$ipx(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x10) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005000), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="b0000000000000002900000003000000a4c9a6541ef06ce1f90dde8eceb0e4b35a737e8d9fd521ef41f519d8364cd9dbdade546c41c5174319345e321c5d4eda336a8ac887414bf49a6a83adfc26ad607f6d9e96558dfb2718863055d0d970f5a8ab97af215ea43dd4f48ecf0b524a9a24387ecd980d9cb48bba519c5f7b1a1f6259472c83f6fed754bd971a0d55c8d7feadf7ffffff03baf8867019aa4e212bac50763142b5a2dec424f600000000003489d898d4b3525a3de1f1fa8de55130ad39d45d2464b069bc4e2b32696ac50d0329"], 0xb0}, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000280)={@in6={0xa, 0x4e22, 0x7f, @mcast1={0xff, 0x1, [], 0x1}, 0x3fffc0000}, {&(0x7f0000000200)=""/58, 0x3a}, &(0x7f0000000240), 0x6}, 0xa0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000140)) 2018/04/30 14:08:54 executing program 2 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) 2018/04/30 14:08:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000002fe4)={0xa}, 0x1c) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x7}, &(0x7f0000000140)=0x8) r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r2, r3, 0x34, &(0x7f0000000040)={0x17, 0x3ff, 0x500000000000000, 0xffffffff}) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x6, 0x40000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={r1, 0x12, "d2d088f6ccd528140a8f224b905c239b41b7"}, &(0x7f00000001c0)=0x1a) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="a61ec19128ffe8dd17a5bc500c772d64", 0x10) getsockname$inet6(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f00000000c0)=0x1c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000ff0)=[{&(0x7f0000000280)="e6194c", 0x3}], 0x1, &(0x7f0000026000)}, 0x2000c080) write(r0, &(0x7f00000002c0)="920356a51570a3ad9238d104cd1ebcb2282724db42cdebadc9a8617d3476b5521a1aa48d9a25db2eeddcecaaecfd0aa973578ecbcbbab94f8519f653fa17d4367d745547ed2e8a0d200cac5f7e65b355a804c6d368d6728598111b87c08340b879b1d3ec2ff6b663043f96504568074d263f8f4dfbdf7168a60993b941ff8667899f82a6fcdb7d927f4787ab79280eb44a26cafd29a4ec33fb86a54da73359a05ea364d7b73f702edf8a0da002cb4bac05b21447eec973fbd49030a334b5bcb9365a10996865276cec98a6ed27d56b784d0d8ecbf9ea988fa4a90c2769b2d0e19c511f93c622b9aca80bd853ea64c1a87a19b1e07cd28b20e425dbd1040d258a1ae0dbf7ce5187", 0x107) 2018/04/30 14:08:54 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000080)=0x7c, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f0000000000)={&(0x7f00000023c0)=""/4096, 0x1000}) 2018/04/30 14:08:54 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58) bind$ipx(r0, &(0x7f00000007c0)={0x4, 0x3, 0x8, "2cdb93b15ba1", 0xfffffffffffffff7}, 0x10) writev(r0, &(0x7f0000000740)=[{&(0x7f0000000380)="a95bdb7a9645a0f53ed9291856b574c60e463361e91e7655d4b301c50bd5fd681e5797236d1a938cfbeca7e579f8728c294e576bd82ba6a253533313d8bf177374782897d0415df4", 0x48}, {&(0x7f0000000480)="d727353564541f3840d07d69cd3d3225185f4cf46197cb767a2b259736f4c0bb20037163d755d74d310bcf74830cf75b1918b88738f02701d1acebec6670746cd0823830b53b20acdb5d65893804b1756948be1f1f3e8487eeba518e95114c54795cdba27f0dbdbcc88c709dccbdd31cbcb24cdd0ca4a79102864410b308b0f6b965e5535f2a9036c6d9ab13370bfaaa5943116fd633be213ac09cd844504a6adf7eb62fe91c6d4fc9d626ec60c73ce972388cc38a143f5b474c79ead078b312e45f039736d919cb4b624c0eaeb3e1f99b47f80bd9121372b2bf59f196500d909fd18b9ba732249d78de43bcc203ceeffe9e", 0xf2}, {&(0x7f0000000580)="11d1d1f6129175a553a7b614b41e07d8d1eb8d7673328d6950b8719c3980d5874d218bf435f56ae2112617e0583972b374be02032c0b959102f59aa31f6c89aaa21e868667b650202f857a984695ac0c27d7a99f2bea36debf92373ab16655ab356dfd3482732512d1b5440feaccedc07236e8b0e3ce337d09a9e636bcddece86356d9399f5169dc37e0453587b12d7df58a8487c35f554e4e1eacd10a49f997953d376e27e6b1408eaf0258f6543b355b430464e92938632e39d63d4d41d67cfd9836793fee986a5caf5f9a9d85edaa7d9686b363612a6421dea773f8537469a4b248a0", 0xe4}, {&(0x7f0000000400)="03", 0x1}, {&(0x7f0000000680)="3f47106dedf2349ea5703f4d4670b4933f4adc64d77ca5bdf6488b5b77d80f4d054fa995181f528c406d71abf98abfa9f925e9414119a7217a4769f109782d5e8e919ab49035494e5c68be551e13e138e6da18a5630e6f1b931699269a26291dfee241899964fb36cb6cdef23fe2f6c383d8adab1f55c47f9c4fd236fc2c93d35d840f62e69cbaff54a63d0500dcf24f03da5d6f36c04f573ead62db09656972c965073a2e40c43e3ba30b456ec5ede82e3c5e", 0xb3}], 0x5) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x10) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$rds(r2, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x0, @multicast2=0xe0000002}, 0x10, &(0x7f0000000440)=[{&(0x7f0000001f80)=""/4096, 0x128c}], 0x1, &(0x7f00000001c0)}, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000840)='/dev/midi#\x00', 0x8, 0x20000) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000880)={0x100000001, 0x4, 0x9, 0x0, 0xbc7a, 0x2, 0x0, 0x7, 0x3, 0xff}) readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/58, 0xfffffe6c}], 0x1) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x80000, 0x0) getsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f0000000200)=0x7ff, &(0x7f0000000300)=0x4) socket$alg(0x26, 0x5, 0x0) accept4$bt_l2cap(r4, &(0x7f0000000340), &(0x7f0000000800)=0xe, 0x80000) [ 105.111125] random: crng init done [ 105.152968] FAULT_INJECTION: forcing a failure. [ 105.152968] name failslab, interval 1, probability 0, space 0, times 0 [ 105.164872] CPU: 0 PID: 7332 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 105.172059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.181500] Call Trace: [ 105.184149] dump_stack+0x185/0x1d0 [ 105.188029] should_fail+0x87b/0xab0 [ 105.191802] should_failslab+0x279/0x2a0 [ 105.195969] kmem_cache_alloc+0x136/0xb90 [ 105.200207] ? __d_alloc+0x8b/0xc60 [ 105.203906] __d_alloc+0x8b/0xc60 [ 105.207430] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 105.212880] d_alloc_pseudo+0x68/0x80 [ 105.216835] hugetlb_file_setup+0x4da/0xec0 [ 105.221233] newseg+0x8c2/0x12a0 [ 105.224671] ? shm_get_policy+0x190/0x190 [ 105.228880] ipcget+0x270/0xd40 [ 105.232210] ? prepare_exit_to_usermode+0x4a/0x3a0 [ 105.237180] ? kmsan_set_origin_inline+0x6b/0x120 [ 105.242065] ? SyS_shmget+0x54/0x80 [ 105.245784] SYSC_shmget+0x14e/0x1d0 [ 105.249613] SyS_shmget+0x54/0x80 [ 105.253173] do_syscall_64+0x309/0x430 [ 105.257129] ? is_file_shm_hugepages+0x90/0x90 [ 105.261757] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 105.266970] RIP: 0033:0x455979 [ 105.270195] RSP: 002b:00007f24739dac68 EFLAGS: 00000246 ORIG_RAX: 000000000000001d [ 105.277943] RAX: ffffffffffffffda RBX: 00007f24739db6d4 RCX: 0000000000455979 [ 105.285255] RDX: 0000000000000800 RSI: 0000000000003000 RDI: 0000000000000000 [ 105.292546] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/04/30 14:08:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000002fe4)={0xa}, 0x1c) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x7}, &(0x7f0000000140)=0x8) r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r2, r3, 0x34, &(0x7f0000000040)={0x17, 0x3ff, 0x500000000000000, 0xffffffff}) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x6, 0x40000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={r1, 0x12, "d2d088f6ccd528140a8f224b905c239b41b7"}, &(0x7f00000001c0)=0x1a) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="a61ec19128ffe8dd17a5bc500c772d64", 0x10) getsockname$inet6(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f00000000c0)=0x1c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000ff0)=[{&(0x7f0000000280)="e6194c", 0x3}], 0x1, &(0x7f0000026000)}, 0x2000c080) write(r0, &(0x7f00000002c0)="920356a51570a3ad9238d104cd1ebcb2282724db42cdebadc9a8617d3476b5521a1aa48d9a25db2eeddcecaaecfd0aa973578ecbcbbab94f8519f653fa17d4367d745547ed2e8a0d200cac5f7e65b355a804c6d368d6728598111b87c08340b879b1d3ec2ff6b663043f96504568074d263f8f4dfbdf7168a60993b941ff8667899f82a6fcdb7d927f4787ab79280eb44a26cafd29a4ec33fb86a54da73359a05ea364d7b73f702edf8a0da002cb4bac05b21447eec973fbd49030a334b5bcb9365a10996865276cec98a6ed27d56b784d0d8ecbf9ea988fa4a90c2769b2d0e19c511f93c622b9aca80bd853ea64c1a87a19b1e07cd28b20e425dbd1040d258a1ae0dbf7ce5187", 0x107) 2018/04/30 14:08:54 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="a6000000932b13a5aaa25f211d2af8e998f397fafb215e404d03f2d99c8d33323ff27c843479465a69fa5fa427473d652eaa334bf36eb3e1c52a8374ee62513bd4f6fb36a8a277ee1ed86439b438acbc22de076a5a17c2d896cd497e04567ade0b5fbd89383e9303c28157c693f4e849fb8a8771bd188552ae7a017497330ca92dee4ac86373202113243cebae29888a1407c4e349973658d5900fe3d20e43929671c9a71ddb833f005429ca315437b18e1c922014eb993c89b5989c82c87ecfe0662a4f28e90fd13b85ed239b610e98450136a2c5a86772dc3e3c7a3719e7"], &(0x7f0000000100)=0xae) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0xd1}, &(0x7f0000000180)=0x8) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)="00870003000445c7566a7972f67afde13b30768668e923d57d42f05aef5462c110bf4ad571020bb363b9b563c1528daeeb4a558655a37e955c6581a7cfe5fcdaa44d1974c92df465f52373") ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000080)=""/125) statx(r0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80, &(0x7f0000000300)) getsockopt$inet_dccp_buf(r2, 0x21, 0xce, &(0x7f0000000500)=""/222, &(0x7f0000000040)=0xde) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000240)={@dev, @remote}, &(0x7f0000000280)=0x8) r3 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x6, r3) getdents64(r2, &(0x7f0000000df0)=""/528, 0xff95) [ 105.299843] R10: 0000000020ffb000 R11: 0000000000000246 R12: 0000000000000014 [ 105.307148] R13: 000000000000065b R14: 00000000006fd928 R15: 0000000000000001 [ 105.322091] ================================================================== [ 105.329504] BUG: KMSAN: uninit-value in alg_bind+0xe3/0xd90 [ 105.335268] CPU: 1 PID: 7330 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 105.342108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.351458] Call Trace: [ 105.354059] dump_stack+0x185/0x1d0 [ 105.357692] ? alg_bind+0xe3/0xd90 [ 105.361239] kmsan_report+0x142/0x240 [ 105.365046] __msan_warning_32+0x6c/0xb0 [ 105.369118] alg_bind+0xe3/0xd90 [ 105.372519] ? alg_sock_destruct+0x160/0x160 [ 105.376946] SYSC_bind+0x3f2/0x4b0 [ 105.380498] ? syscall_return_slowpath+0xe9/0x700 [ 105.385355] SyS_bind+0x54/0x80 [ 105.388642] do_syscall_64+0x309/0x430 [ 105.392536] ? SYSC_socketpair+0x14a0/0x14a0 [ 105.396985] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 105.402173] RIP: 0033:0x455979 [ 105.405369] RSP: 002b:00007ff764a63c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 105.413086] RAX: ffffffffffffffda RBX: 00007ff764a646d4 RCX: 0000000000455979 [ 105.420356] RDX: 0000000000000010 RSI: 00000000200007c0 RDI: 0000000000000013 [ 105.427627] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 105.434984] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 105.442614] R13: 0000000000000027 R14: 00000000006f4448 R15: 0000000000000000 [ 105.449899] 2018/04/30 14:08:54 executing program 4: setsockopt(0xffffffffffffffff, 0x40000000000006, 0x20, &(0x7f0000000000)="020008000000002000005462fa01a55eaf0d2cf653f13cc379ede4eafc0f4a95bbff850a0000000000060000eb188c18191e58a96fc6268399b3f109bdfaf13d3b3d54436fe71cbcdc6e30ac10369300f6af7d07634832b8a5c0a94c070000000000000098fc74e801732017e2466a9fc43aea71263335960415800000f957afa602000000001f0000d1b0e6ebcb12c7291871790fd874561062cd9f5c0cf7f1659ce8c8bed2e97e60a3649f93ea0c8263f864802a602fa698807ef14a4a1813e976be1db965ff5ceac289aea1d77400000093302eaef76f", 0xd8) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x2, 0x5, [0xcdb3, 0x4, 0xfffffffffffffc01, 0x9, 0x4]}, &(0x7f0000000180)=0x12) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000001c0)={r1, 0x1}, 0x8) socket(0x1f, 0x5, 0x7) 2018/04/30 14:08:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x40000080000028, 0xaff, 0x0, 0x0, {0x9}, [@generic="b0ee0b1923f3"]}, 0x1c}, 0x1}, 0x0) [ 105.451530] Local variable description: ----address@SYSC_bind [ 105.457403] Variable was created at: [ 105.461125] SYSC_bind+0x6f/0x4b0 [ 105.464595] SyS_bind+0x54/0x80 [ 105.467867] ================================================================== [ 105.475218] Disabling lock debugging due to kernel taint [ 105.480666] Kernel panic - not syncing: panic_on_warn set ... [ 105.480666] [ 105.488052] CPU: 1 PID: 7330 Comm: syz-executor6 Tainted: G B 4.16.0+ #87 [ 105.496199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.505594] Call Trace: [ 105.508201] dump_stack+0x185/0x1d0 [ 105.511840] panic+0x39d/0x940 [ 105.515061] ? alg_bind+0xe3/0xd90 [ 105.518695] kmsan_report+0x238/0x240 [ 105.522514] __msan_warning_32+0x6c/0xb0 [ 105.526589] alg_bind+0xe3/0xd90 [ 105.529966] ? alg_sock_destruct+0x160/0x160 [ 105.534381] SYSC_bind+0x3f2/0x4b0 [ 105.537926] ? syscall_return_slowpath+0xe9/0x700 [ 105.542783] SyS_bind+0x54/0x80 [ 105.546068] do_syscall_64+0x309/0x430 [ 105.549962] ? SYSC_socketpair+0x14a0/0x14a0 2018/04/30 14:08:54 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x803c, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) truncate(&(0x7f0000000180)='./file0\x00', 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="08c218009b5cf1ca5aa0079175d50988b7c1bfc4baaba6bd97364427121120193d12b5018a0943045971d1110176d86b414a6b62ce28d0f831d2362eaa39ea8a9335cf59dd257ec7b9aca9c88eba0b04a48588f2e5670bd8cf02ea16e89866c271416b8624a39d867ad4320d803a0df7586da36d5732c9bb1ca4a96c3e2ed27a5da62de2d94685d613a95ba894db2dc7c6f35d7a15308b813919e531cf0000504c131ff80ab2221c8651c0c8631449f9bc08e6cc145b0c5038bf97d0271ffe6847265a1485575805f2cff86dfb604adfb7b10760bb67ba2429981f779bd2a496aa87cac7b029ab356479", 0xea}], 0x1) ioctl$sock_netdev_private(r0, 0x89f8, &(0x7f0000000040)="c45dd5ca6ec6807763aef60f8edc2a64fec4795deed8f6d8985338a2e0ff383159865c37874a72117892e9fe19f794cf") ioctl$sock_proto_private(r0, 0x89ed, &(0x7f0000000200)="1ad0f02a86a51b176e19736aafd4efe83b5a216d6622c70842408ce3bc34539a2d7fc5a298a2ee68a1ff7012cda3fec9a45695") epoll_pwait(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280), 0x8) lseek(r0, 0x0, 0x2) fcntl$setlease(r0, 0x400, 0x2) [ 105.554382] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 105.559569] RIP: 0033:0x455979 [ 105.562769] RSP: 002b:00007ff764a63c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 105.570484] RAX: ffffffffffffffda RBX: 00007ff764a646d4 RCX: 0000000000455979 [ 105.577757] RDX: 0000000000000010 RSI: 00000000200007c0 RDI: 0000000000000013 [ 105.585026] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 105.592303] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 105.599578] R13: 0000000000000027 R14: 00000000006f4448 R15: 0000000000000000 [ 105.607390] Dumping ftrace buffer: [ 105.610922] (ftrace buffer empty) [ 105.614608] Kernel Offset: disabled [ 105.618221] Rebooting in 86400 seconds..