INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.15' (ECDSA) to the list of known hosts. 2018/04/20 06:30:09 fuzzer started 2018/04/20 06:30:10 dialing manager at 10.128.0.26:41811 2018/04/20 06:30:17 kcov=true, comps=false 2018/04/20 06:30:20 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10000, 0x150) ioctl$KDSETLED(r0, 0x4b32, 0x7fff) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x20282, 0x87) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000100)={0x3}, 0x4) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000140)={0xff, 0xffffffff00000000, 0x7f, 0x3ff}) ioctl$KDSETMODE(r1, 0x4b3a, 0x400) r3 = semget(0x3, 0x0, 0x1) semctl$GETNCNT(r3, 0x5, 0xe, &(0x7f0000000180)=""/7) accept$netrom(r0, &(0x7f00000001c0)=@full, &(0x7f0000000240)=0x48) ioctl$TCFLSH(r1, 0x540b, 0x9) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000280)={0x5, 0x7, 0xdb, 0x9}) ioctl$KDSETLED(r1, 0x4b32, 0x2) r4 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r4, r6, r7) r8 = request_key(&(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000480)='(vboxnet1losystemposix_acl_access+GPL.\x00', 0xfffffffffffffffd) r9 = request_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000540)='vboxnet1GPL\'mime_type\x00', 0xfffffffffffffff9) keyctl$negate(0xd, r8, 0x0, r9) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000580)="6a0cbd4a5382918cb5a232073cc3f426d958fdffa775a9806dbd0c7c42435c969f76f6e72b5eeec00f26655815d198a5c506776603464429a076aa30610ae3b74bcc8465ae7fc3048f0a1d9020fd48bc6b") ioctl$TIOCSCTTY(r1, 0x540e, 0xe3) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000600)={0x5, 0x400, 0x1, 0x29, 0x9}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000640)={0x0, 0x3}, 0x8) getpgrp(r5) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000680)=0x8, &(0x7f00000006c0)=0x4) ioctl$sock_netrom_SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000700)) bind$llc(r1, &(0x7f0000000740)={0x1a, 0x10e, 0x1, 0x0, 0x100, 0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10) accept4$alg(r1, 0x0, 0x0, 0x80800) 2018/04/20 06:30:20 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r1, 0x4) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000100)={{0x87, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e20, 0x4, 'wlc\x00', 0x8, 0x7871, 0x3a}, {@multicast2=0xe0000002, 0x4e23, 0x2000, 0x1000, 0x6, 0x3}}, 0x44) r2 = memfd_create(&(0x7f0000000180)='\x00', 0x1) r3 = accept4$inet(r2, &(0x7f00000001c0)={0x0, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) r4 = accept(r0, &(0x7f0000004300)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000004380)=0x80) fstat(r3, &(0x7f00000043c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004440)={{{@in=@loopback=0x7f000001, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e24, 0x0, 0x4e20, 0x2, 0x2, 0x20, 0x80, 0x7b, r5, r6}, {0x5, 0x1, 0x1, 0xfffffffffffffffe, 0xfffffffffffffff7, 0x1, 0x8}, {0x3, 0xffffffffffffff5e, 0x69, 0x7}, 0x5, 0x6e6bb3, 0x0, 0x1, 0x1, 0x3}, {{@in6, 0x4d6, 0xff}, 0xa, @in=@multicast1=0xe0000001, 0x34ff, 0x0, 0x3, 0x6, 0x100000000, 0xac3, 0xffffffffffffff1b}}, 0xe8) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000004540)=0xc71, 0x4) getpeername$ax25(r0, &(0x7f0000004580), &(0x7f00000045c0)=0x10) syz_open_dev$sndtimer(&(0x7f0000004600)='/dev/snd/timer\x00', 0x0, 0x40000) getgid() ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000004640)={0x5, 0x100, 0x3f0, 0x8, 0x314f529a}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000004680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000004700)=@filter={'filter\x00', 0xe, 0x4, 0x460, 0xffffffff, 0x280, 0x280, 0x0, 0xffffffff, 0xffffffff, 0x390, 0x390, 0x390, 0xffffffff, 0x4, &(0x7f00000046c0), {[{{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x1, 0x7fffffff}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x0, 0x0, 0x3, 0xd13, 0x3, 0x1, 0x81}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x3}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @empty, [0xffffffff, 0xff000000, 0xffffffff, 0xff], [0xffffffff, 0xff, 0xff000000], 'dummy0\x00', 'ip6gretap0\x00', {0xff}, {0xff}, 0x5c, 0x3, 0x0, 0x12}, 0x0, 0x110, 0x138, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x8, 0x1, 0x1, [0xfffffffffffffc00, 0x4, 0x8, 0x7, 0x7fffffff, 0xfffffffffffffff7, 0xa5ad, 0x9, 0x2, 0x5, 0x8, 0x7, 0x2, 0x80000001, 0xec, 0x3], 0x2}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x1, 0x57c}, {0xa1b, 0x8, 0x800}}}}, {{@uncond, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 'vcan0\x00', 0x6}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c0) flistxattr(r3, &(0x7f0000004bc0)=""/4096, 0x1000) ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000005bc0)) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000005c00)=0x7ff) accept$nfc_llcp(r0, 0x0, &(0x7f0000005c40)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000005c80)={r1, 0x9}, &(0x7f0000005cc0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000005d00)=@assoc_id=r1, 0x4) sendto$inet(r2, &(0x7f0000005d40)="cf433ea1a37cbc4317789e6ac1108bd27c1baed8e8088f42fa4df35b94debae48f50c596d2758c1902aac4c7fdd0abf82f2db296b6fb51b248e9c7e849b472ffa284c7446dc7ae07de", 0x49, 0x4000, &(0x7f0000005dc0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000005e00)={r1, 0x8}, &(0x7f0000005e40)=0x8) r9 = syz_open_dev$mouse(&(0x7f0000005e80)='/dev/input/mouse#\x00', 0x8, 0x400100) getsockname$ipx(r9, &(0x7f0000005ec0), &(0x7f0000005f00)=0x10) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000005f40)=0x4) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000005f80)=0x6, &(0x7f0000005fc0)=0x2) r10 = semget(0x3, 0x1, 0x100) semctl$GETNCNT(r10, 0x3, 0xe, &(0x7f0000006000)=""/4096) 2018/04/20 06:30:20 executing program 7: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stack\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1, r2}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000000c0)=0xbe, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000100)={{0xfffffffffffffffa, 0x3}, 'port0\x00', 0xc4, 0x40000, 0x7, 0xa61, 0x100, 0x4381, 0x3, 0x0, 0x7, 0x8}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x4, 0x20}, 'port1\x00', 0x10, 0x40000, 0x1, 0x3, 0xfff, 0x7f, 0x4, 0x0, 0x1, 0x37}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000280)={{0x2d18, 0x3}, {0x10001, 0x8}, 0x5ad, 0x2, 0x4}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000300)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000340)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000380)={r3, r4}) r5 = getpgid(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f00000003c0)=r5) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r2) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000400), 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000480)={&(0x7f0000000440)=[0x9, 0x7, 0x2, 0x4e, 0x5], 0x5, 0x615, 0x0, 0x200, 0x1ff, 0x200000000000000, {0x8001, 0x100000001, 0x2, 0x7, 0x0, 0x4, 0x7, 0x1, 0x67, 0xff, 0x9, 0xc9, 0x4, 0x80000001, "30fcc559d04e85f9f43eedd1799145e1d7098ab7ae76bb28271b64167dd49ce7"}}) ioctl$void(r1, 0xc0045878) rt_tgsigqueueinfo(r5, r5, 0x38, &(0x7f0000000500)={0xb, 0x4, 0xe3, 0x1}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x9}}, 0x2, 0x2, 0x3, 0xffffffff}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000640)=r6, 0x4) r7 = semget$private(0x0, 0x3, 0x2) semctl$SETALL(r7, 0x0, 0x11, &(0x7f0000000680)=[0x9, 0x76d8, 0x4, 0x80000001, 0x1, 0x8, 0x7, 0x8, 0x882, 0x8]) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/autofs\x00', 0x10000, 0x0) getsockopt$llc_int(r2, 0x10c, 0xf, &(0x7f0000000700), &(0x7f0000000740)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f0000000780)={{0x9, 0x6}, {0x0, 0x1}, 0x7fc000000000000, 0x4, 0x9}) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() fchownat(r2, &(0x7f0000000800)='./file0\x00', r9, r10, 0xc00) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r8, 0x800442d2, &(0x7f0000000940)={0x0, &(0x7f0000000900)}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f0000000980)={0x8}) 2018/04/20 06:30:20 executing program 3: r0 = dup(0xffffffffffffffff) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x8, 0x5, 0x8000}, 0x4) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000040)={{0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e23, 0x3, 'lblcr\x00', 0x34, 0x3, 0x3f}, {@multicast1=0xe0000001, 0x4e23, 0x3, 0x918f, 0x401, 0x2}}, 0x44) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000000c0)={'security\x00', 0x3, [{}, {}, {}]}, 0x58) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000180)={r0, 0x77, 0x4, "31a1f76183d54cd0c5b22aed23dc1aba46e17c55bcd0c088ec2b3cd3c7624a1f187d01b11255ddf7f3d341b95104c51538e7fd315af197cd5c3b50042bcc5515737ef5c943629ac33f0bb6c07ca8a353383d65d756a129c6679784ea6f"}) ioctl$sock_proto_private(r0, 0x89ee, &(0x7f0000000200)="73e78e71039ff4626ecbef44b214a8b7a95d1fd137a1eb5258a82e79985451b2b9c014cd493984a4aa012ee0c6441c038781cbd196dad84b5dde311c6e7d6fa48ad7e56292d6b97e275b98a8406ffe4e15436ff2fcc936055a9cce") setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000280)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000380)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='tunl0\x00', 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000400)='vlan0\x00') ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000440)) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000480)={0x4b, {{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x0, 0x2, [{{0x2, 0x4e20}}, {{0x2, 0x4e22, @rand_addr=0x1}}]}, 0x190) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000640)={0x0, 0x504, 0x0, 0x81, &(0x7f0000ffc000/0x3000)=nil, 0x6}) recvfrom$ax25(r0, &(0x7f0000000680)=""/149, 0x95, 0x2000, &(0x7f0000000740)={0x3, {"de1e7a2fc97899"}, 0x101}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000780)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x3f5}}, 0xf7, 0x6, 0x1, 0xf5d, 0x1}, &(0x7f0000000840)=0x98) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000880)={r1, 0xfffffffffffffff7}, 0x8) write$binfmt_script(r0, &(0x7f00000008c0)={'#! ', './file0', [{0x20, 'selfcgroupwlan1)D.\''}, {0x20, 'lblcr\x00'}, {0x20, 'vlan0\x00'}, {0x20}, {0x20}, {0x20, 'tunl0\x00'}, {0x20}, {0x20, "6367726f7570776c616e3027776c616e311e"}], 0xa, "282cf2abd8f6290fb6ad025bb19f785ac1d11f948611f0b3d4fc0e7c5e6cfc37da375b287f59c53c208d0b63725866721d6dfd9d090d45f7c35a46aef1a645be60bf925222cc6eec532caf44684c2cc27cc1d8f3718034ee0212386e1db2e516a8656b1ccd02c5fe3725843efa4cbd775bca78cf9111145b16817cabd0c0d91d725c6f9f17af3caaaa76b0654bdc9223"}, 0xda) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000009c0)={'filter\x00'}, &(0x7f0000000a40)=0x44) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000a80), &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000b00)={r1, 0x53, "b9532a4b6844bfb4f0bd54c93cc852ca4ac7ae585d2d38ffa4baf29777d68605586c4fbe8d9cb92e653bdd4143a7925b1893ba41e5b1a9cb402a90fc29908f103cba056471c84a2be7e7f9359390d78950fdca"}, &(0x7f0000000b80)=0x5b) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000bc0)=0x127f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000c00)="f0f5fab190817e99368aebd538f2ee8d11f6b57a8bba5ea05318ea239373e09c987da7da808f80072ca95dc10eec851bb52d03a39fd4fe12d6f406f77fcd00a600c3c5812fa9cc7518ce6646c05e41d75c47057773fa1779623f3cde530a73087db3f7969c4fd1bcbca841a91eb877d2b49cefccd6ba41944c6293395f4773afe273ccc0bd3a8a2efad8e0ae271e621928d2d2a38c89afaaa068c4753053959bf6b5adab2696b7031dcac4e158afc2d4ddd4e7a75a428294") setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000cc0)='veth1_to_bond\x00', 0x10) sendmsg$kcm(r0, &(0x7f00000023c0)={&(0x7f0000000d00)=@in={0x2, 0x4e24, @broadcast=0xffffffff}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000000d80)="e850748395afc3679ae058bc7f220b0923bb6711fb3c55c7588c585ccc2eadf8f53349672142df1795ec", 0x2a}, {&(0x7f0000000dc0)="ff001fbfca33d98dc53f9b8fab82c58ffa6610c4cfae95ece8a9d91d132f12ea38fe2fc89eb619c3d46ea356154509c846311a82b05f9399eb5e03ade67f0bbf5dcfb822db852b0af2", 0x49}, {&(0x7f0000000e40)="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", 0x1000}, {&(0x7f0000001e40)="5fc92dae7b47b350a807478dc690f7a05ba3705598f27960778386d04e1c2d0c482af0ba0896874686a1286987d169ee4a35d2b9b225595183b4609f40362cd9e2ebcb84e0c9621ce19e9ec7ae929f794de3f5433d803862afef17cb2570d0e8cb375a21e443c2d862b45facbf6ab253f542498d6343cb6247af947cd67692961769e8a2bb142683b60fbb62e2569355053997e10c38a499a35437d5e6e943417380ab41ad7637078cd31867d4f4", 0xae}, {&(0x7f0000001f00)="48f082eb9c54ab29d2049cb08b7fccbe13e9efc4adb41aabf2973b015df6c1dc71eff9464530", 0x26}], 0x5, &(0x7f0000001fc0)=[{0xb8, 0x10b, 0x8, "52efa7be0bbf3327806bccb88240ae87aa66aa26be6fe80fc7aa6714e66d9d9e583bbf50ce1efd3c685e3cbfea36370839a65a80728ab339f9dae333cba2850ce105c51e46b7c7016af8e9de8b3fad217a27bc81d8e4a6e53b8e88c2b90d9c137702bb06e1ed986f0ac58ca7cfcd47f9c07ddea251f1e66b6804653e996c39cb69c002cf5c83e8333bd6859bebccdd1abc365a0ec45f53fc75e074b9e1122d804aaf2fcdec"}, {0xf0, 0x10f, 0x1, "43852e9995a94bc3433fa3ad7cde3cbd863ea810eeb58202e70802a906425da2939eb68d84fc28b81fe793220a6eac52e51e2f8495fb743b842a2b8fe14b65d233989bb85ce28fb856d34a54d733129721577fed7fc2fce5a949733895c571c924010b2407b461ebf1d0feb7099805332bbc6a47fb91f08d331e402bde25040fc702a8da5545cb26523b68da4374e838a5550a3923f47626f2cd648b68723475a29f4ec9184261c59c1372327d707fc0139a4aa6edb89351668e52b53fbd46e711a8db76ce8c7220bce2277d2d11266ff92555a29aeeb2f6caf53639c7dc3cbe"}, {0x28, 0x108, 0x20000000200000, "070b773ff0950be6f424df674523d05d6253036154"}, {0x48, 0x11f, 0xfffffffffffffff7, "1f1fc00ce84a7a33471371d6df1cfb5fd480fb07760ac0ddcc4d2857d8eb743e9d7f86d7618eef385cd5778999e7174cb73ab629e991"}, {0xb8, 0x101, 0x1, "4a33088d47bf1e6e6b9df19aac669f5a11caf4a459fb1990d3f9d1cc928db4ac1670b3779b3813b1dbcdc8bfe6dc24fff91af0cf7f679419ff2ea019b2eafe3fc715c8bd7c1d53cded81cc8348fd454b336e2f7ed545dd3585a5de5b8448b731ba62dc34ad5e81f098ad2d7e1e5421ba27d72ae7d10a33b6b463fa654cfcf05397f90537dfc6d8b336eaafe0a7185f8667b881f06caf09db93c9962a9697bb46a9e201dc9fac"}, {0xa0, 0x10d, 0x1, "2fc7f818d43cf12182ada22052c0e3d4650e0a4342bfad8591d4272d139b21b7b4fdc111feceb5e338ad520a4219e8641fd64f578a5f3dfcb351e91323b5053174f78d4a36b48b6519d08f589cc76762fbe707a3210179ab629f18600f0814412a768ebbe054c7ba2ee1313e5ae37e97ce51334c6ae9ce12d6e0d9ce3c94f709b804512d28bc0fd993ecb05308e693ac"}, {0x58, 0x107, 0x3765, "cb49a59a4861583479355ca5d7a0cd9dd4785eca8f86fec2c4a0316b4e28cfbdde7ca38486dd40d2663652849ffe7dd55dbac05b02e6511905c5a6429719a578db"}], 0x3c8, 0x4800}, 0x40000) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000002400)={'team_slave_1\x00', {0x2, 0x4e20, @rand_addr=0x9}}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000002440)=0x3ff, &(0x7f0000002480)=0x2) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000024c0)=0x88e5, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) 2018/04/20 06:30:20 executing program 4: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) prlimit64(r0, 0x2, &(0x7f0000000040)={0x1f, 0x5}, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0xb, 0x10001) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[{0x0, 0x10000}], 0x1) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) rt_sigpending(&(0x7f00000001c0), 0x8) syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x3, 0x9, &(0x7f0000000800)=[{&(0x7f0000000280)="0bfa93be508927bff0fa459947deacee47610a79c8245ee6021e8dd02232f9b72132dcd42cb182d40c8672a331f8da96e248d3e7fc488a2badc3dbfc98f9f91e7bb0bc3af1d7dc6c551797ae48f567c57812dd4fe2d7ac26c3045305", 0x5c, 0x80}, {&(0x7f0000000300)="eb21eeca0288ffe76df2b88d2d61d7b8afad4fdc361c6131bf78a3daca529018debe78f363592f7c41fd7153c1f5cbfe76a9bc13214bdefd5548a62be4a368ab9e38718ec2855f156dc11e396be0e081b8e9b9a359ac0ac23043ca455cbc4fea23e9b0c83edca802ec71a8cbcc40876dc6f524814503d51233ebeff6e8c35aac4b1ef0fc8a6c5870b81b59a023310ba430c2cea70c946beb49e58baa7a358315ced1282ec8194de5158d498f1195adc98c29db7164c4b0f2d91a9ce4d7a4dadc5c7f961fba55f477495e38c1a0d335fc860f0d2ac319", 0xd6, 0xfffffffffffffffe}, {&(0x7f0000000400)="29a53f30483807e9952ec914e2d80a7dfacdc9297221a10e69b8d8f0d663a606f37689aa616c1c86909b9e7a214bac50a83c2ab769db761dad529da99f5811c3cc3372faa39dac30080c359161dde5d7", 0x50, 0xfffffffffffffffb}, {&(0x7f0000000480)="8e2d09c4a1b522de6b19441b1abc91d32b711f8d57492ab6f105c48aa6060a3acf257c2045d76eb5973a9c92b309ce6a00089c9f59230fece9afac4d8085c8952d1c2e838466d85e0cc5af090cba0bf43871cb0b43915179e16d344e246759e5b3b986fdfb709666a4182c8311d86b5161cff744d0a04c020eb0f2ba2589249fb035f3972c5e20d84c268ed3609b15da1fee4669d615e59ce18cbcc749db2b7d54eee8d500f74c42b16597052d01f7e904eda3553d66c829dcb786715efb71", 0xbf, 0x3}, {&(0x7f0000000540)="7d3ee40411b81d535032119c540200b79dc5aa07106d3ead08486e3b1461bed074d86cde2c7d68dc3a3ee7fd9050849684363a5a97b42fbb85cf4a6f0c04a42e8b7f58969477f6e43b1069d626db51b9087a9af1486826f3c7e355d87e764824a27c9683", 0x64, 0x81}, {&(0x7f00000005c0)="ce0dea13fe659c176ff24b3f02e6048762395c18fcfdda3f79c78a0cf9782bef5d986f81f5ba9954d7c426b2c8ce2d40166f2153eabc351d4a19d28696f61b6b13cef3bf1aaa0246849ae56dcb7bc4fe6c9127879ae5a8bf5e9b15a3d651637c5937e009d429ed19d39455c8851d5bddf4007a54c60bce603b3907e639d7b5eaad5fa1f159987073bd0ac7c8fca8047d70d9ed3bc911435f5fcd5542872a3afa6d80b902ae0c5079b2da45472fc296d64c46dc1a53819c4fe1edc9be442802c42f8b", 0xc2, 0x8}, {&(0x7f00000006c0)="14280377e96401000be7875e9b648764ffd6e477f38cb9df9ed518860795fd53635da06905dd1ed38fffcc281dae818e67d1128860e469e6741df16a6f4ecc3f", 0x40, 0x400}, {&(0x7f0000000700)="156cb78a6b0f28694ae2edefdcaf160d9398cbbdf5e2d4164486262d20b80758f8213a25a3d425b298f3dfe2449cf99e5fa4c66b7da0ae3ae1d4bfd990d0c540e83314cb2ecf423de3174dee3b367ccd9a0beb4b9787cf586bab1b9b6c6b7e7faaddbc46e13336b2c9dda010d47955cca9ff440ba640ed3c94895e6f3f1f8b6e70ab5a1188c03d88a0401b9f334d0ad474b4a98d88cb20f4511af2de6726db6fed05ad182387587708853be15d09e1851cb51df100ef63290ca9", 0xba, 0x8c0}, {&(0x7f00000007c0), 0x0, 0x10001}], 0x2080, &(0x7f0000000900)={[{@uid={'uid', 0x3d, [0x32, 0x30, 0x36, 0x31]}, 0x2c}, {@debug='debug', 0x2c}, {@dmask={'dmask', 0x3d, [0x37]}, 0x2c}]}) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000940)='irlan0\x00') chroot(&(0x7f0000000980)='./file0\x00') ioctl$sock_netrom_SIOCGSTAMPNS(0xffffffffffffff9c, 0x8907, &(0x7f00000009c0)) r4 = dup(r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000b80)=0x14) sendto$packet(r4, &(0x7f0000000a00)="9d72be271e231137c7573d4e78698e3b6a613d8a8e2e3449db42a03ec56d1bbee6a6c59a747715a8c869e81423d916908055aa9d93944dd2471230cbe7b1302e5650d540bddf07f723e84872c6491ff6b81414975bdc181a5eb1007a870d77ef9068de01ba6b3ccb522ec8db5d37556610f4655a8a9e3d646b74", 0x7a, 0x4080, &(0x7f0000000bc0)={0x11, 0x0, r5, 0x1, 0xfff, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000c80)={0xa, &(0x7f0000000c00)=[{0x100, 0x100, 0x1ff, 0x3}, {0x4, 0x8, 0x2, 0x800}, {0x0, 0x8, 0x1, 0x3f}, {0x4, 0x1f, 0x1, 0x6a}, {0x4, 0xffffffffffffc0a1, 0x1, 0x500000000000}, {0x2, 0x5, 0x3, 0x1}, {0x8001, 0x2, 0x6, 0x1}, {0x5, 0x7, 0x1, 0x1000}, {0x2, 0x69f, 0x6, 0x2}, {0xffffffffffffff81, 0x20, 0x0, 0x8001}]}, 0x10) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000cc0)=0x1, 0x4) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x3ec5) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f0000000d00)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000d80)='fou\x00') sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000e40)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x40800010}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x3c, r6, 0xb22, 0x70bd2d, 0x25dfdbff, {0x1}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000e80)={0x1, 0x8000, 0xf4, 0x1f, 0x0}, &(0x7f0000000ec0)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000f00)={r7, 0x9, 0x4, 0x100}, &(0x7f0000000f40)=0x10) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f0000000f80)=0x6, &(0x7f0000000fc0)=0x2) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000001000)={'bond0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000001040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000001080)={r8, 0x101, 0x80, 0x1, 0x3, 0x7}, &(0x7f00000010c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0xe, 0x9, &(0x7f0000001100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@alu={0x4, 0x77a, 0xf, 0xf, 0x6, 0xfffffffc, 0x10}, @generic={0x5, 0x4, 0x1, 0x1}, @call={0x85, 0x0, 0x0, 0x20}], {0x95}}, &(0x7f0000001180)='GPL\x00', 0x4, 0xdc, &(0x7f00000011c0)=""/220, 0x41100, 0x1, [], r5}, 0x48) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000001340), &(0x7f0000001380)=0x4) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f00000013c0), 0x4) 2018/04/20 06:30:20 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e23, 0x92, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x14}}, 0xbe}}, 0x3, 0x8, 0x8, 0xfff, 0x20}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240)={0x8, 0x10001, 0x0, 0x8, 0x3, 0x486, 0xac, 0x5, r1}, 0x20) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$TIOCGETD(r2, 0x5424, &(0x7f00000002c0)) delete_module(&(0x7f0000000300)='/dev/vga_arbiter\x00', 0x200) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000340)={r1, @in6={{0xa, 0x4e21, 0x40, @mcast2={0xff, 0x2, [], 0x1}, 0x3ff}}, 0x5, 0x6, 0x10000, 0x1, 0x80}, &(0x7f0000000400)=0x98) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000440)={0x20000000}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x1, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getsockname$llc(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000005c0)=0x10) socketpair$ax25(0x3, 0x7, 0x8, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000640)={r1, 0x8, 0x8, [0x80000000, 0x0, 0x0, 0xfff, 0x101, 0xfffffffffffffff8, 0x6, 0x7]}, &(0x7f0000000680)=0x18) fcntl$getflags(r0, 0x1) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000006c0)='veth1_to_bond\x00') ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000740)=0x0) sched_getaffinity(r5, 0x8, &(0x7f0000000780)) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f00000007c0)=@assoc_value={r3, 0x1}, 0x8) accept$ipx(r4, 0x0, &(0x7f0000000800)) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) linkat(r4, &(0x7f0000000880)='./file0\x00', r4, &(0x7f00000008c0)='./file0\x00', 0x1000) accept4$packet(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14, 0x800) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000a40)={@remote={0xfe, 0x80, [], 0xbb}, r7}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000a80)={'bond_slave_0\x00', 0x8402}) open(&(0x7f0000000ac0)='./file0\x00', 0x40000, 0x4) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000b00)={0x3, [0xffffffffffffffff, 0x7, 0xeb23]}, &(0x7f0000000b40)=0xa) r8 = request_key(&(0x7f0000000b80)='syzkaller\x00', &(0x7f0000000bc0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000c00)='/proc/self/net/pfkey\x00', 0xfffffffffffffff8) r9 = add_key$keyring(&(0x7f0000000c40)='keyring\x00', &(0x7f0000000c80)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, r8, 0xfffffffffffffff7, 0x1f, r9) 2018/04/20 06:30:20 executing program 1: recvmsg(0xffffffffffffff9c, &(0x7f0000001240)={&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)=""/231, 0xe7}, {&(0x7f0000000180)=""/21, 0x15}, {&(0x7f00000001c0)=""/2, 0x2}], 0x3, &(0x7f0000000240)=""/4096, 0x1000, 0x7}, 0x100) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000001280)=0x2b, 0x4) recvmsg(r0, &(0x7f00000016c0)={&(0x7f00000012c0)=@rc, 0x80, &(0x7f0000001580)=[{&(0x7f0000001340)=""/216, 0xd8}, {&(0x7f0000001440)=""/20, 0x14}, {&(0x7f0000001480)=""/162, 0xa2}, {&(0x7f0000001540)=""/9, 0x9}], 0x4, &(0x7f00000015c0)=""/217, 0xd9, 0x40}, 0x10000) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000001700)={0xe96, 0x0, 0x7e6, 0x2, 0x0}, &(0x7f0000001740)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000001780)={r1, @in={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}}, &(0x7f0000001840)=0x84) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000001880)=0x326, 0x4) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000018c0)={r2, 0x1, 0x6}, 0x10) umount2(&(0x7f0000001900)='./file0\x00', 0x8) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000001940), &(0x7f0000001980)=0x8) membarrier(0x43, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000019c0)='/dev/input/mouse#\x00', 0x81, 0x10000) utimensat(r3, &(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)={{}, {0x0, 0x2710}}, 0x100) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001a80)={r2, 0xf8, "3f73a98afba75708f4c14378c515e995476bd40687256f857f0b51800ad1572961606eb3b41941e99bc5a5b850fe6eac6d71c07e33d627f977d1a1c5dc059cb64f73b7fd6fca04511582728620af1ef0a590436069be609e58947204d1306440651ea734037c5c73c4e6d419ec63a5c12136539cb86b2b6dc0a66dae8c0fa8d6885add2bd77585c338a6101d110a52f326ed9bba3c6397c56c759cb708ab589079705393c67c6073802afc4f0b10acd02ffa23768550c2fa31669c38b6c34c4e974ec9d88e4817c99c57d203f51a38bcc7020d28559aa6120eb64fa76278025f8f25d2ed38f0dbc507b6363a18a063310606ec88430d6621"}, &(0x7f0000001b80)=0x100) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000001bc0), &(0x7f0000001c00)=0x4) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000001c40)=0xab4, &(0x7f0000001c80)=0x4) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000001cc0)=0x1) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000001d00)={r1, @in6={{0xa, 0x4e20, 0x10000, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x2}}}, 0x84) syz_mount_image$f2fs(&(0x7f0000001dc0)='f2fs\x00', &(0x7f0000001e00)='./file0\x00', 0xf21, 0x8, &(0x7f0000004180)=[{&(0x7f0000001e40)="21cb4dd04c79afba242987ad0f6c063bbf4207c7fd779db5a4a844bcbff8", 0x1e}, {&(0x7f0000001e80)="031d99deb31b660d3bc658cb1441f8a8bb50f4da90f7f3065d3f49a7fd3f1ed3b946432f4bfda9410bbca981b7f32c8965c1515bf0f8a1672629bfaee816090dd48a34c6763bec39032e9f019a9b1facaad7813812b3e96ae4b0", 0x5a, 0x6}, {&(0x7f0000001f00)="b57362736bcf652cdbb8bcd5b48ec2e76eb01099037fe44640570d568d6cd560b5bc252869c528a12df0a64287aae264e23de6d15f5705cb4e1188e5625063cd0ac778b25d4b49b56440c8e80b720740897cbdc5dfbef8e0b54c870df0e679f8105ff3078e43558455531fb735a2962069ce7cdfd0fe56f36c06bfd1a54a3108c59714e7c10e8121683fcdb5cad03fdcad4a5b5441b722c621b9f6", 0x9b}, {&(0x7f0000001fc0), 0x0, 0x3f}, {&(0x7f0000002000)="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", 0x1000, 0x5}, {&(0x7f0000003000)="efba22f451b6b146f18cce1642c2a10e5021cff3963224e7cbc17553a11ac16e26c7958b1f49b92a462dab8f68451c63fd9e7316d0a316dac4520cc8fffb7ce80237ba5b34", 0x45, 0x2}, {&(0x7f0000003080)="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", 0x1000, 0x2c}, {&(0x7f0000004080)="f2de6254032b283f4d6bff36dc1e954c59705953721efba3121c229e36f13092c024e89da381a3b4d70bbd2101618f7fa26bb35a9750af82d9d497683e942fccbe5bd0b46fede6ab27335babdfddd6a11d2ae64def8b99d8edb0af0c62129e7a2ffe934002d6e564649848468e7c11dc6fab2ad361ba2d79df9ab807c96bc26df556185a2ae5240ce2fffd64b0b0b4678f894eb4b894792436668bbf14104862feb5199abffe6ba70959af32a2639bf11243fa4e84ab37bc04cfb5fe920de7ad84adf5da8a05ee2538", 0xc9}], 0x50000, &(0x7f0000004240)={[{@disable_ext_identify='disable_ext_identify', 0x2c}]}) ioctl$TCFLSH(r3, 0x540b, 0xc4fc) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000004280)={'ip_vti0\x00', 0x3ff}) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000042c0)={r4, @in6={{0xa, 0x4e21, 0x1, @empty, 0x6}}}, 0x84) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000004380)) r5 = socket$inet6(0xa, 0x80a, 0xfffffffffffffff8) setsockopt$inet6_MCAST_JOIN_GROUP(r5, 0x29, 0x2a, &(0x7f00000043c0)={0x2fda450c, {{0xa, 0x4e22, 0xa0b, @empty, 0x401}}}, 0x88) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000004480)={r2, 0x4}, &(0x7f00000044c0)=0x8) linkat(r3, &(0x7f0000004500)='./file0\x00', r3, &(0x7f0000004540)='./file0\x00', 0x0) r6 = accept4(r3, &(0x7f0000004580)=@l2, &(0x7f0000004600)=0x80, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000004640)={r1, @in6={{0xa, 0x4e23, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x6}}, 0xbae6, 0x39}, 0x90) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000004700)={0x0, 0x80000, r3}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000004740)={r7, 0x80000, r3}) 2018/04/20 06:30:20 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'veth0_to_bond\x00', 0x1}) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000080)=0x4, 0x4) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f00000000c0)=""/4096) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x28) flock(r1, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000010c0)={0x0, 0x200}, &(0x7f0000001100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000001140)={r2, 0x4c, "a62290fc416c3eb59a4975c77dd0f2591e59540fe8426d6bf260298b74c1ab28a4dcde832a20207094de980f6a876ae4e3e08eb1f1920be3f6db8d97fdca7c61fc2787ed390d3f010f5bbace"}, &(0x7f00000011c0)=0x54) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000001200)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001240)={0x0}, &(0x7f0000001280)=0xc) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000012c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) wait4(r3, &(0x7f0000001300), 0x1000008, &(0x7f0000001340)) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000001400)=0x1, 0x4) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000001440)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000001480)={r5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f00000014c0)={0x20c, @tick=0x2, 0xfff, {0x1, 0x8000}, 0x9, 0x2, 0x62400}) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000001540)={r2, 0x1}, 0x8) fcntl$getflags(r1, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000001580)={0x2, 0x2}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000015c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000001680)={r6, &(0x7f0000001600)=""/125}) getpeername$ax25(r1, &(0x7f00000016c0), &(0x7f0000001700)=0x10) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000001740), &(0x7f0000001780)=0xc) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/rtc\x00', 0x101000, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000001800)={'sit0\x00', 0x40}) ioctl$sock_netrom_SIOCGSTAMP(r7, 0x8906, &(0x7f0000001840)) ioctl$TIOCCBRK(r4, 0x5428) chmod(&(0x7f0000001880)='./file0\x00', 0xa1) syzkaller login: [ 45.609808] ip (3745) used greatest stack depth: 54672 bytes left [ 46.179907] ip (3798) used greatest stack depth: 54312 bytes left [ 47.048768] ip (3885) used greatest stack depth: 54200 bytes left [ 47.244622] ip (3899) used greatest stack depth: 53656 bytes left [ 47.615622] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.622121] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.640313] device bridge_slave_0 entered promiscuous mode [ 47.649933] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.656412] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.674167] device bridge_slave_0 entered promiscuous mode [ 47.691956] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.698416] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.712005] device bridge_slave_0 entered promiscuous mode [ 47.723400] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.729886] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.752951] device bridge_slave_0 entered promiscuous mode [ 47.770382] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.776853] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.793153] device bridge_slave_0 entered promiscuous mode [ 47.801393] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.807838] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.822483] device bridge_slave_0 entered promiscuous mode [ 47.833674] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.840166] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.866148] device bridge_slave_1 entered promiscuous mode [ 47.872757] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.879298] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.899253] device bridge_slave_0 entered promiscuous mode [ 47.911414] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.917900] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.942051] device bridge_slave_1 entered promiscuous mode [ 47.951840] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.958314] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.982228] device bridge_slave_1 entered promiscuous mode [ 47.990672] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.997152] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.005271] device bridge_slave_0 entered promiscuous mode [ 48.013444] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.019890] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.027505] device bridge_slave_1 entered promiscuous mode [ 48.038444] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.044891] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.077128] device bridge_slave_1 entered promiscuous mode [ 48.090721] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.097222] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.122945] device bridge_slave_1 entered promiscuous mode [ 48.140420] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.149934] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.163975] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.170456] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.194306] device bridge_slave_1 entered promiscuous mode [ 48.213799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.224102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.232919] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.239423] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.273247] device bridge_slave_1 entered promiscuous mode [ 48.289664] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.298390] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.318128] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.345492] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.418975] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.431956] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.449942] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.466737] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.496005] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.522300] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.648593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.671989] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.343303] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.351273] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.379866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.390386] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.557895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.567134] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.575771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.585406] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.605546] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.613006] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.620956] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.683869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.762755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.802328] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.855921] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.921193] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.443918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.542603] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.552185] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.616584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.679378] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.762612] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.772293] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.786622] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.838956] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.863682] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.889930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.897358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.908827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.944514] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.966562] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.996405] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.015906] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.026085] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.042752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.071585] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.078792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.091899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.126577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.137087] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.144376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.173164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.192694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.207817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.226356] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.237679] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.248439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.260660] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.271480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.284739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.311923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.330464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.346381] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.355743] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.364009] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.374153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.385752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.425592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.440935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.478136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.485318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.500707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.534576] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.542429] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.557980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.607118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.634414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.657059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.692493] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.707727] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.725658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.742190] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.754815] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.765401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.801735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.832635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.864783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.963009] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.970386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.987322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.528221] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.534723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.541609] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.548280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.606179] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.615647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.635390] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.641886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.648774] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.655238] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.663783] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.691574] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.698129] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.704994] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.711523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.769267] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.868490] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.874957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.881849] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.888308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.956701] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.974090] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.980570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.987447] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.993936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.050925] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.111971] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.118498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.125397] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.131877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.198947] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.296413] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.302927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.309819] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.316289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.389115] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.422918] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.429421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.436326] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.442799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.507871] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.624716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.644194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.673775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.697146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.718978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.734689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.742861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.792869] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.050767] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.149986] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.250756] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.569261] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.575585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.585981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.623859] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.646492] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.686352] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.868195] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.884367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.899954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.936609] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.945497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.956214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.987572] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.173180] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.179460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.186968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.428426] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.436847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.450660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.474144] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.480901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.500266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.583361] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.589692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.602647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.827234] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.833503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.841399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/20 06:30:46 executing program 3: 2018/04/20 06:30:46 executing program 3: 2018/04/20 06:30:46 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x6f2000, 0x41, 0x0, &(0x7f0000000000)) 2018/04/20 06:30:46 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x4000000004002) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@nat={'nat\x00', 0x19, 0x8, 0x598, [0x20000500, 0x0, 0x0, 0x20000870, 0x20000a88], 0x0, &(0x7f0000000100), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x3, 0xc, 0x0, 'irlan0\x00', 'veth1_to_bridge\x00', 'veth0_to_bond\x00', 'lo\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0xff, 0x0, 0xe5f9df51582801d, 0xff], 0x1d0, 0x248, 0x280, [@comment={'comment\x00', 0x100}, @realm={'realm\x00', 0x10, {{0x163c, 0xfffffffffffffffc}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b066b55d4165d82f424b38d7e705f6f25fcb1fc398fe8850517e06c68070ad0d67acf6eef9ad345d0fb5182c54b105fe5ab3a19a34371e399c877dcb933b5a25"}}}]}, @arpreply={'arpreply\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x17}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x2, 0x194fcb9254d90454, 0x1, [{{{0xf, 0x8, 0x17, 'tunl0\x00', 'bcsf0\x00', 'vlan0\x00', 'bond0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0x0, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="d44babae2dd0", 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x6, 0xfffffffffffffffc, 0x1, [{{{0x11, 0x76, 0x9200, 'bcsh0\x00', 'veth0_to_bond\x00', 'team_slave_0\x00', 'ip_vti0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff], 0x138, 0x170, 0x1a8, [@ipvs={'ipvs\x00', 0x28, {{@ipv6=@local={0xfe, 0x80, [], 0xaa}, [0x0, 0xff000000, 0xffffff00, 0xffffff00], 0x4e23, 0x32, 0x1f, 0x4e22, 0x2, 0x8}}}, @ip6={'ip6\x00', 0x50, {{@mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, [0xffffffff, 0xff000000, 0x0, 0xffffffff], [0xffffffff, 0xff, 0xffffffff, 0xff000000], 0x8, 0x1, 0x10, 0x4, 0x4e24, 0x4e21, 0x4e23, 0x4e20}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xf}, 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0x10, {{@random="21bcb35a7642", 0xffffffffffffffff}}}}]}]}, 0x610) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000200)={0x7, 0x40}) r2 = dup2(r0, r0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4134e475824fbfaeefb278580e4aedd886c0b629cd32c56ebff94329c3a32a4b8c171676b94083085709923fd77ead8ca0073183b09c62b90673944ded2f276e", "49710f29a576931228cd8c92a1b9375555874f087c556b616155647a2732f399"}) 2018/04/20 06:30:47 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10000, 0x150) ioctl$KDSETLED(r0, 0x4b32, 0x7fff) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x20282, 0x87) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000100)={0x3}, 0x4) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000140)={0xff, 0xffffffff00000000, 0x7f, 0x3ff}) ioctl$KDSETMODE(r1, 0x4b3a, 0x400) r3 = semget(0x3, 0x0, 0x1) semctl$GETNCNT(r3, 0x5, 0xe, &(0x7f0000000180)=""/7) accept$netrom(r0, &(0x7f00000001c0)=@full, &(0x7f0000000240)=0x48) ioctl$TCFLSH(r1, 0x540b, 0x9) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000280)={0x5, 0x7, 0xdb, 0x9}) ioctl$KDSETLED(r1, 0x4b32, 0x2) r4 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r4, r6, r7) r8 = request_key(&(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000480)='(vboxnet1losystemposix_acl_access+GPL.\x00', 0xfffffffffffffffd) r9 = request_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000540)='vboxnet1GPL\'mime_type\x00', 0xfffffffffffffff9) keyctl$negate(0xd, r8, 0x0, r9) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000580)="6a0cbd4a5382918cb5a232073cc3f426d958fdffa775a9806dbd0c7c42435c969f76f6e72b5eeec00f26655815d198a5c506776603464429a076aa30610ae3b74bcc8465ae7fc3048f0a1d9020fd48bc6b") ioctl$TIOCSCTTY(r1, 0x540e, 0xe3) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000600)={0x5, 0x400, 0x1, 0x29, 0x9}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000640)={0x0, 0x3}, 0x8) getpgrp(r5) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000680)=0x8, &(0x7f00000006c0)=0x4) ioctl$sock_netrom_SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000700)) bind$llc(r1, &(0x7f0000000740)={0x1a, 0x10e, 0x1, 0x0, 0x100, 0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10) accept4$alg(r1, 0x0, 0x0, 0x80800) 2018/04/20 06:30:47 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) connect$rds(r1, &(0x7f0000000440)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x1, 0x0, 0x0, 0x1}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x0, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr=0x8}, @in6={0xa, 0x4e24}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000)={0x0, 0x0, 0x6}, 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f00000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r4, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000400), 0x4) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) 2018/04/20 06:30:47 executing program 1: timer_create(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f00000001c0)}}, &(0x7f0000000300)) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x30000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {r1, r2/1000+30000}}) recvmmsg(r0, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)=""/83, 0x53}, {&(0x7f00000001c0)=""/69, 0x45}, {&(0x7f0000000340)=""/224, 0xe0}, {&(0x7f0000000540)=""/212, 0xd4}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000240)=""/30, 0x1e}], 0x6, &(0x7f0000001640)=""/133, 0x85, 0x6}, 0x5}, {{&(0x7f0000001700)=@nfc_llcp, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000001780)=""/223, 0xdf}, {&(0x7f0000001880)=""/67, 0x43}, {&(0x7f0000001900)=""/156, 0x9c}, {&(0x7f00000019c0)=""/205, 0xcd}, {&(0x7f0000001ac0)=""/4096, 0x1000}], 0x5, &(0x7f0000002b40)=""/99, 0x63, 0xfffffffffffffff7}, 0x1}], 0x2, 0x100, &(0x7f0000000280)={0x0, 0x1c9c380}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) sendmmsg(r3, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f00000004c0)=@generic={0x0, "54140bf8d58a31fcf976acdc3f1b8cef31aa1e40ffe813905b7ec85f1c91537adb5e935a46df64813c66df29c47b16e2ed10955f40be666cb0951ecdb1afc908cb9eafb20b4d3f013ea1f03013ec61afa7225d9bf811826bbacdc9a7a158c620e904dc7e70eb13e98e660ea94926dab56782eead5c762dff82b9a5cb6b79"}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000000)}}], 0x2, 0x0) 2018/04/20 06:30:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e40fee)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) unshare(0x28060400) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 2018/04/20 06:30:47 executing program 7: socket(0x9, 0x0, 0xfffffffffffffffa) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000e15000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000380)="7026f2c5", 0x4) sendmmsg(r2, &(0x7f0000742000)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000200)='p', 0x1}, {&(0x7f00000003c0)="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", 0x1000}], 0x2, &(0x7f0000632000)}}], 0x1, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) fcntl$addseals(r0, 0x409, 0xb) r3 = dup3(r0, r0, 0x80000) connect$bt_l2cap(r3, &(0x7f0000000280)={0x1f, 0x9, {0xffff, 0x5, 0x3ff, 0x0, 0x3}, 0x100000000, 0x9}, 0xe) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000100)={0x0, @dev, @broadcast}, &(0x7f0000000140)=0xc) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000013c0)={0x9, {{0xa, 0x4e20, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x5}}}, 0x88) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x101, 0x0, 0x12, 0x15, 0xc, "fdafafcac3cc83ed68ecfe81c1da1821b9fe15e28c42586cd8ab2bb42d746a83c19378757eb3c23466f9368909e540caee56583c3849c6780145c0c973371546", "413971215bb2019072b4d46c5491459b3fc30a23445d0356e586b46d2a9e3642fd85b158e2c36ffb727d4a8d6762edb39112e4d1dc6f550042e3148bb9c7138b", "41e6331260f24b97493b0c1be787273b0e365aabc1db6611fce849f0c2577c18", [0x7, 0x4]}) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x1f2, &(0x7f0000003ac0), 0x0, &(0x7f00000003c0)}}, {{&(0x7f0000000080)=@ll={0x11, 0x17, r4, 0x1, 0x800, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000500)}], 0x1000000000000275, &(0x7f0000000000), 0x0, 0xfffffffffffffffa}}], 0x2, 0x0) 2018/04/20 06:30:47 executing program 6: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="cf2bb43c40b8", [], {@ipv6={0x86dd, {0x0, 0x6, "9383af", 0x8, 0x2c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x18000, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x3) 2018/04/20 06:30:47 executing program 5: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f000001dfd6)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f000001f000)={0x2000, 0x989680}) semtimedop(r0, &(0x7f0000a0ffc4)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f000043d000)={0x0, 0x989680}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000040)={0x1, 0x3ff}) semctl$IPC_RMID(r0, 0x0, 0x0) 2018/04/20 06:30:47 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r1, 0x4) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000100)={{0x87, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e20, 0x4, 'wlc\x00', 0x8, 0x7871, 0x3a}, {@multicast2=0xe0000002, 0x4e23, 0x2000, 0x1000, 0x6, 0x3}}, 0x44) r2 = memfd_create(&(0x7f0000000180)='\x00', 0x1) r3 = accept4$inet(r2, &(0x7f00000001c0)={0x0, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) r4 = accept(r0, &(0x7f0000004300)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000004380)=0x80) fstat(r3, &(0x7f00000043c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004440)={{{@in=@loopback=0x7f000001, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e24, 0x0, 0x4e20, 0x2, 0x2, 0x20, 0x80, 0x7b, r5, r6}, {0x5, 0x1, 0x1, 0xfffffffffffffffe, 0xfffffffffffffff7, 0x1, 0x8}, {0x3, 0xffffffffffffff5e, 0x69, 0x7}, 0x5, 0x6e6bb3, 0x0, 0x1, 0x1, 0x3}, {{@in6, 0x4d6, 0xff}, 0xa, @in=@multicast1=0xe0000001, 0x34ff, 0x0, 0x3, 0x6, 0x100000000, 0xac3, 0xffffffffffffff1b}}, 0xe8) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000004540)=0xc71, 0x4) getpeername$ax25(r0, &(0x7f0000004580), &(0x7f00000045c0)=0x10) syz_open_dev$sndtimer(&(0x7f0000004600)='/dev/snd/timer\x00', 0x0, 0x40000) getgid() ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000004640)={0x5, 0x100, 0x3f0, 0x8, 0x314f529a}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000004680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000004700)=@filter={'filter\x00', 0xe, 0x4, 0x460, 0xffffffff, 0x280, 0x280, 0x0, 0xffffffff, 0xffffffff, 0x390, 0x390, 0x390, 0xffffffff, 0x4, &(0x7f00000046c0), {[{{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x1, 0x7fffffff}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x0, 0x0, 0x3, 0xd13, 0x3, 0x1, 0x81}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x3}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @empty, [0xffffffff, 0xff000000, 0xffffffff, 0xff], [0xffffffff, 0xff, 0xff000000], 'dummy0\x00', 'ip6gretap0\x00', {0xff}, {0xff}, 0x5c, 0x3, 0x0, 0x12}, 0x0, 0x110, 0x138, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x8, 0x1, 0x1, [0xfffffffffffffc00, 0x4, 0x8, 0x7, 0x7fffffff, 0xfffffffffffffff7, 0xa5ad, 0x9, 0x2, 0x5, 0x8, 0x7, 0x2, 0x80000001, 0xec, 0x3], 0x2}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x1, 0x57c}, {0xa1b, 0x8, 0x800}}}}, {{@uncond, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 'vcan0\x00', 0x6}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c0) flistxattr(r3, &(0x7f0000004bc0)=""/4096, 0x1000) ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000005bc0)) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000005c00)=0x7ff) accept$nfc_llcp(r0, 0x0, &(0x7f0000005c40)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000005c80)={r1, 0x9}, &(0x7f0000005cc0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000005d00)=@assoc_id=r1, 0x4) sendto$inet(r2, &(0x7f0000005d40)="cf433ea1a37cbc4317789e6ac1108bd27c1baed8e8088f42fa4df35b94debae48f50c596d2758c1902aac4c7fdd0abf82f2db296b6fb51b248e9c7e849b472ffa284c7446dc7ae07de", 0x49, 0x4000, &(0x7f0000005dc0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000005e00)={r1, 0x8}, &(0x7f0000005e40)=0x8) r9 = syz_open_dev$mouse(&(0x7f0000005e80)='/dev/input/mouse#\x00', 0x8, 0x400100) getsockname$ipx(r9, &(0x7f0000005ec0), &(0x7f0000005f00)=0x10) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000005f40)=0x4) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000005f80)=0x6, &(0x7f0000005fc0)=0x2) r10 = semget(0x3, 0x1, 0x100) semctl$GETNCNT(r10, 0x3, 0xe, &(0x7f0000006000)=""/4096) 2018/04/20 06:30:47 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10000, 0x150) ioctl$KDSETLED(r0, 0x4b32, 0x7fff) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x20282, 0x87) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000100)={0x3}, 0x4) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000140)={0xff, 0xffffffff00000000, 0x7f, 0x3ff}) ioctl$KDSETMODE(r1, 0x4b3a, 0x400) r3 = semget(0x3, 0x0, 0x1) semctl$GETNCNT(r3, 0x5, 0xe, &(0x7f0000000180)=""/7) accept$netrom(r0, &(0x7f00000001c0)=@full, &(0x7f0000000240)=0x48) ioctl$TCFLSH(r1, 0x540b, 0x9) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000280)={0x5, 0x7, 0xdb, 0x9}) ioctl$KDSETLED(r1, 0x4b32, 0x2) r4 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r4, r6, r7) r8 = request_key(&(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000480)='(vboxnet1losystemposix_acl_access+GPL.\x00', 0xfffffffffffffffd) r9 = request_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000540)='vboxnet1GPL\'mime_type\x00', 0xfffffffffffffff9) keyctl$negate(0xd, r8, 0x0, r9) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000580)="6a0cbd4a5382918cb5a232073cc3f426d958fdffa775a9806dbd0c7c42435c969f76f6e72b5eeec00f26655815d198a5c506776603464429a076aa30610ae3b74bcc8465ae7fc3048f0a1d9020fd48bc6b") ioctl$TIOCSCTTY(r1, 0x540e, 0xe3) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000600)={0x5, 0x400, 0x1, 0x29, 0x9}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000640)={0x0, 0x3}, 0x8) getpgrp(r5) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000680)=0x8, &(0x7f00000006c0)=0x4) ioctl$sock_netrom_SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000700)) bind$llc(r1, &(0x7f0000000740)={0x1a, 0x10e, 0x1, 0x0, 0x100, 0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10) accept4$alg(r1, 0x0, 0x0, 0x80800) 2018/04/20 06:30:47 executing program 1: timer_create(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f00000001c0)}}, &(0x7f0000000300)) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x30000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {r1, r2/1000+30000}}) recvmmsg(r0, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)=""/83, 0x53}, {&(0x7f00000001c0)=""/69, 0x45}, {&(0x7f0000000340)=""/224, 0xe0}, {&(0x7f0000000540)=""/212, 0xd4}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000240)=""/30, 0x1e}], 0x6, &(0x7f0000001640)=""/133, 0x85, 0x6}, 0x5}, {{&(0x7f0000001700)=@nfc_llcp, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000001780)=""/223, 0xdf}, {&(0x7f0000001880)=""/67, 0x43}, {&(0x7f0000001900)=""/156, 0x9c}, {&(0x7f00000019c0)=""/205, 0xcd}, {&(0x7f0000001ac0)=""/4096, 0x1000}], 0x5, &(0x7f0000002b40)=""/99, 0x63, 0xfffffffffffffff7}, 0x1}], 0x2, 0x100, &(0x7f0000000280)={0x0, 0x1c9c380}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) sendmmsg(r3, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f00000004c0)=@generic={0x0, "54140bf8d58a31fcf976acdc3f1b8cef31aa1e40ffe813905b7ec85f1c91537adb5e935a46df64813c66df29c47b16e2ed10955f40be666cb0951ecdb1afc908cb9eafb20b4d3f013ea1f03013ec61afa7225d9bf811826bbacdc9a7a158c620e904dc7e70eb13e98e660ea94926dab56782eead5c762dff82b9a5cb6b79"}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000000)}}], 0x2, 0x0) 2018/04/20 06:30:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha512-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="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", 0x1db) 2018/04/20 06:30:47 executing program 3: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000d36ff4)={0xfc147812c6696267}) timerfd_settime(r1, 0x1, &(0x7f0000005000)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000100)) epoll_pwait(r0, &(0x7f0000a1efac)=[{}], 0x1, 0x0, &(0x7f0000bbfff8), 0x8) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{r2, r3/1000+10000}, {r4, r5/1000+10000}}) 2018/04/20 06:30:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000387000), 0x4) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000fb8)={0x2, 0x6, 0x0, 0x0, 0x20000000000000bb}, 0x10}, 0x2}, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) connect$unix(r1, &(0x7f00000002c0)=@abs, 0x2d) close(r0) 2018/04/20 06:30:47 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x6000) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000080)={0x0, 0x6224, 0x1ff, 0xc6, 0xa5, 0x54}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCCBRK(r1, 0x5428) r2 = socket$inet6(0xa, 0x802, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x23) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000040)=@fragment, 0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000140), 0x4) finit_module(r0, &(0x7f0000000180)='/dev/input/mice\x00', 0x1) 2018/04/20 06:30:48 executing program 7: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) mmap(&(0x7f0000000000/0xfea000)=nil, 0xfea000, 0x400000000000000a, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'team_slave_1\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) sysfs$3(0x3) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000040)) 2018/04/20 06:30:48 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000b21000/0x3000)=nil, 0x3000) munlockall() 2018/04/20 06:30:48 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000320ff8)='/dev/sg#\x00', 0x0, 0x0) ioctl$KDMKTONE(r0, 0x2285, 0xfffffffffffffffd) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000000)="60e23beae5a63abb776f50fe19cef9ee88889c8f3ae0885b7e4228675b1b4966354e2f82e52fbdc292541507676373e73dc60ca2704834c0f9d68b1a364273bc872ced220e603a1090c090ed7a9152bf06ec65637c68945f63dd397b04b0ecaaa3636f97d30d2b339c8ea0ba74c32fd3333ddca28e4d97f8606e7ea353859c4c278cc2b139e0b2b5d315913e8bf776566bd72d5558949514eea576fed834b7d89d115e62c4b55c441183297c828f37a4bde0d7a89a587f39d6886fe2cfd8c275fc2baedb365ddfaec0112eebada477614445c5115d0f6db2e8bd712a2aa9e844e4a63b9f5d9eba222ececb7b47f7bdfc0aecd82e") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020027bd7000ffdbdf250a0000001c00020008000500090000000800030003000000080005008100000008d389eacd9c2dfa35f68e34e8ba9e000500960500000c000300080004000500000034000100080002003c000000080009004d000000080001000a00000008000b0073697000080001000a000000080002003b00000020a800000000000000"], 0x78}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = accept$nfc_llcp(r0, 0x0, &(0x7f0000000100)) fcntl$getown(r0, 0x9) getpgid(0xffffffffffffffff) gettid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000400)) getpgid(0x0) fcntl$getown(r2, 0x9) getpgrp(0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000440)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000005c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000600)) getpid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000640)=0x0) r4 = getpgrp(r3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={r4, r5, r6}, 0xc) 2018/04/20 06:30:48 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000617fc9), 0x0, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000ec5000)=0x100, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x0, 0x0, @loopback}, &(0x7f0000000040)=0x10, 0x80800) 2018/04/20 06:30:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000bd1000)='ns/uts\x00') fstat(r0, &(0x7f0000000040)) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a30bd10a8b4e723551da9b04580d26728f92aba665d3c2fe19ccdc22ac0e66b88063e3360ea8376055b880fcea0b7115a55435217ca58aa572bc6"], 0x3d) syz_open_procfs(0x0, &(0x7f0000d43000)='ns/uts\x00') 2018/04/20 06:30:48 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) bind$inet6(r0, &(0x7f0000003000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x401, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) 2018/04/20 06:30:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f17000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045440, &(0x7f0000000000)) ioctl$KDADDIO(r0, 0x4b34, 0x9) 2018/04/20 06:30:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha512-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="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", 0x1db) 2018/04/20 06:30:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x5, 0x800, 0xffffffff00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) syncfs(r0) pipe(&(0x7f0000000080)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 2018/04/20 06:30:49 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000b21000/0x3000)=nil, 0x3000) munlockall() 2018/04/20 06:30:49 executing program 6: r0 = socket$inet6(0xa, 0xe, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) 2018/04/20 06:30:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) eventfd2(0x4, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={"000000803000", r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000080)={{0x6c, @multicast1=0xe0000001, 0x4e22, 0x0, 'nq\x00', 0x12, 0x651, 0x2c}, {@rand_addr=0x6, 0x4e21, 0x3, 0x401, 0x5, 0x3}}, 0x44) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f00005b3000)="0000000000a700091504df815b00000000007f0000da008711c515000000038abd", 0x21) 2018/04/20 06:30:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000bd1000)='ns/uts\x00') fstat(r0, &(0x7f0000000040)) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a30bd10a8b4e723551da9b04580d26728f92aba665d3c2fe19ccdc22ac0e66b88063e3360ea8376055b880fcea0b7115a55435217ca58aa572bc6"], 0x3d) syz_open_procfs(0x0, &(0x7f0000d43000)='ns/uts\x00') 2018/04/20 06:30:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) listen(r0, 0x100000000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x26, &(0x7f0000000080), 0x0) 2018/04/20 06:30:49 executing program 1: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) fcntl$addseals(r0, 0x409, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x887c, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000200)) ioctl$TIOCNXCL(r1, 0x540d) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000340)={@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @mcast1={0xff, 0x1, [], 0x1}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8, 0x1, 0x100000001, 0x400, 0x5, 0x100000, r2}) mq_timedreceive(r0, &(0x7f0000000040)=""/97, 0x61, 0x0, 0x0) r3 = semget$private(0x0, 0x1, 0x40) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000700)={'raw\x00'}, &(0x7f0000000780)=0x54) semctl$GETNCNT(r3, 0x7, 0xe, &(0x7f0000000480)=""/82) seccomp(0x1, 0x1, &(0x7f0000000440)={0x2, &(0x7f0000000400)=[{0x9, 0x5d15, 0x1, 0x3}, {0x9, 0x100000000}]}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x400) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000640)=""/94, &(0x7f00000006c0)=0x5e) accept4$alg(r1, 0x0, 0x0, 0x800) r6 = dup3(r4, r5, 0x0) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f00000003c0)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x2}) mq_timedreceive(r0, &(0x7f00000000c0)=""/144, 0x90, 0x0, 0x0) mq_timedsend(r0, &(0x7f00000005c0)="90634a24800ca0050cda3e6eeee64eea0e5ca905bc0093d95f38542f4a18dbbce5d38c8a9c8fc35d307dcb0e06153e80309fdbfe9f2e236dd98fd593cbff14df804bc46925338a2706d4239212794794b4d78effbbdc9c6944d4ec85dec1ca44cc983b7882d9821327977c44d8", 0x8924d87d, 0x0, 0x0) mq_timedsend(r0, &(0x7f000066c000), 0x0, 0x0, &(0x7f000058eff0)={0x77359400}) mq_timedreceive(r1, &(0x7f0000000500)=""/103, 0x67, 0x10001, &(0x7f0000000580)={0x0, 0x989680}) 2018/04/20 06:30:49 executing program 7: madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x6f) madvise(&(0x7f0000153000/0x800000)=nil, 0x800000, 0xf) madvise(&(0x7f0000582000/0x4000)=nil, 0x4000, 0xf) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 2018/04/20 06:30:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f00000002c0)) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000080)='./file0\x00', r1, r2) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(seed)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="66d64e6b6a78b446b90250e5e7f23bb6b5c279750210afbb334cc831e1614e8d", 0x20}], 0x1, &(0x7f0000000340)}, 0x0) recvmsg(r3, &(0x7f0000000180)={&(0x7f0000000240)=@hci, 0x80, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x75}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/20 06:30:49 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000b21000/0x3000)=nil, 0x3000) munlockall() 2018/04/20 06:30:49 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x420180, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000080)={r1}) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x6, 0x10000, 0x3, "2669d412617b58f2122f147e300cb8eee7a329cbb4128add61be029a2808bcf9c4b37e13a6530f9445d276d26874ca54c116482ae51edc71ad8f0bb8dd4a0d", 0x25}, 0x60) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000002ffc), &(0x7f0000004ffc)=0x2c6) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x400) 2018/04/20 06:30:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) eventfd2(0x4, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={"000000803000", r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000080)={{0x6c, @multicast1=0xe0000001, 0x4e22, 0x0, 'nq\x00', 0x12, 0x651, 0x2c}, {@rand_addr=0x6, 0x4e21, 0x3, 0x401, 0x5, 0x3}}, 0x44) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f00005b3000)="0000000000a700091504df815b00000000007f0000da008711c515000000038abd", 0x21) 2018/04/20 06:30:49 executing program 3: r0 = socket$nl_generic(0xa, 0x2, 0x11) r1 = dup(r0) fcntl$setflags(r1, 0x2, 0x1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x8, 0x30, 0x0, 0x1}, &(0x7f0000000040)=0x18) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000140)={'veth1_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=r2, @ANYBLOB="0900830041031b43d556d5b12b824ee63304f3475c4903a4b7a22b20653c263488099e4be185e88ecc8e429e1e321dd8da59a2311540ac45537e74575332ffad595c004da81f0a7e9e86bdc337146c767577587fd83538e42929772ff4567dbe6d4636d086f5cfae31a864c9171ad3208f2d87fe04993a448bb3d726001878a9d3ea319a000000"], 0x8b) 2018/04/20 06:30:49 executing program 4: mkdir(&(0x7f000091a000)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00004f5ff8)='./file0\x00', &(0x7f00000e1000)='ramfs\x00', 0x8409, &(0x7f0000c81ffe)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x3c9100, 0x0) r0 = memfd_create(&(0x7f0000000080)='@\x00', 0x2) r1 = openat(r0, &(0x7f0000012ff8)='./file0\x00', 0x0, 0x0) fchmod(r1, 0x0) 2018/04/20 06:30:49 executing program 6: socketpair(0x8000000000001e, 0x80009, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) sendmmsg$unix(r0, &(0x7f00000001c0), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) getrusage(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{r2, r3/1000+10000}, {r4, r5/1000+30000}}) 2018/04/20 06:30:49 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000b21000/0x3000)=nil, 0x3000) munlockall() 2018/04/20 06:30:49 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xb16, 0x100) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000040)={{0x7f, 0x9354, 0x9, 0x3, 0x9, 0x1000}, 0x8}) move_pages(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000fee000/0xf000)=nil], &(0x7f0000000100), &(0x7f0000000140), 0x0) 2018/04/20 06:30:49 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='nsfs\x00', 0x2080000, &(0x7f0000000540)="7dc9bba734497a120efbd30f68677fb04c3a384be788a7e7c7242527c8c9bf0d0f0d42f86f62762f6316399b2265b626a136745e0899a37a3684f9a35d43bac43f67f4bdea9a00c113") mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000240)='bdev\x00', 0x100000, &(0x7f0000000400)="2b803dfcf31532504e6c340ebe1a2f3ae48b7e54cbb11699dc77faf0358a0680575b8e3aafc7ac4ea19a3bb3f2e5a05439b01b022318c35fa8ef042068dedbf5003768d68c2f52e0fb1e9426d08bfb733ade3012f8c48f51f08c0c3c5ce98c6e1e86e8c7cca465a50336c4ce4d8ae9ccfc4e2bb46c91d9342d3ea77eec3113803281c66db28fbfce1c10fcebce5be663c9ce0cdf6615d1aef48168a500b8") mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f00000003c0)='./file1\x00', &(0x7f00000002c0)='ufs\x00', 0x8, &(0x7f0000000380)="f468385ee2") r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x14}, 0x7}}, 0x0, 0x40, 0x4, "bf97aebd8f1a2940f33be370743e5d14b4807edeeaec8fb49486bc546ce6666e7adc051d4a7b73acf2a8294ad3625dd4efcb978ec13581a3d5c02a854c75c23fa612a08bcfed5c3c7481bd709f6ae5af"}, 0xd8) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000300)) rmdir(&(0x7f00000005c0)='./file0\x00') 2018/04/20 06:30:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x7ff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000100)=""/161}, 0x18) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x4, [0x0, 0x8, 0x2, 0x6a]}, &(0x7f0000000080)=0xc) fcntl$setsig(r0, 0xa, 0x16) 2018/04/20 06:30:49 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() 2018/04/20 06:30:49 executing program 0: mkdir(&(0x7f000002a000)='./file0\x00', 0x0) mmap(&(0x7f000002a000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xe72b, 0x2, 0xff, 0x101, 0x3, 0x6, 0x101, 0x3d8, 0x38, 0x39a, 0xffffffffffffebc6, 0x3, 0x20, 0x2, 0x0, 0x6, 0x7e}, [{0x1, 0x80000000, 0x8, 0x1, 0x40, 0xfff, 0x8, 0x3}], "9ed03a8eaa94e6dda69b53c80b118f8bd502b352ea7f639c78120ed2398d5e2a8cc1bad85e12d768119ef217da5868935ec273e293d332392943b77ad86c82a701a86fc2d8c3d8dcad44a0d0d013f2ab19d752269775a6d280c2ca2d84eaea366ed1609c1e96771b79a4b6bddb406c7735366aca869d39bf022e0ccc817894b222ad2fa42d28f54296d16fd45086954e5c68cc240cdab65756bcc9b8f7db96e3ab7bb29bf04c75f1332e9f0405d2390f9de6101ac6d790c090fa14400901ea55d97dae9087ef5800d3f552c4a97dadbad166257e7d4f9e2f63279a14558a239b9f0c96f5e3973016787095f1abbff05869fae363", [[], []]}, 0x34c) r1 = openat(0xffffffffffffff9c, &(0x7f0000026000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000029fd4)=""/48, 0x30) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000400)) 2018/04/20 06:30:50 executing program 6: socketpair(0x8000000000001e, 0x80009, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) sendmmsg$unix(r0, &(0x7f00000001c0), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) getrusage(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{r2, r3/1000+10000}, {r4, r5/1000+30000}}) 2018/04/20 06:30:50 executing program 4: r0 = socket(0x2, 0x2, 0x0) r1 = msgget(0x2, 0x100) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000040)=""/231) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x12000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xb4, r2, 0x0, 0x70bd26, 0x25dfdbfe, {0xf}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x47}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x100000000}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x25e}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x89}]}, 0xb4}, 0x1}, 0x20000810) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="26000000800000000000000000000093b5000000000000000000000000000000000000000000000000000000a830b1debc30ce8ebce1751ad5d2add29202123f90c9cbb143b8a2a6e4689fb2563979e613638825ab57f5638e87933b9eb3b386fa974cd5cb598866144624bc6902abc35fb1e475508ea3cad19447d002df08d1ce837d469d7329605b5b78"]}) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000003c0)=0x1, 0x4) 2018/04/20 06:30:50 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80002, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)={r1, 0x6, 0xb60e0, "460d0e4bb91fde76112b9d3fe552c1ad9bd9959453050814089b38d92550a838da204546bd8eeb0808d97d4fe4b34904ef1403eabdfe24c8fcd08ca862eb53482b4a5173a6c7f73c166d5efb6364fd0b6b2c692daa8afc310192333951337f5a9ec0a9bb038887f495f594c3db1e1523b219733e394d274c5a9466a5a369254764"}) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) sendmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000240)}}], 0x2, 0x0) 2018/04/20 06:30:50 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x3e, &(0x7f0000000200)=ANY=[@ANYBLOB="c2040c88a861aaaa000000ff9078ac1414aaac1414aa0c00907800000000450000000000000000000000ac1414bb7f000001000000000000000000000000"], 0x0) 2018/04/20 06:30:50 executing program 5: munlockall() 2018/04/20 06:30:50 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='nsfs\x00', 0x2080000, &(0x7f0000000540)="7dc9bba734497a120efbd30f68677fb04c3a384be788a7e7c7242527c8c9bf0d0f0d42f86f62762f6316399b2265b626a136745e0899a37a3684f9a35d43bac43f67f4bdea9a00c113") mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000240)='bdev\x00', 0x100000, &(0x7f0000000400)="2b803dfcf31532504e6c340ebe1a2f3ae48b7e54cbb11699dc77faf0358a0680575b8e3aafc7ac4ea19a3bb3f2e5a05439b01b022318c35fa8ef042068dedbf5003768d68c2f52e0fb1e9426d08bfb733ade3012f8c48f51f08c0c3c5ce98c6e1e86e8c7cca465a50336c4ce4d8ae9ccfc4e2bb46c91d9342d3ea77eec3113803281c66db28fbfce1c10fcebce5be663c9ce0cdf6615d1aef48168a500b8") mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f00000003c0)='./file1\x00', &(0x7f00000002c0)='ufs\x00', 0x8, &(0x7f0000000380)="f468385ee2") r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x14}, 0x7}}, 0x0, 0x40, 0x4, "bf97aebd8f1a2940f33be370743e5d14b4807edeeaec8fb49486bc546ce6666e7adc051d4a7b73acf2a8294ad3625dd4efcb978ec13581a3d5c02a854c75c23fa612a08bcfed5c3c7481bd709f6ae5af"}, 0xd8) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000300)) rmdir(&(0x7f00000005c0)='./file0\x00') 2018/04/20 06:30:50 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000ea5000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x7, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x480000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, r2, 0x200, 0x70bd26, 0x25dfdbfe, {0xf}, [@IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5fe}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa97}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3b7fa7d5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x40040}, 0x40000) getsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000002c0)) 2018/04/20 06:30:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) mmap(&(0x7f0000431000/0x400000)=nil, 0x400000, 0x0, 0x32, 0xffffffffffffffff, 0x0) unshare(0x40604) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000499000)=""/35, &(0x7f000020a000)=0x23) 2018/04/20 06:30:50 executing program 5: munlockall() 2018/04/20 06:30:50 executing program 6: r0 = socket$inet(0x2, 0x805, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e23}], 0x20) setsockopt$inet_opts(r0, 0x0, 0x3, &(0x7f0000b5f000)="0702", 0xffffffd7) 2018/04/20 06:30:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) mmap(&(0x7f0000431000/0x400000)=nil, 0x400000, 0x0, 0x32, 0xffffffffffffffff, 0x0) unshare(0x40604) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000499000)=""/35, &(0x7f000020a000)=0x23) 2018/04/20 06:30:50 executing program 7: mkdir(&(0x7f00001c6000)='./file0\x00', 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0xa) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='debugfs\x00', 0x0, &(0x7f0000000180)="12a6cad85d6f1a609a09fef1172ad25ed22c28934b27e7066ae3e2c2457e5377ff2c2c") execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000080)='@vmnet1proc\x00', &(0x7f00000001c0)='vboxnet0\'@\'selfsecurityselinuxppp1wlan1vboxnet1(#^\x00', &(0x7f0000000280)='@vmnet1proc\x00', &(0x7f0000000240)='debugfs\x00', &(0x7f0000000680)='vboxnet0\'@\'selfsecurityselinuxppp1wlan1vboxnet1(#^\x00', &(0x7f00000002c0)='+[\x00', &(0x7f0000000300)="25942d73656c665d00", &(0x7f00000003c0)='!ð1}vbo\tne40\x00', &(0x7f0000000380)='vboxnet0\'@\'selfsecurityselinuxppp1wlan1vboxnet1(#^\x00', &(0x7f0000000400)='^^\x00'], &(0x7f0000000580)=[&(0x7f00000004c0)='debugfs\x00', &(0x7f0000000640)='debugf3\x00', &(0x7f0000000540)="6d643573756d85706f7369785f61636c5f6163636573731c6c6f6d696d655f7479706540706f7369785f61636c5f616363657373776c616e3000"]) 2018/04/20 06:30:50 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='auxv\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={0x0, 0xbe65, 0x4, 0x1a}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r2, 0x5bde, 0x10}, &(0x7f0000000200)=0xc) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000040)={"7365637572697479000000000000000000000000001000"}, &(0x7f00000000c0)=0x54) close(r0) 2018/04/20 06:30:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) rt_sigaction(0x40, &(0x7f0000000000), 0x0, 0x8, &(0x7f0000000040)) 2018/04/20 06:30:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x30000, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000340)) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des3_ede-asm)\x00'}, 0x58) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) syncfs(r2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d556b6c5820faeb895298992ea54d60004002c5b534c90c2", 0x18) 2018/04/20 06:30:50 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000ea5000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x7, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x480000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, r2, 0x200, 0x70bd26, 0x25dfdbfe, {0xf}, [@IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5fe}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa97}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3b7fa7d5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x40040}, 0x40000) getsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000002c0)) 2018/04/20 06:30:50 executing program 5: munlockall() 2018/04/20 06:30:51 executing program 6: clone(0x4392400, &(0x7f0000a02000), &(0x7f000034bffc), &(0x7f00007df000), &(0x7f0000a82000)) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) accept4$alg(r0, 0x0, 0x0, 0x80800) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x5, 0x4000) 2018/04/20 06:30:51 executing program 0: mmap(&(0x7f0000000000/0x4cc000)=nil, 0x4cc000, 0x0, 0x65031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x9, &(0x7f0000001800)=[{&(0x7f0000000080)="cef3f93da0e16e37b97e7dbfd828f16fb6c04c67325e1a88de40854f1311d4832ce53412c6824c5e753fe9542c062710d61dc075dd68f8403fbfe710212f680514c36f89a295590680ffe484931d3b799664014cca71e9d04f240406b6cf84e038aec5849f40ec5c59ae700e25c9d9beb5d09918c3f7fed8ac1ea3d3f848f593bc0664655235b7a878abeb9ff30c9b8be55bc305486f56d9acd5877ecf3d4ba3ef82f9b67c34be5bd722c7b72855b655cb638709e258099ee54632365e87ebf3e9fc2cd2b1fedf345cf54dcdc4880f4f4370d9c8df0ccf4583311070c131b18549c689b82f64", 0xe6, 0x2000001}, {&(0x7f0000000180)="fcc9787bd8175cf616791f8888860c93c10f75ef69114dc24c3bfa46aa24a46fc6bb3cf7eb9a226403e1318df83d38877b1ac1d5039a9fb2cf1b61d38d2c87b35bb56f84b9283042ca4309d90d1ca06a2820a5f84a65c7545bba0e949307caf99fac056bb967adefec3e0e6b15533972e3bea9fc336fc21324338387c267fe5c6f4a2d46541b4198b6d8693014d386dc91cdca812e78a95cf1a0a542797ceeb7c5a462cce6e39ed90c25b67973a630d689297a6dec8279597d63e9fb9069b1c7ea4673810dba0997ef3c37ed68a4a43f4bdb7863856f90b0ff25efda0eb996b9", 0x51, 0xfffffffffffffffa}, {&(0x7f0000001900)="078908559bfd7b86fbf133480242e6814ff8b03044005815ec29", 0x1a, 0x8}, {&(0x7f00000002c0)="60263ed03ffde48836e2a9d0cf9796648d6048eff4edbdb38409cb52a3f529699f4c4f174c14db4d3089417ce1db15e88e9d617b9e21e1be792e93625a488de17db9951959a123eae9f777d484bcb966fc627b1a37ae23744430e905c854827674ad895c47216fa5bed86310ad0b42af1a283dab0a74e92f9de9ef4393d35fb3a44ed05b76c8ea9213129bd52d60bd80d6f5713fbc61c848b6126d44cd5a2b882d081b0237df6ffd28b3e3b8dda19eefed86c5e9e0e402618d0fe62daa768f566d406f652b3779572bc3f4c5a211d1edce44cb6634381f947067966f27ab", 0xde, 0x9}, {&(0x7f00000003c0)="99909bd8b2ca08249a2e331e8854a7fdfd9bf8b18c8f01c040a05a24735b3d40b0cd47e9b4df35fe3319e7c4e4a99695aaebd36c070520f574be1a8f1b0a95074bcc10856aac5f81a86f58b17281a458b5315a0d838e112c6fcbd841ba409b40b0fb162e8b3eb6a3b19eb867a95cc5645fddd3335aaa292859ce83421e2cc66ec4aa282c5540fa6180a06cde6c8a26a9e4cfa87c387fe7d800171d8f71666338f1b4988d9f63a42b3b7e6d8117a72f01e96f0523198f2c5caa30fa5c33a510d3124a8d4ffb12c8ddc886825ccbf74b24dc44fb106850d388b1270666", 0xdc, 0x80}, {&(0x7f0000001a40)="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", 0xcd, 0x4}, {&(0x7f0000001940)="ff74c95fea3bacc189a30c59ef1b9163b1196497f7bfaec04881163b35058c1c51e74afcf70a555492464ceab9e8cc60800000d6208f82f44b4867a489b64a704fbff716828b15b5f546bcd49ec464e4aefe7f575688733134b0b63f56315e247f1fe104f37a87f7b8207cab8cd598fc747444b894634163d43143d8a5f6507edddb1d7df1396ce5ad2b347b9f3ab403abc13c0d69a5e9c841b8b0cfc6eccb61733ea755b6cbfde7df5c8f8c247fcdda2106194b673d0870a42f2b767780c80f7a95db544d6712b496fcb4b422a385346ce2a0799ded342ac8ee9f4f4f15e3a64fb070a8a1c791d22b202196a78e3f0bafdd02048b187c", 0xf7}, {&(0x7f0000000700)="e38ded1903167661c2247dd8f135b06d1035f9efb7da7f4e1a386e68886c06c85995a23b0daf5c7c8dcf1457a518cda06617a66b948c56baecc81292fd6f01ff5072d7769e2d31094701102067773fb49945b9bc809ca7b524851c84f2aa6314127a4698309d29698131fe3962eec82239d0a46198b1834887f2bae500e1f444ed5b75abce2c792e2abb179f654cdfed2df1c18edff9dc8afb9947447f3d053a69f93bec05a23ed0ebc6abd3fd1c8d13dda820ae9b7aabfcdda415e0491e1033d1b33b17", 0xc4, 0x7}, {&(0x7f0000000800)="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", 0x1000, 0x493}], 0x800, 0x0) write(r0, &(0x7f00000005c0)='&', 0x1) 2018/04/20 06:30:51 executing program 7: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) r1 = socket$netlink(0x10, 0x3, 0x15) socketpair(0x0, 0x0, 0x401, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f00000000c0)={r3, 0x2}) writev(r1, &(0x7f0000000040)=[{&(0x7f00001da000)="390000001100094701bb61e1c3050000070000000200000045efffff08009b0019001a000f000000030000000000000004e9000206002d0005", 0x39}], 0x1) 2018/04/20 06:30:51 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net\x00', 0x200002, 0x0) poll(&(0x7f0000000000)=[{r0, 0x280}, {r0, 0x80}, {r0, 0x400}, {r0, 0x8a}, {r0, 0x110}, {r0, 0x8}], 0x6, 0x1) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(r1, r0, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000680)="ee", 0x1}], 0x1, 0x0) fdatasync(r0) pwritev(r0, &(0x7f0000000b40)=[{&(0x7f0000000100)='\'', 0x1}], 0x1, 0x10000) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) 2018/04/20 06:30:51 executing program 4: r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000001000)={0xffffffff, 0x0, 0x1, 0x9}, 0x10) 2018/04/20 06:30:51 executing program 5: munlockall() 2018/04/20 06:30:51 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200001) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 2018/04/20 06:30:51 executing program 3 (fault-call:1 fault-nth:0): mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() 2018/04/20 06:30:51 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x1c1040) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) 2018/04/20 06:30:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) get_robust_list(r1, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f0000000080), 0x0, &(0x7f0000000140)={&(0x7f00000000c0)}}, &(0x7f0000000200)=0x18) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(arc4)\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3", 0x1) sendmmsg$alg(r2, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write(r2, &(0x7f0000000340)='y', 0x1) recvmsg(r2, &(0x7f0000158000)={&(0x7f00002fffa0)=@nfc_llcp, 0x5c, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/20 06:30:51 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KDGKBLED(r0, 0x4004510d, &(0x7f000084dfff)) fstat(0xffffffffffffffff, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x0, @multicast1=0xe0000001}}, 0x0, 0x3}, &(0x7f00000001c0)=0x98) 2018/04/20 06:30:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000925fe4)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffffffffffff0004) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180)=0x6, 0x4) socketpair(0xa, 0x0, 0x1000, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0xc1, "a13ee710ee60e1a3ef870a0d12b5df8a6ae230ae4d3ca794f79f84044b0fa208615e341c4d8e8f1417db253ead37a7ffdf88a8494a445623064fa4c1c671e46f72ec562517d81c556876a928603ee737de514d3a56684c3b27d6b83c699a282ed9ce3ed3a79d415865ef7f5a9fd2203a6d81515e62206051895fa08d6d81dc9254ad2b9c10fab0c90ec9884d5671fbe458f05bf4e7d6bcc89c1dca1559dbcbd8c38f60294fee66d57f16a89008694daff2711424809d0f0218625c715651dda403"}, &(0x7f0000000140)=0xc9) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000003c0)=[@in={0x2, 0x4e21, @broadcast=0xffffffff}, @in6={0xa, 0x4e20, 0x8001, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, @in6={0xa, 0x4e22, 0x7fff, @empty, 0x80000000}, @in={0x2, 0x4e22}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}, @in={0x2, 0x4e23}, @in={0x2, 0x4e23, @multicast2=0xe0000002}], 0x88) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000340)={r2, 0x4d2a}, &(0x7f0000000380)=0xc) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e24, @multicast2=0xe0000002}, 0x10) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x101000, 0x0) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f0000000200)={0x6, 0x8000}) r4 = socket$inet_sctp(0x2, 0x8000000000005, 0x84) connect$inet(r4, &(0x7f0000867ff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000ff3ff8)=ANY=[@ANYBLOB="1600df00", @ANYRES32=0x0], &(0x7f0000c77ffc)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000000)={r5}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000100)={r6, 0x4, 0xb282, 0x9, 0x2, 0xfffffffffffffff7}, 0x14) 2018/04/20 06:30:51 executing program 6: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=@srh={0x0, 0x0, 0x4}, 0xfffffffffffffeee) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c2d000), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x1, 0x1, [{{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}]}, 0x110) accept4$nfc_llcp(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x60, 0x80000) 2018/04/20 06:30:51 executing program 1: r0 = socket$inet6(0xa, 0x800, 0x1) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000b03000)={0x3, 0x4}, 0xb) sendto$inet6(r0, &(0x7f00008c4fac)='g', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvmsg(r0, &(0x7f0000c37fc8)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000245fa0), 0x259, &(0x7f0000978f69)=""/151, 0x6d}, 0x0) 2018/04/20 06:30:51 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) r4 = socket$inet(0x2, 0x0, 0x85) setsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}, 0x1}, 0x1c) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x6dd12e23b0a5f0bf, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f00002c9000)=ANY=[@ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x8) 2018/04/20 06:30:51 executing program 6: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00002ac000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x86080, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000180)=""/199) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000280)=0x533, 0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x301000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1ff, {{0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}}}}, 0x88) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000000)) 2018/04/20 06:30:51 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x8}}, 0x0, 0x7}, &(0x7f0000000480)=0x90) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x140, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f00000001c0)=""/128) 2018/04/20 06:30:51 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/04/20 06:30:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000925fe4)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffffffffffff0004) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180)=0x6, 0x4) socketpair(0xa, 0x0, 0x1000, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0xc1, "a13ee710ee60e1a3ef870a0d12b5df8a6ae230ae4d3ca794f79f84044b0fa208615e341c4d8e8f1417db253ead37a7ffdf88a8494a445623064fa4c1c671e46f72ec562517d81c556876a928603ee737de514d3a56684c3b27d6b83c699a282ed9ce3ed3a79d415865ef7f5a9fd2203a6d81515e62206051895fa08d6d81dc9254ad2b9c10fab0c90ec9884d5671fbe458f05bf4e7d6bcc89c1dca1559dbcbd8c38f60294fee66d57f16a89008694daff2711424809d0f0218625c715651dda403"}, &(0x7f0000000140)=0xc9) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000003c0)=[@in={0x2, 0x4e21, @broadcast=0xffffffff}, @in6={0xa, 0x4e20, 0x8001, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, @in6={0xa, 0x4e22, 0x7fff, @empty, 0x80000000}, @in={0x2, 0x4e22}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}, @in={0x2, 0x4e23}, @in={0x2, 0x4e23, @multicast2=0xe0000002}], 0x88) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000340)={r2, 0x4d2a}, &(0x7f0000000380)=0xc) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e24, @multicast2=0xe0000002}, 0x10) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x101000, 0x0) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f0000000200)={0x6, 0x8000}) r4 = socket$inet_sctp(0x2, 0x8000000000005, 0x84) connect$inet(r4, &(0x7f0000867ff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000ff3ff8)=ANY=[@ANYBLOB="1600df00", @ANYRES32=0x0], &(0x7f0000c77ffc)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000000)={r5}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000100)={r6, 0x4, 0xb282, 0x9, 0x2, 0xfffffffffffffff7}, 0x14) 2018/04/20 06:30:51 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x5) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x6, 0x4) connect$rds(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast2=0xe0000002}, 0x10) r1 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f00000000c0)=@known='security.capability\x00') 2018/04/20 06:30:51 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net\x00', 0x200002, 0x0) poll(&(0x7f0000000000)=[{r0, 0x280}, {r0, 0x80}, {r0, 0x400}, {r0, 0x8a}, {r0, 0x110}, {r0, 0x8}], 0x6, 0x1) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(r1, r0, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000680)="ee", 0x1}], 0x1, 0x0) fdatasync(r0) pwritev(r0, &(0x7f0000000b40)=[{&(0x7f0000000100)='\'', 0x1}], 0x1, 0x10000) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) 2018/04/20 06:30:51 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) exit(0x6) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) r4 = semget$private(0x0, 0x1, 0x1) semctl$SEM_STAT(r4, 0x1, 0x12, &(0x7f0000000200)=""/247) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@loopback, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r5 = semget$private(0x0, 0x7, 0x32) semctl$IPC_RMID(r5, 0x0, 0x0) r6 = dup2(r2, r3) fcntl$setown(r6, 0x8, r1) setsockopt$netrom_NETROM_T1(r6, 0x103, 0x1, &(0x7f0000000300)=0x4, 0x4) ioctl$int_out(r2, 0x0, &(0x7f0000000000)) tkill(r1, 0x16) getpeername$unix(r6, &(0x7f0000000340), &(0x7f00000003c0)=0x6e) socket$inet_icmp_raw(0x2, 0x3, 0x1) 2018/04/20 06:30:51 executing program 5: r0 = socket$nl_generic(0x2, 0x2, 0x88) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x3, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="e268840d3ab01b2dafe85b3873e4e3f1996660b2975c49b19421fcefd68fa4d4574fa6320dae7ee00c6a63a79bbe64227973d5192249d56cb42cd781565efa010b36a13a46ed3c7f9329c3981a225331483bddc58eb72e79a9b6ac9bf030163b7bbe407f8545196034188c80431b7247f886f3f75b8b66c67de0e28c88d5946192362a7f64f9b4fa3cc37429d8d9d000a88490722febe5830dc315954c1c4e717ae0adf3ee7e209a593e7e1cb05d76e2cbec2c43b6e348e5044d914e74c3589aa1aac88f2f43e2cc90c76487260e06901ab8cd3463ad246c8d4f525ec0f2dc3281f15d3a1a321a36e30875b774bcdc250c89f2", 0xf3, 0x8001}, {&(0x7f0000000380)="4c8e85a0c287d4501ac638c29dff5de836aa8c2c7057b3d3a90a5dbe909b97351a9577b041fb916adda2cc76aebd0d9d8dd474db88510f4d903269981cac21106360996db206b4e140b05d86cd35154a860cd88bbaeaa892fe95641fbce4e184a5abf823297e", 0x66}], 0x2002, &(0x7f0000000440)={[{@space_cache_v1='space_cache=v1', 0x2c}]}) recvmmsg(r0, &(0x7f0000007900)=[{{0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000007c0)}, {&(0x7f0000000800)=""/251, 0xfb}, {&(0x7f0000000900)=""/174, 0xae}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/75, 0x4b}], 0x5, &(0x7f0000001ac0)=""/223, 0xdf, 0x1}, 0x1000}, {{&(0x7f0000001bc0)=@hci, 0x80, &(0x7f0000001c40), 0x0, &(0x7f0000001c80)=""/179, 0xb3, 0x5}, 0x7fffffff}, {{&(0x7f0000001d40)=@can, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001dc0)=""/117, 0x75}], 0x1, 0x0, 0x0, 0x81}}, {{&(0x7f0000001e80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000033c0)=[{&(0x7f0000001f00)=""/231, 0xe7}, {&(0x7f0000002000)=""/151, 0x97}, {&(0x7f00000020c0)=""/253, 0xfd}, {&(0x7f00000021c0)=""/124, 0x7c}, {&(0x7f0000002240)=""/11, 0xb}, {&(0x7f0000002280)=""/171, 0xab}, {&(0x7f0000002340)=""/75, 0x4b}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x8, &(0x7f0000003440)=""/4096, 0x1000, 0x1f}, 0x1}, {{&(0x7f0000004440)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000004900)=[{&(0x7f00000044c0)=""/198, 0xc6}, {&(0x7f00000045c0)=""/223, 0xdf}, {&(0x7f00000046c0)=""/58, 0x3a}, {&(0x7f0000004700)=""/168, 0xa8}, {&(0x7f00000047c0)=""/148, 0x94}, {&(0x7f0000004880)=""/107, 0x6b}], 0x6, &(0x7f0000004980)=""/182, 0xb6, 0x6c}, 0x9}, {{&(0x7f0000004a40)=@in={0x0, 0x0, @rand_addr}, 0x80, &(0x7f0000005d80)=[{&(0x7f0000004ac0)=""/4096, 0x1000}, {&(0x7f0000005ac0)=""/197, 0xc5}, {&(0x7f0000005bc0)=""/28, 0x1c}, {&(0x7f0000005c00)=""/25, 0x19}, {&(0x7f0000005c40)=""/166, 0xa6}, {&(0x7f0000005d00)=""/78, 0x4e}], 0x6, &(0x7f0000005e00)=""/149, 0x95}, 0x3ff}, {{&(0x7f0000005ec0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000006040)=[{&(0x7f0000005f40)=""/233, 0xe9}], 0x1, &(0x7f0000006080)=""/222, 0xde, 0x3}, 0x2}, {{0x0, 0x0, &(0x7f0000006280)=[{&(0x7f0000006180)=""/103, 0x67}, {&(0x7f0000006200)=""/85, 0x55}], 0x2, &(0x7f00000062c0)=""/69, 0x45, 0x401}, 0xfffffffffffffff9}, {{&(0x7f0000006340)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000007800)=[{&(0x7f00000063c0)=""/232, 0xe8}, {&(0x7f00000064c0)=""/196, 0xc4}, {&(0x7f00000065c0)=""/83, 0x53}, {&(0x7f0000006640)=""/201, 0xc9}, {&(0x7f0000006740)=""/4096, 0x1000}, {&(0x7f0000007740)=""/75, 0x4b}, {&(0x7f00000077c0)=""/11, 0xb}], 0x7, &(0x7f0000007880)=""/124, 0x7c}}], 0x9, 0x0, &(0x7f0000007b40)={0x0, 0x1c9c380}) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000007b80)) r4 = syz_open_dev$mouse(&(0x7f0000000480)='/dev/input/mouse#\x00', 0x4, 0x8000) listen$netrom(r4, 0x7ff) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa080}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="04062abd7000fcdbdf2508000000080005000500000008000400ce0900002c000100080004004e2000000c00070014000000120000001400030000000000000000000000000000000000340002000800040008000000080006000100000008000500ffffffff080003000100000008000b000a000000080002004e220000080006000000008008000400010000000c00010008000900350000000800040005000000"], 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x4) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x88, 0xa, &(0x7f0000000000)=0x81, 0x2) delete_module(&(0x7f0000000080)='space_cache=v1', 0x200) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000004c0)=0x0) open(&(0x7f0000000580)='./file0\x00', 0x800, 0x100) sched_setaffinity(r5, 0x8, &(0x7f0000000500)=0x1) fchdir(r2) 2018/04/20 06:30:51 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) r4 = socket$inet(0x2, 0x0, 0x85) setsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:52 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.cpus\x00', 0x2, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7ea, 0x133000) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0x566e, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) write$cgroup_int(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="37090ad9"], 0x4) [ 75.075372] QAT: Invalid ioctl 2018/04/20 06:30:52 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002fe8)={0xaa}) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/59, 0x3b}], 0x1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000fe0)={{&(0x7f0000013000/0xe000)=nil, 0xe000}, 0x1}) pselect6(0x40, &(0x7f0000011fc0), &(0x7f0000011000), &(0x7f0000003000), &(0x7f0000013000), &(0x7f0000001ff8)={&(0x7f0000012000), 0x8}) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f00000c0ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) preadv(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/127, 0x7f}, {&(0x7f0000000100)=""/188, 0xbc}, {&(0x7f00000001c0)=""/236, 0xec}], 0x3, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000040)=0x7fff) [ 75.119165] QAT: Invalid ioctl [ 75.150197] QAT: Invalid ioctl [ 75.263742] QAT: Invalid ioctl [ 75.270502] QAT: Invalid ioctl [ 75.278283] QAT: Invalid ioctl 2018/04/20 06:30:53 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) r4 = socket$inet(0x2, 0x0, 0x85) setsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:53 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/04/20 06:30:53 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x8}}, 0x0, 0x7}, &(0x7f0000000480)=0x90) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x140, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f00000001c0)=""/128) 2018/04/20 06:30:53 executing program 1: getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000240)=0x4) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80101, 0x40) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000300)=0x7) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x5, 0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000280)={0x6c, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e20, 0xd43e, 'none\x00', 0x2, 0x3f, 0x77}, 0x2c) keyctl$read(0xa, 0x0, &(0x7f0000000100)=""/202, 0xfffffffffffffd68) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0), &(0x7f00000002c0)=0x4) 2018/04/20 06:30:53 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3de, 0x420c00) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0x5) r1 = memfd_create(&(0x7f00000001c0)='/\x00', 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x9, 0x2, 0xfffffffffffffff7, 0x305, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x2269, 0x401, 0x0, 0x8, 0x40}, &(0x7f0000000180)=0x98) 2018/04/20 06:30:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00006f0fc8)={&(0x7f0000c16ff4)={0x10}, 0xc, &(0x7f0000e83ff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x19, 0x27, 0x0, 0x0, {{@in6, @in=@local={0xac, 0x14, 0x14, 0xaa}}}}, 0xb8}, 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000000080)=@nfc={0x27}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000000)=[{0x18, 0x1, 0x1, "03"}], 0x18}}], 0x2, 0x0) 2018/04/20 06:30:53 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) exit(0x6) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) r4 = semget$private(0x0, 0x1, 0x1) semctl$SEM_STAT(r4, 0x1, 0x12, &(0x7f0000000200)=""/247) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@loopback, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r5 = semget$private(0x0, 0x7, 0x32) semctl$IPC_RMID(r5, 0x0, 0x0) r6 = dup2(r2, r3) fcntl$setown(r6, 0x8, r1) setsockopt$netrom_NETROM_T1(r6, 0x103, 0x1, &(0x7f0000000300)=0x4, 0x4) ioctl$int_out(r2, 0x0, &(0x7f0000000000)) tkill(r1, 0x16) getpeername$unix(r6, &(0x7f0000000340), &(0x7f00000003c0)=0x6e) socket$inet_icmp_raw(0x2, 0x3, 0x1) 2018/04/20 06:30:53 executing program 5: r0 = socket$nl_generic(0x2, 0x2, 0x88) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x3, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="e268840d3ab01b2dafe85b3873e4e3f1996660b2975c49b19421fcefd68fa4d4574fa6320dae7ee00c6a63a79bbe64227973d5192249d56cb42cd781565efa010b36a13a46ed3c7f9329c3981a225331483bddc58eb72e79a9b6ac9bf030163b7bbe407f8545196034188c80431b7247f886f3f75b8b66c67de0e28c88d5946192362a7f64f9b4fa3cc37429d8d9d000a88490722febe5830dc315954c1c4e717ae0adf3ee7e209a593e7e1cb05d76e2cbec2c43b6e348e5044d914e74c3589aa1aac88f2f43e2cc90c76487260e06901ab8cd3463ad246c8d4f525ec0f2dc3281f15d3a1a321a36e30875b774bcdc250c89f2", 0xf3, 0x8001}, {&(0x7f0000000380)="4c8e85a0c287d4501ac638c29dff5de836aa8c2c7057b3d3a90a5dbe909b97351a9577b041fb916adda2cc76aebd0d9d8dd474db88510f4d903269981cac21106360996db206b4e140b05d86cd35154a860cd88bbaeaa892fe95641fbce4e184a5abf823297e", 0x66}], 0x2002, &(0x7f0000000440)={[{@space_cache_v1='space_cache=v1', 0x2c}]}) recvmmsg(r0, &(0x7f0000007900)=[{{0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000007c0)}, {&(0x7f0000000800)=""/251, 0xfb}, {&(0x7f0000000900)=""/174, 0xae}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/75, 0x4b}], 0x5, &(0x7f0000001ac0)=""/223, 0xdf, 0x1}, 0x1000}, {{&(0x7f0000001bc0)=@hci, 0x80, &(0x7f0000001c40), 0x0, &(0x7f0000001c80)=""/179, 0xb3, 0x5}, 0x7fffffff}, {{&(0x7f0000001d40)=@can, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001dc0)=""/117, 0x75}], 0x1, 0x0, 0x0, 0x81}}, {{&(0x7f0000001e80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000033c0)=[{&(0x7f0000001f00)=""/231, 0xe7}, {&(0x7f0000002000)=""/151, 0x97}, {&(0x7f00000020c0)=""/253, 0xfd}, {&(0x7f00000021c0)=""/124, 0x7c}, {&(0x7f0000002240)=""/11, 0xb}, {&(0x7f0000002280)=""/171, 0xab}, {&(0x7f0000002340)=""/75, 0x4b}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x8, &(0x7f0000003440)=""/4096, 0x1000, 0x1f}, 0x1}, {{&(0x7f0000004440)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000004900)=[{&(0x7f00000044c0)=""/198, 0xc6}, {&(0x7f00000045c0)=""/223, 0xdf}, {&(0x7f00000046c0)=""/58, 0x3a}, {&(0x7f0000004700)=""/168, 0xa8}, {&(0x7f00000047c0)=""/148, 0x94}, {&(0x7f0000004880)=""/107, 0x6b}], 0x6, &(0x7f0000004980)=""/182, 0xb6, 0x6c}, 0x9}, {{&(0x7f0000004a40)=@in={0x0, 0x0, @rand_addr}, 0x80, &(0x7f0000005d80)=[{&(0x7f0000004ac0)=""/4096, 0x1000}, {&(0x7f0000005ac0)=""/197, 0xc5}, {&(0x7f0000005bc0)=""/28, 0x1c}, {&(0x7f0000005c00)=""/25, 0x19}, {&(0x7f0000005c40)=""/166, 0xa6}, {&(0x7f0000005d00)=""/78, 0x4e}], 0x6, &(0x7f0000005e00)=""/149, 0x95}, 0x3ff}, {{&(0x7f0000005ec0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000006040)=[{&(0x7f0000005f40)=""/233, 0xe9}], 0x1, &(0x7f0000006080)=""/222, 0xde, 0x3}, 0x2}, {{0x0, 0x0, &(0x7f0000006280)=[{&(0x7f0000006180)=""/103, 0x67}, {&(0x7f0000006200)=""/85, 0x55}], 0x2, &(0x7f00000062c0)=""/69, 0x45, 0x401}, 0xfffffffffffffff9}, {{&(0x7f0000006340)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000007800)=[{&(0x7f00000063c0)=""/232, 0xe8}, {&(0x7f00000064c0)=""/196, 0xc4}, {&(0x7f00000065c0)=""/83, 0x53}, {&(0x7f0000006640)=""/201, 0xc9}, {&(0x7f0000006740)=""/4096, 0x1000}, {&(0x7f0000007740)=""/75, 0x4b}, {&(0x7f00000077c0)=""/11, 0xb}], 0x7, &(0x7f0000007880)=""/124, 0x7c}}], 0x9, 0x0, &(0x7f0000007b40)={0x0, 0x1c9c380}) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000007b80)) r4 = syz_open_dev$mouse(&(0x7f0000000480)='/dev/input/mouse#\x00', 0x4, 0x8000) listen$netrom(r4, 0x7ff) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa080}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="04062abd7000fcdbdf2508000000080005000500000008000400ce0900002c000100080004004e2000000c00070014000000120000001400030000000000000000000000000000000000340002000800040008000000080006000100000008000500ffffffff080003000100000008000b000a000000080002004e220000080006000000008008000400010000000c00010008000900350000000800040005000000"], 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x4) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x88, 0xa, &(0x7f0000000000)=0x81, 0x2) delete_module(&(0x7f0000000080)='space_cache=v1', 0x200) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000004c0)=0x0) open(&(0x7f0000000580)='./file0\x00', 0x800, 0x100) sched_setaffinity(r5, 0x8, &(0x7f0000000500)=0x1) fchdir(r2) 2018/04/20 06:30:53 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() socket$kcm(0x29, 0x2, 0x0) 2018/04/20 06:30:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) exit(0x6) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) r4 = semget$private(0x0, 0x1, 0x1) semctl$SEM_STAT(r4, 0x1, 0x12, &(0x7f0000000200)=""/247) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@loopback, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r5 = semget$private(0x0, 0x7, 0x32) semctl$IPC_RMID(r5, 0x0, 0x0) r6 = dup2(r2, r3) fcntl$setown(r6, 0x8, r1) setsockopt$netrom_NETROM_T1(r6, 0x103, 0x1, &(0x7f0000000300)=0x4, 0x4) ioctl$int_out(r2, 0x0, &(0x7f0000000000)) tkill(r1, 0x16) getpeername$unix(r6, &(0x7f0000000340), &(0x7f00000003c0)=0x6e) socket$inet_icmp_raw(0x2, 0x3, 0x1) 2018/04/20 06:30:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) exit(0x6) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) r4 = semget$private(0x0, 0x1, 0x1) semctl$SEM_STAT(r4, 0x1, 0x12, &(0x7f0000000200)=""/247) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@loopback, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r5 = semget$private(0x0, 0x7, 0x32) semctl$IPC_RMID(r5, 0x0, 0x0) r6 = dup2(r2, r3) fcntl$setown(r6, 0x8, r1) setsockopt$netrom_NETROM_T1(r6, 0x103, 0x1, &(0x7f0000000300)=0x4, 0x4) ioctl$int_out(r2, 0x0, &(0x7f0000000000)) tkill(r1, 0x16) getpeername$unix(r6, &(0x7f0000000340), &(0x7f00000003c0)=0x6e) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 76.514594] QAT: Invalid ioctl 2018/04/20 06:30:53 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) r4 = socket$inet(0x2, 0x0, 0x85) setsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) [ 76.536723] QAT: Invalid ioctl 2018/04/20 06:30:53 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 76.568540] QAT: Invalid ioctl 2018/04/20 06:30:53 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) fchownat(r0, &(0x7f0000000040)='./file0\x00', r1, r2, 0x900) 2018/04/20 06:30:53 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x8}}, 0x0, 0x7}, &(0x7f0000000480)=0x90) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x140, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f00000001c0)=""/128) [ 77.474585] QAT: Invalid ioctl [ 77.479180] QAT: Invalid ioctl [ 77.483538] QAT: Invalid ioctl 2018/04/20 06:30:54 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x80, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)="6367726d75702e70726f6373fc3a79bf2ff676dd1082e73ea0f46aeda28e12afba8ed478cdedd54cd0cce9aec600f8fffffff7ffffff4138f40a86554c734071", 0x2, 0x0) 2018/04/20 06:30:54 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) socket$inet(0x2, 0x0, 0x85) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:54 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/04/20 06:30:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$nl_generic(r0, &(0x7f0000004fc8)={&(0x7f000000aff4)={0x10}, 0xc, &(0x7f0000008000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2000000010000010f68eeff8c09a062321f717c0542951ac6873df31eff66545f7776f73", @ANYRES32], 0x20}, 0x1}, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="00e3db0586b43033119238d30d45ee8749df6a560429c47cd210e304ae4dc9583f0edbdb8f1fb00f2e145fac9fe3e0ae75b675693a25ce2a0d86f9dddba3a3b52729eef6d232b96b8ddb3a00ae3d0d", 0x4f, 0x10001}], 0x4000c, &(0x7f0000000180)={[{@fmask={'fmask', 0x3d, [0x30]}, 0x2c}, {@showexec='showexec', 0x2c}, {@gid={'gid', 0x3d, [0x36, 0x36]}, 0x2c}]}) 2018/04/20 06:30:54 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x8}}, 0x0, 0x7}, &(0x7f0000000480)=0x90) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x140, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f00000001c0)=""/128) 2018/04/20 06:30:54 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000040)=@in6={0xa, 0x4e21, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000800)}, 0x7ffffff7) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x440, 0x0) getpeername$ipx(r1, &(0x7f0000000100), &(0x7f0000000140)=0x10) 2018/04/20 06:30:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/psched\x00') mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000004, 0x10, r0, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000140)=0xb) sendfile(r2, r1, &(0x7f0000000100), 0x5) 2018/04/20 06:30:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x69, 0x1f, 0x6, 0x7, 0x3, 0x3, 0x6, 0x8, 0xdd, 0x38, 0xd2, 0x1, 0x81, 0x20, 0x2, 0x8, 0x7cb7, 0x1}, [{0x7, 0x7f, 0x4, 0x8, 0x10001, 0xff, 0x10000, 0x2}, {0x7, 0x1000, 0x5, 0x7, 0x20, 0xfffffffffffffffc, 0x4, 0x7f}], "43f75afd9b06556041da446010fa3009e2c946388f30d7601af8c9fdc4f3f86cdebbf02fe0a176e2998c3c6cea96d76e95b9446b1f274ffff5d77751be8d61b7219068dc084431a00ce6c5f9c0074b16305742889307bf02d035de01e6e4e6ef8adc6f49d11857eff2d062be189dda1d4f92417128e22c2bc4c910f1014fd9792d07f5d6d1a4905331ff89b34bf548c489b2462803a7634c4014b3bf282e5f6622", [[], [], [], [], []]}, 0x619) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) write$binfmt_aout(r0, &(0x7f0000000040)={{0x10f, 0x1000, 0x5, 0x1d7, 0x16d, 0x0, 0x183, 0xdc05}, "e0a2d4602dd3dad8e5a9de7e72db2d06e9d289151d6964323e640301cd77d928a0650b48c814da1fd64340f8ec16460fdc1385e0e256893429405988694dc0ca1f27e164a60bb8d5a31f22c7e34b354a0c5b308ad798b0c99c45ed3f8d245469d111582b8e003b0995c6c6408df30ff8a4684051fa3964be65a3524cbfa155c318da14790af2630b0bd153fa9b31fcf29e0767869f0c1bf7f0e349b4ad364f8604737d18045394c34655f1deba40810b4e041fe7d14501aa7a236416c156d30b69bd1fa839fdb49318cf2985", [[], [], []]}, 0x3ec) 2018/04/20 06:30:54 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) fchownat(r0, &(0x7f0000000040)='./file0\x00', r1, r2, 0x900) 2018/04/20 06:30:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f000051d000)='ns/user\x00') setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f0000000000)=""/212, 0xd4}, &(0x7f0000000100), 0x9}, 0x20) ioctl$VT_RELDISP(r0, 0xb702) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000180)="c5768d1fbd361290decbec0be6e7cf3b", 0x10) 2018/04/20 06:30:54 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) 2018/04/20 06:30:54 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) munlockall() ioperm(0x5, 0x200, 0x3) 2018/04/20 06:30:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/psched\x00') mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000004, 0x10, r0, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000140)=0xb) sendfile(r2, r1, &(0x7f0000000100), 0x5) 2018/04/20 06:30:55 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:55 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) socket$inet(0x2, 0x0, 0x85) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:55 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) 2018/04/20 06:30:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="740000001100210100000000002608000001007eb7ab586ed158270558d563382b0d6700000000ff0014000d00000000000000000000000000000000000c00150000000000000000002c00135ffe800000000000008000000000000000000000000000aa0000000000000000000000000000000000"], 0x74}, 0x1}, 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x10) r1 = semget$private(0x0, 0x2, 0x20) semget$private(0x0, 0x7, 0x40) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000180)=""/62) semget(0x2, 0x0, 0x0) 2018/04/20 06:30:55 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1) 2018/04/20 06:30:55 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='proc\x00', 0x0, &(0x7f0000002980)) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) unshare(0x28060400) fstat(r0, &(0x7f0000000280)) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x30) [ 78.326141] netlink: 76 bytes leftover after parsing attributes in process `syz-executor5'. 2018/04/20 06:30:55 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) [ 78.410777] netlink: 76 bytes leftover after parsing attributes in process `syz-executor5'. [ 78.560789] QAT: Invalid ioctl [ 78.567769] QAT: Invalid ioctl [ 78.586956] QAT: Invalid ioctl 2018/04/20 06:30:55 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) socket$inet(0x2, 0x0, 0x85) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:55 executing program 5: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) 2018/04/20 06:30:55 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x8}}, 0x0, 0x7}, &(0x7f0000000480)=0x90) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x140, 0x0) 2018/04/20 06:30:55 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:55 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) 2018/04/20 06:30:55 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) 2018/04/20 06:30:55 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x403, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x401, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x20082, 0x121) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='net/ip_vs\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc\x00', 0x40000, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000000)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000300)=0x0) get_robust_list(r2, &(0x7f0000000100)=&(0x7f00000000c0)={&(0x7f0000000040), 0x0, &(0x7f0000000080)}, &(0x7f0000000140)=0x18) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$sock_void(r3, 0x1, 0x24, 0x0, 0x0) munlockall() r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0xc0100, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000200)={0x1, 0x8, 0x5a}) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f00000001c0)=@req3={0x7, 0x1, 0x8, 0xfffffffffffffffb, 0x1f, 0xfff, 0x7}, 0x1c) 2018/04/20 06:30:55 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='proc\x00', 0x0, &(0x7f0000002980)) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) unshare(0x28060400) fstat(r0, &(0x7f0000000280)) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x30) [ 78.827120] QAT: Invalid ioctl [ 78.873623] QAT: Invalid ioctl 2018/04/20 06:30:55 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) 2018/04/20 06:30:56 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:56 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) setrlimit(0xf, &(0x7f0000000080)={0x401, 0x7}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() modify_ldt$write2(0x11, &(0x7f0000000040)={0x6, 0x20000000, 0x400, 0x1, 0x3ff, 0x400, 0x100, 0xef98, 0x3, 0xfffffffffffff8e5}, 0x10) 2018/04/20 06:30:56 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:56 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) 2018/04/20 06:30:56 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) 2018/04/20 06:30:56 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) socket$inet(0x2, 0x0, 0x85) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:56 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() getresuid(&(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000100)) r0 = dup(0xffffffffffffffff) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000003c0)) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x100000001, 0x3, &(0x7f0000000280)=[{&(0x7f0000000180)="0a899922beff221cdfa4a47798626842fc61e4d28d72a44a0a2b2788a3ad69a83242f1b9dd83f02fe673ec963477b6283b5ffa683e6c87b22c3ac0c757affb7465db26315e9dd008cf5ec254f0c3861660dd2157e2011abfc09315d29c64c827", 0x60, 0x5}, {&(0x7f0000000200)="3cc98d6201436fedbdd43d7bf5a4a0be2af219caac5acb945091a7ee973c2c5b7adf2e8d8fc4a927b385ecafab9383a6252f4a6e59eb6d7b5b1b41080b8c9e45799f050740fcadad8efb852d84e65d9a24a07e0813db13", 0x57, 0x1}, {&(0x7f00000000c0)="a7cfd6d2111aeaf7867e935bbf3ca44ff69472be02bc7521623dfe487dd3f14020ca7168eb96ab851719d167111b69c8612e038201fa799d97b1317fe59b", 0x3e, 0x7fffffff}], 0x800, &(0x7f0000000300)={[{@whint_mode_fs='whint_mode=fs-based', 0x2c}, {@norecovery='norecovery', 0x2c}, {@reserved_root={'reserved_root', 0x3d, [0x7f, 0x37, 0x3f, 0x7c, 0x36, 0x33, 0x38, 0x7f, 0x36, 0x37]}, 0x2c}, {@jqfmt_vfsv0='jqfmt=vfsv0', 0x2c}, {@disable_roll_forward='disable_roll_forward', 0x2c}, {@flush_merge='flush_merge', 0x2c}, {@disable_ext_identify='disable_ext_identify', 0x2c}, {@reserved_root={'reserved_root', 0x3d, [0x38]}, 0x2c}]}) 2018/04/20 06:30:56 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) socket$inet6(0xa, 0x6, 0x0) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:56 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:56 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) 2018/04/20 06:30:56 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) 2018/04/20 06:30:56 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) 2018/04/20 06:30:56 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x8}}, 0x0, 0x7}, &(0x7f0000000480)=0x90) 2018/04/20 06:30:56 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) socket$inet(0x2, 0x0, 0x85) [ 79.562595] QAT: Invalid ioctl [ 79.566782] QAT: Invalid ioctl [ 79.570267] QAT: Invalid ioctl 2018/04/20 06:30:56 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:56 executing program 3: mlock2(&(0x7f0000a96000/0x3000)=nil, 0x3000, 0x1) munlockall() 2018/04/20 06:30:56 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:56 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) 2018/04/20 06:30:56 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) 2018/04/20 06:30:57 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) 2018/04/20 06:30:57 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) 2018/04/20 06:30:57 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @any=0xffffffff}, 0x10) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() 2018/04/20 06:30:57 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:57 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) [ 80.488292] QAT: Invalid ioctl [ 80.496252] QAT: Invalid ioctl [ 80.508439] QAT: Invalid ioctl 2018/04/20 06:30:57 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) 2018/04/20 06:30:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7, 0x10000) fcntl$setsig(r0, 0xa, 0x13) signalfd4(r0, &(0x7f0000000040)={0x100000000}, 0x8, 0x0) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x3) munlockall() 2018/04/20 06:30:57 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) 2018/04/20 06:30:57 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) 2018/04/20 06:30:57 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) 2018/04/20 06:30:57 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) 2018/04/20 06:30:57 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x8}}, 0x0, 0x7}, &(0x7f0000000480)=0x90) 2018/04/20 06:30:57 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:57 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) 2018/04/20 06:30:57 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:57 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) 2018/04/20 06:30:57 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000080)=0x1000, 0x4) mlock2(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x80000000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) munlockall() [ 80.872113] random: crng init done 2018/04/20 06:30:57 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:30:57 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() 2018/04/20 06:30:58 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) 2018/04/20 06:30:58 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:30:58 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:30:58 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x2, 0x4) 2018/04/20 06:30:58 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) [ 81.539188] QAT: Invalid ioctl [ 81.546124] QAT: Invalid ioctl [ 81.556712] QAT: Invalid ioctl 2018/04/20 06:30:58 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:58 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) 2018/04/20 06:30:58 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:30:58 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:30:58 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x101100, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() 2018/04/20 06:30:58 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x8}}, 0x0, 0x7}, &(0x7f0000000480)=0x90) 2018/04/20 06:30:58 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:30:58 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r4, 0x1, 0xfffffffffffffc1e}, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:30:59 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:30:59 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:30:59 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:30:59 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) 2018/04/20 06:30:59 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0xae501a11e536347f) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x4, 0x2, 0x401, 0x0}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={r1, 0x5, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={r1, 0x6, 0x8001}, &(0x7f00000000c0)=0x8) 2018/04/20 06:30:59 executing program 7: bind$inet6(0xffffffffffffffff, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0x40000000000005) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r1, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:59 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) 2018/04/20 06:30:59 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) [ 82.374160] QAT: Invalid ioctl [ 82.377800] QAT: Invalid ioctl [ 82.381803] QAT: Invalid ioctl 2018/04/20 06:30:59 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) socket$nl_route(0x10, 0x3, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:30:59 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f0000000140)=0x4) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r1, 0x3, 0xfffffffffffffffe}, 0xc) signalfd(r0, &(0x7f0000000100)={0x85}, 0xfffffffffffffff6) 2018/04/20 06:30:59 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) 2018/04/20 06:30:59 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:30:59 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:30:59 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:30:59 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/04/20 06:30:59 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) socket$nl_route(0x10, 0x3, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:30:59 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:30:59 executing program 3: mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xfffffffffffffffc) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x70) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2800201}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x128, r1, 0xa20, 0x70bd26, 0x25dfdbff, {0x11}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xb, 0x20}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x45}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xb7}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1a, 0x8}}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x4008000}, 0x1) munlockall() connect$llc(r0, &(0x7f0000000040)={0x1a, 0xfffe, 0xecf2, 0x6f, 0x9, 0xffffffffffffffc0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f00000002c0)=0x5, 0x4) 2018/04/20 06:30:59 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:30:59 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r4, 0x1, 0xfffffffffffffc1e}, 0x10) [ 83.294915] QAT: Invalid ioctl [ 83.302333] QAT: Invalid ioctl [ 83.308168] QAT: Invalid ioctl 2018/04/20 06:31:00 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) 2018/04/20 06:31:00 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:31:00 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) socket$nl_route(0x10, 0x3, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:00 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:00 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:00 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = dup(0xffffffffffffffff) getsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000000)={@multicast2, @dev, @loopback}, &(0x7f0000000040)=0xc) 2018/04/20 06:31:00 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) 2018/04/20 06:31:00 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) 2018/04/20 06:31:00 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x1, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, [], 0x16}, @loopback={0x0, 0x1}, @mcast1={0xff, 0x1, [], 0x1}, 0x400, 0x8, 0x2, 0x500, 0x4, 0x2010010, r1}) 2018/04/20 06:31:00 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) 2018/04/20 06:31:00 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0x40000000000005) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:00 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:00 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) socket$nl_route(0x10, 0x3, 0x0) 2018/04/20 06:31:00 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:31:00 executing program 6: bind$inet6(0xffffffffffffffff, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0x40000000000005) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 83.781301] QAT: Invalid ioctl [ 83.822672] QAT: Invalid ioctl [ 83.860724] QAT: Invalid ioctl [ 83.883351] QAT: Invalid ioctl 2018/04/20 06:31:01 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:01 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:31:01 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:01 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = creat(&(0x7f0000000000)='./file0\x00', 0x5) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000040)=""/136) 2018/04/20 06:31:01 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:01 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/20 06:31:01 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/20 06:31:01 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) [ 84.216568] QAT: Invalid ioctl [ 84.220723] QAT: Invalid ioctl [ 84.224600] QAT: Invalid ioctl 2018/04/20 06:31:01 executing program 3: mlock2(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0x1) munlockall() 2018/04/20 06:31:01 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:31:01 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) 2018/04/20 06:31:01 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) 2018/04/20 06:31:01 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:01 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:01 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:01 executing program 3: r0 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) r1 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x81, 0x200) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000002c0)={0x3, 0x0, &(0x7f0000000400)=""/121, &(0x7f0000000140)=""/164, &(0x7f0000000200)=""/174, 0x7000}) mlock2(&(0x7f0000a96000/0x3000)=nil, 0x3000, 0x3) getsockname$netrom(r1, &(0x7f0000000040), &(0x7f0000000080)=0x10) munlockall() ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000380)=0x78) 2018/04/20 06:31:01 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) [ 85.120620] QAT: Invalid ioctl [ 85.129414] QAT: Invalid ioctl 2018/04/20 06:31:02 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) 2018/04/20 06:31:02 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) 2018/04/20 06:31:02 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:02 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:02 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mremap(&(0x7f0000a93000/0x2000)=nil, 0x2000, 0x200000, 0x3, &(0x7f0000a93000/0x200000)=nil) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'bpq0\x00', 0x800}) 2018/04/20 06:31:02 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:02 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/20 06:31:02 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:31:02 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:02 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) acct(&(0x7f0000000000)='./file0\x00') munlockall() 2018/04/20 06:31:02 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:31:02 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:02 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 2018/04/20 06:31:02 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:02 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) 2018/04/20 06:31:02 executing program 3: munlockall() r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x400000, 0x0) getsockopt$inet_buf(r0, 0x0, 0xa4a464a2d4f80cfb, &(0x7f0000000100)=""/4096, &(0x7f0000000000)=0x1000) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000040)={@multicast1, @local, @dev}, &(0x7f0000000080)=0xc) 2018/04/20 06:31:02 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:03 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:31:03 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:03 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') 2018/04/20 06:31:03 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:03 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:03 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r1, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) 2018/04/20 06:31:03 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) 2018/04/20 06:31:03 executing program 3: mlock2(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x200000000) rt_sigpending(&(0x7f0000000000), 0x8) munlockall() [ 85.988534] QAT: Invalid ioctl [ 85.992732] QAT: Invalid ioctl 2018/04/20 06:31:03 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') 2018/04/20 06:31:03 executing program 3: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) munlockall() r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x300, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x4) 2018/04/20 06:31:03 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:31:03 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:03 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:03 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) 2018/04/20 06:31:03 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 86.926237] QAT: Invalid ioctl 2018/04/20 06:31:04 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000180)={@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, r1}, 0x14) 2018/04/20 06:31:04 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) 2018/04/20 06:31:04 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:04 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 2018/04/20 06:31:04 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:04 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x0, &(0x7f0000000000), 0x0) 2018/04/20 06:31:04 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) 2018/04/20 06:31:04 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:04 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:04 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:04 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) [ 87.247728] QAT: Invalid ioctl 2018/04/20 06:31:04 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000040)="63affbf4af10fb0f0ae9fd4408c2745c5e46c30c98f3548ce922c1f797b88372279bba11d5be955bc1e2e51d113737cb6c22793b8b32530fe65cfbc2bbd80d5a43c91bb0437ef9b486cbb9b3ab653344b6e2753295e9cd061455b6dc0806fc6285947adfda1fc5ed47dccc251290d77b59a956ef52ed36dd22519f05e249bc30d24e192255c0695c1b101156d14502fe323ff57e1db16e25b645", 0x9a) munlockall() 2018/04/20 06:31:04 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:04 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:04 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:04 executing program 5: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 2018/04/20 06:31:04 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:04 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:05 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:05 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_cache\x00') getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r1, 0x2, 0x5, [0x9996, 0x6, 0x9, 0x1df9, 0x40]}, &(0x7f0000000100)=0x12) munlockall() 2018/04/20 06:31:05 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) 2018/04/20 06:31:05 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) 2018/04/20 06:31:05 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:05 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:05 executing program 5: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 2018/04/20 06:31:05 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) 2018/04/20 06:31:05 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:05 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:05 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) 2018/04/20 06:31:05 executing program 3: keyctl$session_to_parent(0x12) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000000c0)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000240)='user{]+\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000080)='logon\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r2) socket$inet(0x2, 0xf, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000000)={{0x2, 0x4e24, @multicast2=0xe0000002}, {0x307, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x2, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}, 'ip_vti0\x00'}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 2018/04/20 06:31:05 executing program 5: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 2018/04/20 06:31:05 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:05 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:05 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) [ 89.069916] QAT: Invalid ioctl 2018/04/20 06:31:06 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:06 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:06 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x10001, 0x4, 0x9, 0x6, 0x4b, 0x9, 0xcc52}, 0xc) munlockall() 2018/04/20 06:31:06 executing program 5: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:06 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:06 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) 2018/04/20 06:31:06 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) 2018/04/20 06:31:06 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) 2018/04/20 06:31:06 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) 2018/04/20 06:31:06 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1) munlockall() r0 = memfd_create(&(0x7f0000000000)='^\x00', 0x3) r1 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000040)={0x2, 0x2, 0x8, 0x0, 0x2671a26f50afb333}) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 2018/04/20 06:31:06 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:06 executing program 5: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:06 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) msgget(0x0, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:06 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) [ 89.873901] QAT: Invalid ioctl 2018/04/20 06:31:06 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) msgget(0x0, 0xe) 2018/04/20 06:31:06 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:06 executing program 5: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:06 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:06 executing program 3: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="073dad0dee8d5f89b1ce881f9966903ba39a8d2915c59240bad5aecd135b75b94f52e6b2c4f80d499598a9c6192d8ffa81fe2e735000", 0x36, 0xfffffffffffffff8) keyctl$reject(0x13, r0, 0x100000000, 0x1ff, r1) munlockall() getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r3 = getegid() r4 = timerfd_create(0x5, 0x800) dup(r4) lchown(&(0x7f0000000000)='./file0\x00', r2, r3) 2018/04/20 06:31:06 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:06 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) 2018/04/20 06:31:06 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:07 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3b6c, 0x280000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x6, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000200)="b84a57", &(0x7f0000950000)}, 0x20) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000240)=0xff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000080)='/dev/usbmon#\x00'], &(0x7f00000001c0)=[&(0x7f0000000180)='/dev/usbmon#\x00']) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e21, 0x80000001, @loopback={0x0, 0x1}, 0x9a2e}}, 0x2db, 0x100, 0x10001, 0x1, 0x2}, &(0x7f0000000340)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000380)=@assoc_value={r2, 0x3}, 0x8) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f00000003c0)=0x6, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) mlock2(&(0x7f0000a93000/0x2000)=nil, 0x2000, 0x4000000000000) munlockall() 2018/04/20 06:31:07 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:07 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) 2018/04/20 06:31:07 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:07 executing program 5: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:07 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:07 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:07 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:07 executing program 5: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:07 executing program 3: mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xc8000, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x15, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0xffff}, [@jmp={0x5, 0x4, 0xb, 0xa, 0xe, 0xc, 0xfffffffffffffff0}, @map={0x18, 0x1, 0x1, 0x0, r0}, @exit={0x95}, @exit={0x95}, @alu={0x4, 0x0, 0xb, 0x3, 0x0, 0x62, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1ff}, @ldst={0x0, 0x0, 0x1, 0xa, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, @map={0x18, 0x1, 0x1, 0x0, r1}], {0x95}}, &(0x7f0000000140)='syzkaller\x00', 0xe5, 0x19, &(0x7f0000000180)=""/25, 0x41000, 0x1}, 0x48) munlockall() ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000240)={&(0x7f0000a95000/0x2000)=nil, 0xd0, 0x1, 0xb, &(0x7f0000ff9000/0x4000)=nil, 0xd88b}) [ 90.785855] QAT: Invalid ioctl 2018/04/20 06:31:07 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) 2018/04/20 06:31:07 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:07 executing program 3: mremap(&(0x7f0000a9c000/0x1000)=nil, 0x1000, 0x1000, 0x20003, &(0x7f0000a70000/0x1000)=nil) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = memfd_create(&(0x7f0000000180)='proc\x00', 0x2) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f00000001c0)={{0x3a, @broadcast=0xffffffff, 0x4e22, 0x3, 'sed\x00', 0x10, 0x4, 0x50}, {@empty, 0x4e20, 0x2000, 0x0, 0xffffffff, 0x3}}, 0x44) timer_create(0x6, &(0x7f0000000000)={0x0, 0x39, 0x1}, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(r1, 0x1, &(0x7f00000000c0)={{0x0, 0x989680}, {r2, r3+10000000}}, &(0x7f0000000100)) munlockall() 2018/04/20 06:31:07 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:07 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:07 executing program 5: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:07 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:07 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:08 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:08 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:08 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) 2018/04/20 06:31:08 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:08 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = memfd_create(&(0x7f0000000000)='\x00', 0x1) connect$bt_rfcomm(r0, &(0x7f0000000040)={0x1f, {0x1, 0x1, 0x5, 0x401, 0x80000001, 0x8e475c9}, 0x8000}, 0xa) 2018/04/20 06:31:08 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:08 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:08 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) 2018/04/20 06:31:08 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) msgget(0x0, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:08 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:08 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:08 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) accept$inet6(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0xffffffffffffffc1) munlockall() 2018/04/20 06:31:08 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:08 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) 2018/04/20 06:31:08 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000100)=0x8, &(0x7f00000001c0)=0x4) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = shmget(0x2, 0x1000, 0xc03, &(0x7f0000a96000/0x1000)=nil) shmat(r2, &(0x7f0000a96000/0x4000)=nil, 0x7000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x4e21, 0x20000000000000, @remote={0xfe, 0x80, [], 0xbb}, 0x3}, @in={0x2, 0x4e21}, @in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e23, 0x7, @mcast2={0xff, 0x2, [], 0x1}, 0x101}, @in6={0xa, 0x4e24, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x5}], 0x74) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80001}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000560e53d383dd6906db29ad74a4776de732134571c71b6db8c2881f374203ca7abc0f43512638c38ee2ab4d9dcd974871e65d958cbf50fe68e41901648c0535cc41c776", @ANYRES16=r1, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) munlockall() 2018/04/20 06:31:08 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:08 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:08 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:08 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) 2018/04/20 06:31:08 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:09 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) 2018/04/20 06:31:09 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:09 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:09 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:09 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = socket(0x1b, 0x3, 0x8) ioctl$sock_ipx_SIOCIPXCFGDATA(r0, 0x89e2, &(0x7f0000000000)) 2018/04/20 06:31:09 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:09 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:09 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) 2018/04/20 06:31:09 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) 2018/04/20 06:31:09 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:09 executing program 2: syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) 2018/04/20 06:31:09 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:09 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:09 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:09 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:09 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt_cache\x00') getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) mincore(&(0x7f0000a93000/0x4000)=nil, 0x4000, &(0x7f00000000c0)=""/242) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mmap(&(0x7f0000a96000/0x3000)=nil, 0x3000, 0x2000000, 0x4010, r0, 0x0) munlockall() 2018/04/20 06:31:10 executing program 2: syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) 2018/04/20 06:31:10 executing program 1: fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:10 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:10 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:10 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:10 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:10 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/net/pfkey\x00', 0x40040, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000006c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x6, &(0x7f0000000580)=[{&(0x7f00000001c0)="23b5ea2d61ae87c67ef5006b1500fcbfbca58febd87d2f21b2726c781f5da17ddccf5e1b1dbb7917af3f84c9b08f130b4080f93466d4c5b7cbb0ac5559651efbe46ecc09134de5cd8cf6c5d393a4d604cef1b43604b586e170896610f9", 0x5d, 0x5}, {&(0x7f0000000240)="5bf3b2f7e59a6909424a16c66f0609f8bf479b48fa7305870467c95dbe413189aa1c1b6f4a94d4ce3a36401dbdb6b8674abeb0af9077307695a680bc02fc5eff760e6183de1d96688b109be63d8ea1ab695d6da58ba1769aa25ad2d329e6927aff07076620d0d7827ca400580169edb9d83168ee49a4a0d7a6ec6e4c66958c5b8c4e6ac18b6dd991bc7f3a398a4489f6cdc98b14090666950133b8d43ce0913e20ced24b8060b0aa62db375a6893a8043681a9e103153fb758b1768a", 0xbc, 0x2}, {&(0x7f0000000300)="1124982255313b89b4bd28cc", 0xc, 0x5}, {&(0x7f0000000340)="0eecb902673c2bb4750b8430f90617c18ff21ed9abfa042afa6e4a2ff0ff443f1a7df9a4e1b751fcef8e84fdf09dafca25015d4ba5f7a5f1b8ed1a8faf1426e9a048904ecc62e3fdb6ccd45ab17c5832f694e4661f5ae9bf8f65ca8c622e7b90e3f96477c01f572e8fd8e224041bc20a66ad297a4d8ea12f49921bee61a9ee4b4d13ed9a5ff818d7ae5bb0b97f33e6bfc51f735a84ab7c7e9d9b7382612363bab0f3bab51e580e4136d4c7dfd6d0690b34780ecb3e8129df4bffd8a090b2e933da14714594013776103341855c6b1b67de86", 0xd2, 0x6}, {&(0x7f0000000440)="cd75353ef9f46709f294acdf57648e7f6536f3dcc7264d5dfbb27746eb771145cdca3fd78dc6311345bd333b4130d40cab91c69baff8364d6f01ec1da9e5e8475374f55bad90203b955fd526320171614db05877919e860bbd0f7d65bae1b310b8951d70d66dcdd17d976dd56b039822ce884c35ac6a8d3d98e0cc5afe5c76ee3d37c509c1864110fea7403ac08479e4a4fd31d3a0af13481cdabe370a65f65bfd818c1829baa1a47af0133973f06373e4d24f76e213a1d4e5b71d2fe476", 0xbe, 0x99e}, {&(0x7f0000000500)="e133caa678c14d093ac0cf241d9f7c92ae4f85c2f4ec5e76ccf7ee3b129d8780f98264eea371bf3e2bdcaafe4faff236c851707dfd562fe87505b1dfaae2ca10a70854214b5a0e78cca460f03446015a87dac916288457bd8fe852efcb0d301597029c8a1e325ac377db5a25cc26f888bd801e4fefba7c695e503487", 0x7c, 0x100000001}], 0x1000, &(0x7f0000000640)={[{@file_umask={'file_umask', 0x3d, [0x35, 0x30, 0x32, 0x30, 0x35, 0x33, 0x32, 0x30]}, 0x2c}, {@umask={'umask', 0x3d, [0x33, 0x34, 0x35, 0x37]}, 0x2c}, {@dir_umask={'dir_umask', 0x3d, [0x32]}, 0x2c}, {@part={'part', 0x3d, [0x7f, 0x3d, 0x3f, 0x30, 0x0, 0x7f, 0x39]}, 0x2c}, {@gid={'gid', 0x3d}, 0x2c}]}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20400, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x7) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="0500000008000100000001000100470acd5f33c3f0ccb41aaf6206341f60ce4248041d0fbc2502212510e510f44a58ee68fa86be"], 0xe) 2018/04/20 06:31:10 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt_cache\x00') getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) mincore(&(0x7f0000a93000/0x4000)=nil, 0x4000, &(0x7f00000000c0)=""/242) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mmap(&(0x7f0000a96000/0x3000)=nil, 0x3000, 0x2000000, 0x4010, r0, 0x0) munlockall() 2018/04/20 06:31:10 executing program 1: fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:10 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) [ 93.481126] QAT: Invalid ioctl [ 93.494698] QAT: Invalid ioctl [ 93.526191] QAT: Invalid ioctl 2018/04/20 06:31:10 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:10 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:10 executing program 1: fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:10 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) [ 93.546402] QAT: Invalid ioctl 2018/04/20 06:31:10 executing program 2: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) 2018/04/20 06:31:10 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/4096) getsockopt$inet_buf(r0, 0x0, 0x3b, &(0x7f00000011c0)=""/4096, &(0x7f00000021c0)=0x1000) ioctl$sock_ipx_SIOCAIPXPRISLT(r0, 0x89e1, &(0x7f0000001180)) syz_open_dev$sndtimer(&(0x7f0000001040)='/dev/snd/timer\x00', 0x0, 0x1008000) bind$bt_rfcomm(r0, &(0x7f0000001140)={0x1f, {0x5, 0x1bd, 0x3, 0x40, 0x1, 0xffffffffffffff28}, 0x3f}, 0xa) r1 = gettid() move_pages(r1, 0x3, &(0x7f0000001080)=[&(0x7f0000a95000/0x1000)=nil, &(0x7f0000a95000/0x1000)=nil, &(0x7f0000a96000/0x3000)=nil], 0x0, &(0x7f00000010c0)=[0x0], 0x2) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() syz_open_dev$sndtimer(&(0x7f0000002200)='/dev/snd/timer\x00', 0x0, 0x12000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000001100)=0x1, 0x8) 2018/04/20 06:31:10 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:11 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:11 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/net/pfkey\x00', 0x40040, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000006c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x6, &(0x7f0000000580)=[{&(0x7f00000001c0)="23b5ea2d61ae87c67ef5006b1500fcbfbca58febd87d2f21b2726c781f5da17ddccf5e1b1dbb7917af3f84c9b08f130b4080f93466d4c5b7cbb0ac5559651efbe46ecc09134de5cd8cf6c5d393a4d604cef1b43604b586e170896610f9", 0x5d, 0x5}, {&(0x7f0000000240)="5bf3b2f7e59a6909424a16c66f0609f8bf479b48fa7305870467c95dbe413189aa1c1b6f4a94d4ce3a36401dbdb6b8674abeb0af9077307695a680bc02fc5eff760e6183de1d96688b109be63d8ea1ab695d6da58ba1769aa25ad2d329e6927aff07076620d0d7827ca400580169edb9d83168ee49a4a0d7a6ec6e4c66958c5b8c4e6ac18b6dd991bc7f3a398a4489f6cdc98b14090666950133b8d43ce0913e20ced24b8060b0aa62db375a6893a8043681a9e103153fb758b1768a", 0xbc, 0x2}, {&(0x7f0000000300)="1124982255313b89b4bd28cc", 0xc, 0x5}, {&(0x7f0000000340)="0eecb902673c2bb4750b8430f90617c18ff21ed9abfa042afa6e4a2ff0ff443f1a7df9a4e1b751fcef8e84fdf09dafca25015d4ba5f7a5f1b8ed1a8faf1426e9a048904ecc62e3fdb6ccd45ab17c5832f694e4661f5ae9bf8f65ca8c622e7b90e3f96477c01f572e8fd8e224041bc20a66ad297a4d8ea12f49921bee61a9ee4b4d13ed9a5ff818d7ae5bb0b97f33e6bfc51f735a84ab7c7e9d9b7382612363bab0f3bab51e580e4136d4c7dfd6d0690b34780ecb3e8129df4bffd8a090b2e933da14714594013776103341855c6b1b67de86", 0xd2, 0x6}, {&(0x7f0000000440)="cd75353ef9f46709f294acdf57648e7f6536f3dcc7264d5dfbb27746eb771145cdca3fd78dc6311345bd333b4130d40cab91c69baff8364d6f01ec1da9e5e8475374f55bad90203b955fd526320171614db05877919e860bbd0f7d65bae1b310b8951d70d66dcdd17d976dd56b039822ce884c35ac6a8d3d98e0cc5afe5c76ee3d37c509c1864110fea7403ac08479e4a4fd31d3a0af13481cdabe370a65f65bfd818c1829baa1a47af0133973f06373e4d24f76e213a1d4e5b71d2fe476", 0xbe, 0x99e}, {&(0x7f0000000500)="e133caa678c14d093ac0cf241d9f7c92ae4f85c2f4ec5e76ccf7ee3b129d8780f98264eea371bf3e2bdcaafe4faff236c851707dfd562fe87505b1dfaae2ca10a70854214b5a0e78cca460f03446015a87dac916288457bd8fe852efcb0d301597029c8a1e325ac377db5a25cc26f888bd801e4fefba7c695e503487", 0x7c, 0x100000001}], 0x1000, &(0x7f0000000640)={[{@file_umask={'file_umask', 0x3d, [0x35, 0x30, 0x32, 0x30, 0x35, 0x33, 0x32, 0x30]}, 0x2c}, {@umask={'umask', 0x3d, [0x33, 0x34, 0x35, 0x37]}, 0x2c}, {@dir_umask={'dir_umask', 0x3d, [0x32]}, 0x2c}, {@part={'part', 0x3d, [0x7f, 0x3d, 0x3f, 0x30, 0x0, 0x7f, 0x39]}, 0x2c}, {@gid={'gid', 0x3d}, 0x2c}]}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20400, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x7) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="0500000008000100000001000100470acd5f33c3f0ccb41aaf6206341f60ce4248041d0fbc2502212510e510f44a58ee68fa86be"], 0xe) 2018/04/20 06:31:11 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:11 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/net/pfkey\x00', 0x40040, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000006c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x6, &(0x7f0000000580)=[{&(0x7f00000001c0)="23b5ea2d61ae87c67ef5006b1500fcbfbca58febd87d2f21b2726c781f5da17ddccf5e1b1dbb7917af3f84c9b08f130b4080f93466d4c5b7cbb0ac5559651efbe46ecc09134de5cd8cf6c5d393a4d604cef1b43604b586e170896610f9", 0x5d, 0x5}, {&(0x7f0000000240)="5bf3b2f7e59a6909424a16c66f0609f8bf479b48fa7305870467c95dbe413189aa1c1b6f4a94d4ce3a36401dbdb6b8674abeb0af9077307695a680bc02fc5eff760e6183de1d96688b109be63d8ea1ab695d6da58ba1769aa25ad2d329e6927aff07076620d0d7827ca400580169edb9d83168ee49a4a0d7a6ec6e4c66958c5b8c4e6ac18b6dd991bc7f3a398a4489f6cdc98b14090666950133b8d43ce0913e20ced24b8060b0aa62db375a6893a8043681a9e103153fb758b1768a", 0xbc, 0x2}, {&(0x7f0000000300)="1124982255313b89b4bd28cc", 0xc, 0x5}, {&(0x7f0000000340)="0eecb902673c2bb4750b8430f90617c18ff21ed9abfa042afa6e4a2ff0ff443f1a7df9a4e1b751fcef8e84fdf09dafca25015d4ba5f7a5f1b8ed1a8faf1426e9a048904ecc62e3fdb6ccd45ab17c5832f694e4661f5ae9bf8f65ca8c622e7b90e3f96477c01f572e8fd8e224041bc20a66ad297a4d8ea12f49921bee61a9ee4b4d13ed9a5ff818d7ae5bb0b97f33e6bfc51f735a84ab7c7e9d9b7382612363bab0f3bab51e580e4136d4c7dfd6d0690b34780ecb3e8129df4bffd8a090b2e933da14714594013776103341855c6b1b67de86", 0xd2, 0x6}, {&(0x7f0000000440)="cd75353ef9f46709f294acdf57648e7f6536f3dcc7264d5dfbb27746eb771145cdca3fd78dc6311345bd333b4130d40cab91c69baff8364d6f01ec1da9e5e8475374f55bad90203b955fd526320171614db05877919e860bbd0f7d65bae1b310b8951d70d66dcdd17d976dd56b039822ce884c35ac6a8d3d98e0cc5afe5c76ee3d37c509c1864110fea7403ac08479e4a4fd31d3a0af13481cdabe370a65f65bfd818c1829baa1a47af0133973f06373e4d24f76e213a1d4e5b71d2fe476", 0xbe, 0x99e}, {&(0x7f0000000500)="e133caa678c14d093ac0cf241d9f7c92ae4f85c2f4ec5e76ccf7ee3b129d8780f98264eea371bf3e2bdcaafe4faff236c851707dfd562fe87505b1dfaae2ca10a70854214b5a0e78cca460f03446015a87dac916288457bd8fe852efcb0d301597029c8a1e325ac377db5a25cc26f888bd801e4fefba7c695e503487", 0x7c, 0x100000001}], 0x1000, &(0x7f0000000640)={[{@file_umask={'file_umask', 0x3d, [0x35, 0x30, 0x32, 0x30, 0x35, 0x33, 0x32, 0x30]}, 0x2c}, {@umask={'umask', 0x3d, [0x33, 0x34, 0x35, 0x37]}, 0x2c}, {@dir_umask={'dir_umask', 0x3d, [0x32]}, 0x2c}, {@part={'part', 0x3d, [0x7f, 0x3d, 0x3f, 0x30, 0x0, 0x7f, 0x39]}, 0x2c}, {@gid={'gid', 0x3d}, 0x2c}]}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20400, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x7) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="0500000008000100000001000100470acd5f33c3f0ccb41aaf6206341f60ce4248041d0fbc2502212510e510f44a58ee68fa86be"], 0xe) 2018/04/20 06:31:11 executing program 3: mlock2(&(0x7f0000a95000/0x1000)=nil, 0x1000, 0xfffffffffffffffc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) munlockall() 2018/04/20 06:31:11 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:11 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:11 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) [ 94.586794] QAT: Invalid ioctl [ 94.592795] QAT: Invalid ioctl [ 94.617263] QAT: Invalid ioctl 2018/04/20 06:31:11 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) process_vm_readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/159, 0x9f}], 0x1, &(0x7f0000002580)=[{&(0x7f0000000300)=""/188, 0xbc}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/147, 0x93}, {&(0x7f0000002480)=""/198, 0xc6}], 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xf, 0x7998, 0x46, 0x10000, 0x1, 0xffffffffffffffff, 0x1}, 0x2c) mlock2(&(0x7f0000a94000/0x4000)=nil, 0x4000, 0x1) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000000c0)="e84830e00bc0c5e88a936aad651863994b71aab95a20d214ffb4e0accbdf9a18c7b5750c11a0529326587098766c7cf67217c88742917c9fda49e3631eff9882", 0x40, 0xfffffffffffffffc) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$unlink(0x9, r3, r4) munlockall() socket$inet_dccp(0x2, 0x6, 0x0) [ 94.646170] QAT: Invalid ioctl 2018/04/20 06:31:11 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:11 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:11 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:11 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) msgget(0x0, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:11 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) msgget(0x0, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:11 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000040)={{0x3, 0x0, 0x7, 0x2, 0x7}, 0x0, 0xfffffffffffffffa}) munlockall() 2018/04/20 06:31:12 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[]}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:12 executing program 6: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:12 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) msgget(0x0, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:12 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) msgget(0x0, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:12 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) mlock2(&(0x7f0000ff6000/0xa000)=nil, 0xa000, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000080)={0x7, [0x6, 0x1, 0x1, 0x1ff, 0x3, 0x9, 0x800000000000000]}, 0x12) r1 = msgget(0x1, 0x20) msgsnd(r1, &(0x7f0000000100)={0x8a79e6b80a99c1be, "27d945d82f1e1d38530cc7e234953ff1e8dddf1247d77b4a525087579036e79fba54a0912c28fbc1b22f45ac4f912edef7e68f0680b28ad1d2cc6cba09877dd0646c92fd5c982cc281f6bc91ba2fe0a5c0579607ca7310c905fe766b442b086f77da665436b63e3111e7d727c67e16abb12e82363e4be0fe04b165aa94a8a850ac84355b34dbc135eadcd050de687b724bc0527ccb4998ba0b76b029cf7f9a21ffc05cd404497411f4885c1d60803e18bb08b5134baad56d7401d1818515ea9de231244617126fc6a8c3ee5e591933585dd88d0a39868c5a41ad8d5d1668e22174"}, 0xe9, 0x800) r2 = getpid() fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x0, r2}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() 2018/04/20 06:31:12 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:12 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:12 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:12 executing program 6: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:12 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:12 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/net/pfkey\x00', 0x12000, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000240), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000540)={{{@in=@loopback=0x7f000001, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0x4e21, 0xfffffffffffffff8, 0x4e21, 0x9, 0xa, 0x0, 0xa0, 0x89, r1, r2}, {0xfffffffffffffffa, 0x0, 0x7, 0x2, 0xff, 0x1, 0xb468, 0xf39b}, {0x4, 0x1, 0xb2b2, 0x3f}, 0x1, 0x6e6bb4, 0x1, 0x0, 0x0, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x21}, 0x4d2, 0xff}, 0x2, @in=@multicast2=0xe0000002, 0x0, 0x4, 0x3, 0x1c, 0x68, 0x0, 0xda8}}, 0xe8) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x30000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f0000000040)={{0x5, 0x3}, 'port1\x00', 0xae, 0xc0c28, 0xfff, 0xffffffffffffffea, 0x7, 0xffffffff, 0x1, 0x0, 0x4, 0x1be3}) munmap(&(0x7f0000a92000/0x4000)=nil, 0x4000) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x4) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x500) r4 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x8, 0x400000) ioctl$KDADDIO(r4, 0x4b34, 0x20004) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000002c0)={&(0x7f0000000280)=[0x80000000, 0xffffffffffff0000, 0x4], 0x3, 0x0, 0xa0de, 0x6, 0xec0a, 0x9, {0x81, 0x2, 0x7, 0x114a, 0x1, 0x400, 0x3e, 0xfffffffffffffffd, 0xeefd, 0x1, 0x8, 0x8, 0xc18e, 0xfffffffffffffffb, "15c14493c9ba123d51c07d1d681aa53c6ce427d20bdd5c6fbd1d587228f2f144"}}) 2018/04/20 06:31:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) msgget(0x0, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:12 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3b6c, 0x280000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x6, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000200)="b84a57", &(0x7f0000950000)}, 0x20) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000240)=0xff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000080)='/dev/usbmon#\x00'], &(0x7f00000001c0)=[&(0x7f0000000180)='/dev/usbmon#\x00']) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e21, 0x80000001, @loopback={0x0, 0x1}, 0x9a2e}}, 0x2db, 0x100, 0x10001, 0x1, 0x2}, &(0x7f0000000340)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000380)=@assoc_value={r2, 0x3}, 0x8) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f00000003c0)=0x6, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) mlock2(&(0x7f0000a93000/0x2000)=nil, 0x2000, 0x4000000000000) munlockall() 2018/04/20 06:31:12 executing program 6: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:12 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) 2018/04/20 06:31:13 executing program 3: mlock2(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0x3ffffffd) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) r1 = fcntl$getown(r0, 0x9) capget(&(0x7f0000000180)={0x20080522, r1}, &(0x7f00000001c0)={0x8, 0x9, 0xffffffffffffff7f, 0x10000, 0x7, 0x200}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x4d}, &(0x7f0000000080)=0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@rand_addr, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) ioctl$TIOCSCTTY(r0, 0x540e, 0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e24, 0xffffffffffffff92, @loopback={0x0, 0x1}, 0x16a68152}}}, 0x84) munlockall() 2018/04/20 06:31:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) msgget(0x0, 0xe) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:13 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/20 06:31:13 executing program 0: clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:13 executing program 6: fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:13 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:13 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:13 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) 2018/04/20 06:31:13 executing program 6: fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:13 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x10001, 0x4, 0x9, 0x6, 0x4b, 0x9, 0xcc52}, 0xc) munlockall() 2018/04/20 06:31:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) msgget(0x0, 0xe) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:13 executing program 3: uselib(&(0x7f00000000c0)='./file0/file0\x00') mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x31c5b79ef82ad95b, 0x84) getdents(r0, &(0x7f0000000040)=""/88, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8082, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)={[{0x2d, 'cpu', 0x20}, {0x2f, 'pids', 0x20}, {0x0, 'pids', 0x20}]}, 0x11) munlockall() 2018/04/20 06:31:13 executing program 0: clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:13 executing program 6: fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:13 executing program 1: keyctl$session_to_parent(0x12) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000000c0)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000240)='user{]+\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000080)='logon\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r2) socket$inet(0x2, 0xf, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000000)={{0x2, 0x4e24, @multicast2=0xe0000002}, {0x307, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x2, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}, 'ip_vti0\x00'}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 2018/04/20 06:31:14 executing program 3: mlock2(&(0x7f0000a95000/0x1000)=nil, 0x1000, 0x0) munlockall() 2018/04/20 06:31:14 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) msgget(0x0, 0xe) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:14 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:14 executing program 0: clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:14 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:14 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:14 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) 2018/04/20 06:31:14 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:14 executing program 3: mlock2(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x1) r0 = socket(0x8, 0x3, 0xa0) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x3, 0x0, 0x14, 0x3, 0x5}}) munlockall() socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$nfc_llcp(r0, 0x118, 0x3, &(0x7f0000000340)=""/4096, 0x1000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x48, &(0x7f0000000080)=[@in={0x2, 0x4e24, @loopback=0x7f000001}, @in6={0xa, 0x4e20, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, @in6={0xa, 0x4e20, 0x6, @loopback={0x0, 0x1}, 0x5}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={r2}, &(0x7f00000001c0)=0x8) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000300)={'bond0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}}) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={r2, 0x53, "0a350c2fb0d2009a145e5bb4f3e4daba13cc3f61e97af12bf6e8faadf3f130819f48b8b23631cfd6bab44e4350a3930129b5c129a1e07e3dd68a282abffab16b1ed57802cb6bf94b45ecc7442c5c67d3a4d160"}, &(0x7f0000000280)=0x5b) 2018/04/20 06:31:14 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:14 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:14 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) 2018/04/20 06:31:14 executing program 0: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:14 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3, 0x30000) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000013c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000001500)={@dev, @local, 0x0}, &(0x7f0000001540)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000001580)={@rand_addr, @empty, 0x0}, &(0x7f00000015c0)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001740)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200010}, 0xc, &(0x7f0000001700)={&(0x7f0000001600)={0xe4, r1, 0x715, 0x70bd2c, 0x25dfdbfb, {0x3}, [{{0x8, 0x1, r2}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r4}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7ff}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0xbc}}, {0x8, 0x6, r5}}}]}}]}, 0xe4}, 0x1, 0x0, 0x0, 0xc011}, 0x40) 2018/04/20 06:31:14 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:14 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:14 executing program 1: mlock2(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x200000000) rt_sigpending(&(0x7f0000000000), 0x8) munlockall() 2018/04/20 06:31:15 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[]}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:15 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = getuid() getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) lchown(&(0x7f0000000000)='./file0\x00', r0, r1) 2018/04/20 06:31:15 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:15 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:15 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:15 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:15 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200004, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000040)={0x3, 0x5, 0x5}) munlockall() 2018/04/20 06:31:15 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:15 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:15 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:15 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:16 executing program 0: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:16 executing program 7: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:16 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:16 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:16 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = socket$inet6_udp(0xa, 0x2, 0x0) write(r0, &(0x7f0000000000)="5566d557b2ffa0c1a3b40e3b571cce3f44e676afc5648303d55da521364b07ea71d0b40d394b6b077d5d07a1cba7a0b651c77c33b00adbc8159a8f697fa43d7042a1d48db34a5c7c1f77c2bc497bd07420ce11aea72d1a1ff3fce106b295e399659e60089b3a6b3506c0d70b4c871699fe88261029aa98ac9f", 0x79) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0xfffffffffffffff8, 0x600) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r1, 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000100)=0x14) 2018/04/20 06:31:16 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) acct(&(0x7f0000000000)='./file0\x00') munlockall() 2018/04/20 06:31:16 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) acct(&(0x7f0000000000)='./file0\x00') munlockall() 2018/04/20 06:31:16 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:16 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) munlockall() r1 = getpgrp(0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000040)={0x1, r0}) sched_getattr(r1, &(0x7f00000000c0), 0x30, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x10) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xb, 0x2) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000180)=""/14) 2018/04/20 06:31:16 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:16 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:16 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:16 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:16 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x40801, 0x0) setsockopt$inet6_buf(r0, 0x29, 0xd3, &(0x7f00000000c0)="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", 0x1000) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) munlockall() socketpair$inet(0x2, 0xf, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000040)={'rose0\x00', {0x2, 0x4e24, @broadcast=0xffffffff}}) 2018/04/20 06:31:16 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:16 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='statm\x00') openat$cgroup_int(r0, &(0x7f0000000040)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) munlockall() 2018/04/20 06:31:17 executing program 0: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:17 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:17 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:17 executing program 7: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:17 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:17 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:17 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:17 executing program 3: mlock2(&(0x7f0000a94000/0x3000)=nil, 0x3000, 0x1) munlockall() madvise(&(0x7f0000a95000/0x9000)=nil, 0x9000, 0x6f) rt_sigreturn() 2018/04/20 06:31:17 executing program 2: fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:17 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1) munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) 2018/04/20 06:31:17 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) socketpair(0x0, 0xb, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) munlockall() 2018/04/20 06:31:17 executing program 2: fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:18 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:18 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x45d32836, 0xffffffff, &(0x7f0000000040)="4ab7ca6223f2ccd90303efd8445b481a52a7f61fd4dcae5a972c4afb4ba4040d7301549c2c0ad754a75a3ad1a92eaea03f8c", 0x7, 0x9, 0x2, 0x0, 0xa7d, 0xfff, 0x9, "b0fe486f376ad6344ee480b120fe4cb41b1768df626fc18afa9616df108644d6bafbc18255e3af0e662c3bdb1ce0e2fb"}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000200)={r1, r1, 0xd9, 0x7, &(0x7f0000000100)="379535ce07fcff67cbe59747160051c103022e6f8661c306c9fb53a3c4ef5b86521572f4f6a5ea3aa722417450491043b3df9c0011b867038cc12c3e5c2f631b3bb77f76f2950e535d16075a66570a1199e430187988cf49b1f63ab508276d72b00d1ea504b3795273de9a69bcfd6a108bd9906a9e131be87e465ad0f98a82ed99d37ee8bf531743da807b83972586241b1db38a59e5bd5dbbacd2419f3c6072233023be37f25b2e146787d132344cc2d918720025e24b6f5b5886e61d4aaeb0eb4b78359aa2220be65cc3699532b3a595dc1db22dff9b969f88524ad2830db2380c79014e97ba2b4aa604e9821720929112058fef8ee4", 0x100, 0x0, 0x5, 0x0, 0xcffd, 0x0, 0x8, "e0851a0c47335ee8e66e6c7f12846806b020f5bb923af1c817aec32d96fe910b10225500d47670ea4a5b350376167a338dfdb3894afe74f82af44c9f039b4e39d8c0395001b5dbcf3e3d3e50994844834babb934122ddfa9a240bd2b004a0020776068f9f4a5fbbca0f50401af35f7e59f7353366caf8ac499d70fd2222d36ef11df2f46ee8e18bd0caf891c58e6051797c4a87ab6d9461b4dd9e8ad745be9aebb02657f038c3b3b64ccffe64f5e339de12f379c56a60b2054e3f43a4e56e1a8676ea3a6b4fa3208288a82a7f5d1703180f973"}) 2018/04/20 06:31:18 executing program 7: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:18 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:18 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:18 executing program 5: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:18 executing program 2: fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:18 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:18 executing program 3: unshare(0x20000000) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x400000, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@remote={0xfe, 0x80, [], 0xbb}, 0x9, 0x2, 0xff, 0x0, 0x6e, 0x100, 0x5}, &(0x7f0000000080)=0x20) 2018/04/20 06:31:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:18 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@ethernet={0x0, @dev}, &(0x7f0000000080)=0x80, 0x800) r1 = syz_open_dev$usbmon(&(0x7f00000005c0)='/dev/usbmon#\x00', 0x6, 0x80) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000600)={&(0x7f0000a93000/0x4000)=nil, 0x6, 0x5, 0x2, &(0x7f0000a96000/0x3000)=nil, 0x8}) syz_extract_tcp_res(&(0x7f0000000640), 0x7, 0x6) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00', 0x7, 0x4, 0x470, 0x130, 0x130, 0x0, 0x388, 0x388, 0x388, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x130}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "cf0b75a5abc0e03442ff27f4b46be833954fd811fa5303e44b56a001441a"}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {[0xff, 0x0, 0x0, 0x0, 0x0, 0xff]}, @mac=@random="42cfd76e7223", {[0x0, 0xff, 0xff]}, 0x3, 0x8, 0x7, 0x5c60, 0x4, 0x6, 'veth0_to_team\x00', 'veth0_to_bridge\x00', {}, {}, 0x0, 0x42}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, @empty, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x800, 0x3ff}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c0) munlockall() 2018/04/20 06:31:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:18 executing program 3: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) munlockall() 2018/04/20 06:31:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[]}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:18 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x2, &(0x7f0000a95000/0x1000)=nil) r0 = dup(0xffffffffffffffff) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x6, 0x3}, &(0x7f0000000080)=0x8) r2 = semget$private(0x0, 0x3, 0xb2) semctl$GETNCNT(r2, 0x13f40be2ab6cc27e, 0xe, &(0x7f0000000100)=""/211) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r1, 0xd186}, 0x8) 2018/04/20 06:31:19 executing program 4: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:19 executing program 1: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:19 executing program 5: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:19 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:19 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:19 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[]}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:19 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = shmget$private(0x0, 0x3000, 0x54000941, &(0x7f0000ffb000/0x3000)=nil) socketpair$ax25(0x3, 0x5, 0xcc, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) shmat(r0, &(0x7f0000a94000/0x2000)=nil, 0x1000) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x488000, 0x0) 2018/04/20 06:31:19 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:19 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:19 executing program 3: mlock2(&(0x7f0000a94000/0x3000)=nil, 0x3000, 0x0) munlockall() 2018/04/20 06:31:19 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:19 executing program 3: mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/bnep\x00') ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000002c0)=""/4096) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r2 = request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100)='[ppp0\x00', 0xfffffffffffffff9) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f00000001c0)={0x6, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}]}) keyctl$link(0x8, r1, r2) r4 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) accept4$inet6(r4, &(0x7f0000000000), &(0x7f0000000240)=0x1c, 0x80000) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000040)) munlockall() 2018/04/20 06:31:19 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:19 executing program 3: mlock2(&(0x7f0000a95000/0x4000)=nil, 0x4000, 0x1) munlockall() r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000200), 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x88000, 0x0) faccessat(r1, &(0x7f0000000080)='./file0\x00', 0x15, 0x800) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x800, 0x8, 0x81, "25ceb3cf80f7c3b232c2e9aef0acc9039045302bccbdb9bfd9a4c0bbbe838483490603589c0694f25ca1606f5719ce64a4ad2eabef6ca07df5ea596d75ca0310ad6dc5b37f71c6fa5e5eb9a8bd9c502a"}, 0xd8) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000040)={&(0x7f0000a93000/0x2000)=nil, 0x8, 0x4, 0x48, &(0x7f0000a94000/0x3000)=nil, 0x9}) 2018/04/20 06:31:19 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1ff00000000000, 0x4000000001) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x4e5, 0x4) munlockall() socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) 2018/04/20 06:31:19 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:20 executing program 4: clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:20 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:20 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:20 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:20 executing program 1: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:20 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:20 executing program 4: clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:20 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000100)=0xffffffffffffff01) munlockall() bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}, 0xe4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) 2018/04/20 06:31:20 executing program 5: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:20 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) setgid(r0) munlockall() 2018/04/20 06:31:20 executing program 4: clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:20 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={r1, r2/1000+10000}, 0x10) munlockall() r3 = add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000100)="a57fec786a0e8807c6d3a71585e7ede1a3b7ecd8ca00c9275244679f8c40d849", 0x20, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000140)=""/44, 0x2c) mlock(&(0x7f0000a95000/0x1000)=nil, 0x1000) r4 = accept$inet6(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f00000001c0)=0x1c) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 2018/04/20 06:31:20 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) chdir(&(0x7f0000000000)='./file0\x00') 2018/04/20 06:31:20 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:20 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@local, @broadcast, 0x0}, &(0x7f0000000080)=0xc) connect$packet(r0, &(0x7f00000000c0)={0x11, 0x19, r1, 0x1, 0x0, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xc}}, 0x14) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000100)={'ipddp0\x00', @ifru_hwaddr=@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}) 2018/04/20 06:31:20 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100, 0x20000) getsockname$unix(r0, &(0x7f0000000080), &(0x7f0000000180)=0x6e) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000140), &(0x7f0000000100)=0xa) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000001c0)=ANY=[@ANYBLOB="060000000000010011b6c7bb4500070000000000000000"], 0x10) 2018/04/20 06:31:21 executing program 3: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mmap(&(0x7f0000a8b000/0x10000)=nil, 0x10000, 0x8, 0x10, r0, 0x0) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() 2018/04/20 06:31:21 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:21 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:21 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f02233", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:22 executing program 1: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:22 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:22 executing program 2: clone(0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:22 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:22 executing program 6: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:22 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) 2018/04/20 06:31:22 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:22 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:22 executing program 3: restart_syscall() mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() 2018/04/20 06:31:22 executing program 3: socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000300)) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x80000) getsockopt$inet6_udp_int(r0, 0x11, 0x64, &(0x7f0000000540), &(0x7f0000000580)=0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r0, 0x3, 0x1, 0x1, &(0x7f0000000280)=[0x0], 0x1}, 0x20) socketpair(0x5, 0xb, 0x277, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000040)=""/129, &(0x7f0000000100)=0x81) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000340)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000380)={0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000003c0)={r3, r4}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000400)={0xffff, {{0xa, 0x4e24, 0x4, @local={0xfe, 0x80, [], 0xaa}, 0x40}}, {{0xa, 0x4e24, 0x81, @dev={0xfe, 0x80, [], 0xe}, 0x4f4f5ec0}}}, 0x108) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000140)={0xccf2, 0x6, 0x2, 0xd0, 0x7fff}, 0x14) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000180)={0x3, r2}) r5 = getpgrp(0xffffffffffffffff) r6 = getpgid(0x0) tgkill(r5, r6, 0x2) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f00000005c0)={0x3, 0x3}) 2018/04/20 06:31:22 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:22 executing program 2: clone(0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:22 executing program 3: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4) r0 = accept$ipx(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10) connect$ipx(r0, &(0x7f0000000080)={0x4, 0x7b, 0x6, "2b49eef474b8", 0x1}, 0x10) munlockall() 2018/04/20 06:31:22 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:22 executing program 2: clone(0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:22 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = dup(0xffffffffffffffff) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e21}, 0x10) munlockall() 2018/04/20 06:31:23 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:23 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:23 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:23 executing program 6: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:23 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:23 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:23 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = getpgrp(0x0) ptrace$getenv(0x4201, r0, 0xfffffffffffffffa, &(0x7f0000000000)) r1 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x800) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000080)=""/161, &(0x7f0000000140)=0xa1) 2018/04/20 06:31:23 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:23 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000100)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) r3 = syz_open_dev$mouse(&(0x7f0000001840)='/dev/input/mouse#\x00', 0x0, 0x200000) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)={0x0, 0x0}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001640)='./cgroup/syz1\x00', 0x200002, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffff, 0xd68a, 0x18}, 0xc) r7 = accept$netrom(0xffffffffffffffff, 0x0, &(0x7f00000016c0)) socketpair$inet6(0xa, 0x804, 0x5, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = accept4$llc(0xffffffffffffff9c, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001780)=0x10, 0x0) sendmsg$netlink(r0, &(0x7f0000001800)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x1010000}, 0xc, &(0x7f0000001600)=[{&(0x7f00000000c0)={0x18, 0x28, 0x200, 0x70bd2c, 0x25dfdbff, "", [@typed={0x8, 0x26, @fd=r1}]}, 0x18}, {&(0x7f0000000280)={0x1184, 0x30, 0x100, 0x70bd29, 0x25dfdbfb, "", [@typed={0x8, 0x65, @ipv4=@rand_addr=0x7}, @nested={0x114, 0x66, [@typed={0x8, 0x78, @uid=r2}, @typed={0x8, 0x4b, @pid=r4}, @generic="9d907948a88d3d85487311c7ab091678eb4c9c80e4f3cc33baac211a41225646054156d50acd0af83cc427b7468121da79e6", @typed={0xc0, 0x1e, @binary="6f76ac847c1d700a489fe5cd2b0200fa06fcb6c7cbb8bcb831c24440db6abeae76a127ad2015357cb6c21bbf0bcb266f9af422c9f7aea345d6117375c95f2f8b770b2f393adb746498db053bd9665bb80a1e59ea94b44ee882fbd393a7a145038f147f09871ced69d5e5b4fa94b41188d763eb4ada31cc8b6fe702851fb344e0962e0b3f2c5f7506d0b43029e0c4dc36d558f818119aa407116a8a66802a7559a67ecc71aaf856277348e59b9bd48a2c8ea9398aa20bc67d3096ae"}, @typed={0xc, 0x75, @u64}]}, @generic="d95beb839b711c263e38d8cab9aabaca2e3fd1fbb5800f394b969542fd4ccd0f3cbb272e6474229af2c89d77810eedaf3e17620fa84ce018333ba2fee7053dff552fa67b67215a6ec8708b29c6efb91ced349814a2ddfec8", @generic="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"]}, 0x1184}, {&(0x7f0000001440)=ANY=[@ANYBLOB="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"], 0x1ac}], 0x3, &(0x7f00000017c0)=[@rights={0x28, 0x1, 0x1, [r5, r6, r7, r8, r9]}], 0x28}, 0x20008000) 2018/04/20 06:31:24 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:24 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) socketpair$inet(0x2, 0xb, 0xfff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_int(r1, 0x0, 0x31, &(0x7f0000000040), &(0x7f0000000080)=0x4) munlockall() r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f00000000c0)=""/56) 2018/04/20 06:31:24 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:24 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:24 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:24 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:24 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:24 executing program 6: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:24 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = dup(0xffffffffffffff9c) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000080)="552be7b3f5243f497729556ebf7bfd57922f441d074b98e6bdccd6a6062d4da6ec") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000040)=""/16) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1) 2018/04/20 06:31:24 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:24 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = accept4$alg(r0, 0x0, 0x0, 0x800) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000140)={{0x400, 0x100, 0x8, 0xfffffffffffffffd, 0x10000, 0x1ff}, 0xffff, 0xffffffffffffe1f6, 0xfffffffffffffff7}) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f00000000c0)={0x10001, 0x8, 0x5}) mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) munlockall() r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0xffeffffffffffffe, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000a94000/0x4000)=nil, 0x4000}) 2018/04/20 06:31:24 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:24 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() mbind(&(0x7f0000a93000/0x1000)=nil, 0x1000, 0x8001, &(0x7f0000000000)=0x3e, 0x5ff, 0x5) 2018/04/20 06:31:24 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munmap(&(0x7f0000a96000/0x1000)=nil, 0x1000) madvise(&(0x7f0000a93000/0x1000)=nil, 0x1000, 0x11) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1c3000) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000080)={0x7, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}}, {{0x2, 0x4e24, @rand_addr=0x2}}}, 0x108) munlockall() mbind(&(0x7f0000a93000/0x1000)=nil, 0x1000, 0x1, &(0x7f0000000000)=0x200, 0x57, 0x5) 2018/04/20 06:31:24 executing program 3: mlock2(&(0x7f0000a95000/0x3000)=nil, 0x3000, 0x1) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000a95000/0x4000)=nil, 0x4000}) munlockall() getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x5, 0x0, 0x1, 0xffffffffffffffdb, 0x780000000000, 0x6, 0xdf9d, {0x0, @in6={{0xa, 0x4e21, 0x7, @empty, 0x1ff}}, 0x101, 0x81, 0x1, 0xffffffffffff5a8a, 0x18}}, &(0x7f0000000140)=0xb0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000200)=0x384) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={r1, 0x3ff}, &(0x7f00000001c0)=0x8) 2018/04/20 06:31:25 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = socket(0xb, 0x1, 0x2) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x3, 0x30, 0x383b, 0x5}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e21, 0x9, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x16}}, 0x7fffffff}}}, &(0x7f0000000200)=0x84) 2018/04/20 06:31:25 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:25 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:25 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:25 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:25 executing program 3: mlock2(&(0x7f0000a94000/0x4000)=nil, 0x4000, 0xfffffffff7fffffc) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x8000, 0x0) syz_open_pts(r0, 0x80000) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000002c0)) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000003c0)) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000004c0), 0x4) r3 = geteuid() getgroups(0x2, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff]) chown(&(0x7f0000000240)='./file0\x00', r3, r4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup3(r5, r1, 0x80000) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000200), 0x4) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e23, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0xffff}}, 0x8001, 0x6, 0xffffffffffffffff, 0x2, 0x100}, &(0x7f0000000400)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000440)={r9, 0x7, 0x8000, 0x9, 0x1f, 0x6}, &(0x7f0000000480)=0x14) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}, 0x1, 0x20, 0x1ff}, {{}, 0xfffffffffffffffa, 0x9, 0x5}, {{r7, r8/1000+10000}, 0x0, 0x5, 0xfffffffffffffffb}, {{}, 0x5, 0x1000, 0x3}, {{0x77359400}, 0x65, 0x4, 0x3ff}, {{0x77359400}, 0x6286487d, 0x81, 0x2}, {{}, 0x1, 0x16d2, 0x2}, {{}, 0x4, 0x6, 0xfffffffffffffff8}, {{}, 0x6, 0x3, 0x6}], 0xd8) munlockall() 2018/04/20 06:31:25 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:26 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:26 executing program 0: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:26 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:26 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) sendmsg$nl_generic(r0, &(0x7f0000002600)={&(0x7f0000002440)={0x10, 0x0, 0x0, 0x6008240}, 0xc, &(0x7f00000025c0)={&(0x7f0000002480)={0x104, 0x10, 0x300, 0x70bd2c, 0x25dfdbfd, {0x13}, [@typed={0xc, 0x4b, @str='cgroup\x00'}, @nested={0xe4, 0x44, [@typed={0xc, 0x61, @u64=0x80000000}, @generic="3100e2bf1a04d72b6638b19bc17fca6f33e113a0c2fa9ea1d058bdf8ddde2fc6ec627c25942c89f3a93ecb83d500927cec528e23e0f454dd146255e2275d58c60f286460e15b8d921d70319df64b9295ce211acdac60c7756e8788146cf42610160fbfd5b252bc2b910e3d90e6624b142b6f21496c07fa527dae5c646c7d344cc69e9cd7c11df920645e5d9d6ad5c49844cf91e3e0d2e156fdb10c32b433421f41fb6c162df64200d78c5de2dc8a52b83b021ac0b00e05bd2f0a2cfb1d9127fcdb9c22bccd3f1607556e853d", @typed={0x4, 0x1f}, @typed={0x4, 0x90}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) munlockall() ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) rt_sigqueueinfo(r1, 0xd, &(0x7f0000000040)={0xa, 0x60, 0x3ff, 0x1}) 2018/04/20 06:31:26 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:26 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:26 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:26 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:26 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:26 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) munlockall() r0 = getpid() prctl$setptracer(0x59616d61, r0) tkill(r0, 0xe) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000100), &(0x7f0000000140)=0x40) r2 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept(r2, &(0x7f0000000000)=@nfc, &(0x7f0000000080)=0xfffffffffffffe0e) 2018/04/20 06:31:26 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:26 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:26 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:26 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:27 executing program 2: clone(0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:27 executing program 0: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:27 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:27 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:27 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") munlockall() 2018/04/20 06:31:27 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:27 executing program 2: clone(0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:27 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:27 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:27 executing program 2: clone(0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:27 executing program 2: clone(0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:27 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:28 executing program 0: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:29 executing program 5: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:29 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:29 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") munlockall() 2018/04/20 06:31:29 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:29 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:29 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:29 executing program 0: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:29 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:29 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:30 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="97") munlockall() 2018/04/20 06:31:30 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") munlockall() 2018/04/20 06:31:30 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:30 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:31 executing program 0: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:31 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:31 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:31 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:31 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:31 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") munlockall() 2018/04/20 06:31:31 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:31 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:32 executing program 0: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:32 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:32 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f02233", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:32 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") munlockall() 2018/04/20 06:31:32 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:32 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:32 executing program 3: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:32 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") munlockall() 2018/04/20 06:31:32 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:32 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") munlockall() 2018/04/20 06:31:32 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:32 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:32 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") 2018/04/20 06:31:32 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:32 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:32 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:33 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") 2018/04/20 06:31:33 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:33 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:34 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:34 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") munlockall() 2018/04/20 06:31:34 executing program 2: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:34 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:34 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:34 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") 2018/04/20 06:31:34 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:35 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:35 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:35 executing program 2: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:35 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:35 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b4") munlockall() 2018/04/20 06:31:35 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:35 executing program 5: clone(0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") munlockall() 2018/04/20 06:31:35 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:35 executing program 5: clone(0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") munlockall() 2018/04/20 06:31:35 executing program 5: clone(0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") munlockall() 2018/04/20 06:31:35 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:36 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:36 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:37 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:37 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:37 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:37 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b4") munlockall() 2018/04/20 06:31:37 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:37 executing program 3: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f02233", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:37 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:37 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:37 executing program 0: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:38 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:38 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:38 executing program 3: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f02233", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:38 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b4") munlockall() 2018/04/20 06:31:38 executing program 2: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() 2018/04/20 06:31:38 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:38 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:39 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208") munlockall() 2018/04/20 06:31:39 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:39 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:39 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:39 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000100)=0xffffffffffffff01) munlockall() bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}, 0xe4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) 2018/04/20 06:31:39 executing program 2: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b4") munlockall() 2018/04/20 06:31:39 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d") munlockall() 2018/04/20 06:31:39 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:39 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:39 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:40 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5") munlockall() 2018/04/20 06:31:40 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:40 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:40 executing program 2: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:40 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208") munlockall() 2018/04/20 06:31:40 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:40 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:40 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:40 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:41 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5") munlockall() 2018/04/20 06:31:41 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208") munlockall() 2018/04/20 06:31:41 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:41 executing program 2: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:41 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:41 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d") munlockall() 2018/04/20 06:31:41 executing program 4: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) munlockall() 2018/04/20 06:31:41 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:42 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") 2018/04/20 06:31:42 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5") munlockall() 2018/04/20 06:31:42 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:42 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:42 executing program 2: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:42 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:42 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d") munlockall() 2018/04/20 06:31:42 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc") munlockall() 2018/04/20 06:31:43 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="97") 2018/04/20 06:31:43 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") 2018/04/20 06:31:43 executing program 2: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:43 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340), &(0x7f0000000380)=0x8) 2018/04/20 06:31:43 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:43 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f5") munlockall() 2018/04/20 06:31:43 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208") munlockall() 2018/04/20 06:31:44 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d") munlockall() 2018/04/20 06:31:44 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="97") 2018/04/20 06:31:44 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f") 2018/04/20 06:31:44 executing program 2: clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:44 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340), &(0x7f0000000380)=0x8) 2018/04/20 06:31:44 executing program 3: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) 2018/04/20 06:31:44 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f5") munlockall() 2018/04/20 06:31:44 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208") munlockall() 2018/04/20 06:31:45 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:46 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d") 2018/04/20 06:31:46 executing program 4: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="97") 2018/04/20 06:31:46 executing program 3: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc") munlockall() 2018/04/20 06:31:46 executing program 2: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5") munlockall() 2018/04/20 06:31:46 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) socketpair(0x0, 0xb, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) munlockall() 2018/04/20 06:31:46 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208") munlockall() 2018/04/20 06:31:46 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:46 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f5") munlockall() 2018/04/20 06:31:46 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:46 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5") munlockall() 2018/04/20 06:31:46 executing program 2: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='statm\x00') openat$cgroup_int(r0, &(0x7f0000000040)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) munlockall() 2018/04/20 06:31:46 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d") 2018/04/20 06:31:46 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:47 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:47 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:47 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:47 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc") munlockall() 2018/04/20 06:31:47 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/20 06:31:47 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0x40000000000005) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:47 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) socket$nl_route(0x10, 0x3, 0x0) 2018/04/20 06:31:47 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:47 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) socket$nl_route(0x10, 0x3, 0x0) 2018/04/20 06:31:47 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d") 2018/04/20 06:31:47 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5") munlockall() 2018/04/20 06:31:47 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:48 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:31:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) 2018/04/20 06:31:48 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r4, 0x1, 0xfffffffffffffc1e}, 0x10) 2018/04/20 06:31:48 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 06:31:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) 2018/04/20 06:31:48 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) 2018/04/20 06:31:48 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:48 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9") munlockall() 2018/04/20 06:31:48 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:48 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:48 executing program 0: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d") munlockall() 2018/04/20 06:31:48 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") 2018/04/20 06:31:48 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x8}}, 0x0, 0x7}, &(0x7f0000000480)=0x90) [ 132.686932] QAT: Invalid ioctl [ 132.695521] QAT: Invalid ioctl [ 132.702429] QAT: Invalid ioctl 2018/04/20 06:31:49 executing program 5: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5") munlockall() 2018/04/20 06:31:49 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:49 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:49 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) 2018/04/20 06:31:49 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9") munlockall() 2018/04/20 06:31:49 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r3 = msgget(0x0, 0xe) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r4, 0x1, 0xfffffffffffffc1e}, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 06:31:49 executing program 1: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x8}}, 0x0, 0x7}, &(0x7f0000000480)=0x90) 2018/04/20 06:31:49 executing program 0: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d") munlockall() 2018/04/20 06:31:50 executing program 2: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x8}}, 0x0, 0x7}, &(0x7f0000000480)=0x90) 2018/04/20 06:31:50 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) 2018/04/20 06:31:50 executing program 7: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000080)=0x1000, 0x4) mlock2(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x80000000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) munlockall() 2018/04/20 06:31:50 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) 2018/04/20 06:31:50 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r3 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x200, 0x100000004, 0x7, 0x1}) r4 = msgget(0x0, 0xe) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000600)=""/110) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr}, @in6={0xa}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x0, 0xca, &(0x7f0000000500)="c63a33342d73a1ee5217e75f167c99eb2e5f3697e64bc8b6cd34c48af12c760a4dc9255c000953dbf98064a228ac45453c6412531dd140f974a507385622195cc97e37e67f2f1bab0ca85fcdca5ffa8f7cd6d50a3fa583e5b4a2472337f314507991350a73ce6b503d7160e1612abcf9e91d98dde195affeb0e519ea8b37356beb6308f5739d65dc9d44e3af1dff99a929226e7a13b7298ca74e29dfd147d55b43374daf2ed48537a9235a859b0559d8d28e14197453e884015c6262483283ce3c5982e5b9b0bcf0c411"}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f0000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r5, 0x1, 0xfffffffffffffc1e}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000002c0)=""/30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) 2018/04/20 06:31:50 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) 2018/04/20 06:31:50 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = accept4(r0, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) accept(r3, &(0x7f0000000100)=@generic, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)=""/136, &(0x7f0000000240)=0x88) 2018/04/20 06:31:50 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000)="cf3ba8a7ad6d107f0ef87fb1639b1374e0c42ee1d80a4a427927733222b3574b4cb3c4ce3354d93b122ac19d255e45477416737199f2b36dd8dc08a957dd048510141aafe98ceb01f159e4da2ca2f463831f4ae57cd792bcb3e8fd4b62e3cf37c745e524b6d675b7c56a10c1f39a22f4e5fe737e52f022331c61646e13966484ea9f62a6c5b26de1819b9b04331993b9932dbc867a9c8de446c304699d8c2cdb", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d536e97f1b479e53a1d18") munlockall() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000240)=0x20) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x8}}, 0x0, 0x7}, &(0x7f0000000480)=0x90) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x140, 0x0) [ 133.793872] QAT: Invalid ioctl [ 133.808411] QAT: Invalid ioctl [ 133.821832] QAT: Invalid ioctl [ 133.887388] QAT: Invalid ioctl [ 133.895353] QAT: Invalid ioctl [ 133.901627] QAT: Invalid ioctl 2018/04/20 06:31:51 executing program 7 (fault-call:0 fault-nth:0): clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="97") munlockall() 2018/04/20 06:31:51 executing program 1 (fault-call:1 fault-nth:0): mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="97") 2018/04/20 06:31:51 executing program 2 (fault-call:1 fault-nth:0): mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340), &(0x7f0000000380)=0x8) 2018/04/20 06:31:51 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x410000, 0x0) sendto$inet(r1, &(0x7f00000003c0)="d6fa5316a12191a75d88ed6d91c2ce45200f436c2a369914704c71bd6ae0030b43d5b7e4d5e26798b2a7a41e2c285bcc0cd7c2aacdeb81309c23a2172c51bd3f760992f24185f5f60d494b958e7e7407a612a2d7072686c852d9ecca9ab61b37dad8", 0x62, 0x40, 0x0, 0x0) bind$inet6(r0, &(0x7f00008cffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x40000000000005) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2000000000004, &(0x7f0000000000), 0x0) 2018/04/20 06:31:51 executing program 0: clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc21f59f9d") munlockall() 2018/04/20 06:31:51 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000b80)={0x7, 0x278d}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffdc2) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) 2018/04/20 06:31:51 executing program 6: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce2") munlockall() [ 133.983849] QAT: Invalid ioctl [ 133.995757] QAT: Invalid ioctl [ 133.999622] QAT: Invalid ioctl 2018/04/20 06:31:51 executing program 5 (fault-call:0 fault-nth:0): clone(0x40000000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="971daf9ce208f9e5bc") munlockall() [ 134.055935] FAULT_INJECTION: forcing a failure. [ 134.055935] name failslab, interval 1, probability 0, space 0, times 1 [ 134.067330] CPU: 1 PID: 8871 Comm: syz-executor2 Not tainted 4.16.0+ #84 [ 134.067954] FAULT_INJECTION: forcing a failure. [ 134.067954] name failslab, interval 1, probability 0, space 0, times 1 [ 134.074196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.074211] Call Trace: [ 134.074258] dump_stack+0x185/0x1d0 [ 134.074298] should_fail+0x87b/0xab0 [ 134.074400] should_failslab+0x279/0x2a0 [ 134.108903] ================================================================== [ 134.116261] BUG: KMSAN: uninit-value in update_stack_state+0x673/0xa40 [ 134.123001] CPU: 1 PID: 8871 Comm: syz-executor2 Not tainted 4.16.0+ #84 [ 134.129823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.139156] Call Trace: [ 134.141732] dump_stack+0x14a/0x1d0 [ 134.145347] ? update_stack_state+0x673/0xa40 [ 134.149827] kmsan_report+0x142/0x240 [ 134.153613] __msan_warning_32+0x6c/0xb0 [ 134.157664] update_stack_state+0x673/0xa40 [ 134.161980] unwind_next_frame+0x618/0xe50 [ 134.166203] ? should_failslab+0x1d0/0x2a0 [ 134.170424] show_trace_log_lvl+0xb49/0x1030 [ 134.174816] ? should_failslab+0x279/0x2a0 [ 134.179041] ? should_failslab+0x279/0x2a0 [ 134.183264] show_stack+0xfc/0x150 [ 134.186792] ? print_worker_info+0x1b0/0x660 [ 134.191189] dump_stack+0x185/0x1d0 [ 134.194806] should_fail+0x87b/0xab0 [ 134.198511] should_failslab+0x279/0x2a0 [ 134.202569] kmem_cache_alloc_node+0x151/0xc70 [ 134.207133] ? copy_process+0x6b0/0x9b30 [ 134.211183] copy_process+0x6b0/0x9b30 [ 134.215060] ? kstrtouint_from_user+0x373/0x410 [ 134.219713] ? kmsan_set_origin_inline+0x6b/0x120 [ 134.224545] ? kmsan_set_origin+0x9e/0x160 [ 134.228767] ? fsnotify+0x493/0x18f0 [ 134.232468] ? __msan_poison_alloca+0x71/0x1d0 [ 134.237040] _do_fork+0x311/0xf00 [ 134.240482] ? prepare_exit_to_usermode+0x149/0x3a0 [ 134.245488] SYSC_clone+0xf6/0x110 [ 134.249017] SyS_clone+0x77/0xa0 [ 134.252377] do_syscall_64+0x309/0x430 [ 134.256248] ? sys_vfork+0x70/0x70 [ 134.259784] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 134.264953] RIP: 0033:0x455379 [ 134.268134] RSP: 002b:00007f43a505fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 134.275823] RAX: ffffffffffffffda RBX: 00007f43a50606d4 RCX: 0000000000455379 [ 134.283074] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000040000000 [ 134.290324] RBP: 000000000072bea0 R08: 0000000020000140 R09: 0000000000000000 [ 134.297578] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000013 [ 134.304829] R13: 0000000000000051 R14: 00000000006f3838 R15: 0000000000000000 [ 134.312082] [ 134.313694] Local variable description: ----timeout@futex_wait [ 134.319638] Variable was created at: [ 134.323342] futex_wait+0xde/0xc20 [ 134.326864] do_futex+0x284a/0x6ad0 [ 134.330474] ================================================================== [ 134.337811] Disabling lock debugging due to kernel taint [ 134.343242] Kernel panic - not syncing: panic_on_warn set ... [ 134.343242] [ 134.350589] CPU: 1 PID: 8871 Comm: syz-executor2 Tainted: G B 4.16.0+ #84 [ 134.358717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.368053] Call Trace: [ 134.370629] dump_stack+0x14a/0x1d0 [ 134.374246] panic+0x39d/0x940 [ 134.377440] ? update_stack_state+0x673/0xa40 [ 134.381920] kmsan_report+0x238/0x240 [ 134.385707] __msan_warning_32+0x6c/0xb0 [ 134.389758] update_stack_state+0x673/0xa40 [ 134.394077] unwind_next_frame+0x618/0xe50 [ 134.398313] ? should_failslab+0x1d0/0x2a0 [ 134.402539] show_trace_log_lvl+0xb49/0x1030 [ 134.406934] ? should_failslab+0x279/0x2a0 [ 134.411153] ? should_failslab+0x279/0x2a0 [ 134.415378] show_stack+0xfc/0x150 [ 134.418904] ? print_worker_info+0x1b0/0x660 [ 134.423295] dump_stack+0x185/0x1d0 [ 134.426909] should_fail+0x87b/0xab0 [ 134.430611] should_failslab+0x279/0x2a0 [ 134.434662] kmem_cache_alloc_node+0x151/0xc70 [ 134.439225] ? copy_process+0x6b0/0x9b30 [ 134.443283] copy_process+0x6b0/0x9b30 [ 134.447176] ? kstrtouint_from_user+0x373/0x410 [ 134.451834] ? kmsan_set_origin_inline+0x6b/0x120 [ 134.456667] ? kmsan_set_origin+0x9e/0x160 [ 134.460888] ? fsnotify+0x493/0x18f0 [ 134.464588] ? __msan_poison_alloca+0x71/0x1d0 [ 134.469155] _do_fork+0x311/0xf00 [ 134.472602] ? prepare_exit_to_usermode+0x149/0x3a0 [ 134.477607] SYSC_clone+0xf6/0x110 [ 134.481132] SyS_clone+0x77/0xa0 [ 134.484481] do_syscall_64+0x309/0x430 [ 134.488355] ? sys_vfork+0x70/0x70 [ 134.491881] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 134.497052] RIP: 0033:0x455379 [ 134.500309] RSP: 002b:00007f43a505fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 134.508003] RAX: ffffffffffffffda RBX: 00007f43a50606d4 RCX: 0000000000455379 [ 134.515261] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000040000000 [ 134.522515] RBP: 000000000072bea0 R08: 0000000020000140 R09: 0000000000000000 [ 134.529768] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000013 [ 134.537024] R13: 0000000000000051 R14: 00000000006f3838 R15: 0000000000000000 [ 134.544729] Dumping ftrace buffer: [ 134.548252] (ftrace buffer empty) [ 134.551936] Kernel Offset: disabled [ 134.555535] Rebooting in 86400 seconds..