[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 31.394992] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 34.707724] random: sshd: uninitialized urandom read (32 bytes read) [ 35.277370] random: sshd: uninitialized urandom read (32 bytes read) [ 36.674665] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.22' (ECDSA) to the list of known hosts. [ 42.398020] random: sshd: uninitialized urandom read (32 bytes read) 2018/05/08 19:26:00 fuzzer started 2018/05/08 19:26:01 dialing manager at 10.128.0.26:35805 [ 62.817509] can: request_module (can-proto-0) failed. [ 62.829091] can: request_module (can-proto-0) failed. 2018/05/08 19:26:22 kcov=true, comps=false 2018/05/08 19:26:24 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) syz_fuse_mount(&(0x7f0000000140)='.', 0x0, 0x0, 0x0, 0x0, 0x201c21) 2018/05/08 19:26:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)='/dev/uinput\x00', 0xfffffffffffffffa) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x303, &(0x7f0000000240), 0x10}}], 0x2, 0x0) 2018/05/08 19:26:24 executing program 7: r0 = socket(0x10, 0x1000000802, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000005fc8)={&(0x7f0000000ff4)={0x10}, 0xc, &(0x7f0000005000)={&(0x7f0000000040)=@ipv6_getnetconf={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@NETCONFA_IFINDEX={0x8, 0x1, r1}]}, 0x1c}, 0x1}, 0x0) 2018/05/08 19:26:24 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000333f88)={0x2, 0x5, 0x0, 0xc, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2018/05/08 19:26:24 executing program 5: r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x7, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000033000)={0xfb, @time}) 2018/05/08 19:26:24 executing program 6: r0 = memfd_create(&(0x7f0000000040)='vboxnet0\x00', 0x4) ftruncate(r0, 0x0) 2018/05/08 19:26:24 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000140)='cgroup*\x00', 0x0, 0x0, &(0x7f0000000180)) 2018/05/08 19:26:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x7ff, 0x0, 0x0, 0xfffffffffffffff7}) [ 67.584759] IPVS: ftp: loaded support on port[0] = 21 [ 67.658789] IPVS: ftp: loaded support on port[0] = 21 [ 67.751746] IPVS: ftp: loaded support on port[0] = 21 [ 67.753709] IPVS: ftp: loaded support on port[0] = 21 [ 67.773844] IPVS: ftp: loaded support on port[0] = 21 [ 67.807319] IPVS: ftp: loaded support on port[0] = 21 [ 67.808281] IPVS: ftp: loaded support on port[0] = 21 [ 67.815686] IPVS: ftp: loaded support on port[0] = 21 [ 69.497558] ip (4706) used greatest stack depth: 54392 bytes left [ 70.604164] ip (4789) used greatest stack depth: 54328 bytes left [ 70.825578] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.832142] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.874827] device bridge_slave_0 entered promiscuous mode [ 71.072466] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.079009] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.131959] device bridge_slave_1 entered promiscuous mode [ 71.280304] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.402881] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.409401] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.423430] device bridge_slave_0 entered promiscuous mode [ 71.431896] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.438431] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.455820] device bridge_slave_0 entered promiscuous mode [ 71.480845] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.487492] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.495861] device bridge_slave_0 entered promiscuous mode [ 71.520746] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.527235] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.563135] device bridge_slave_0 entered promiscuous mode [ 71.575949] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.582474] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.606149] device bridge_slave_0 entered promiscuous mode [ 71.626394] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.642024] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.648561] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.660321] device bridge_slave_1 entered promiscuous mode [ 71.668540] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.675077] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.692232] device bridge_slave_0 entered promiscuous mode [ 71.712568] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.719129] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.752238] device bridge_slave_1 entered promiscuous mode [ 71.765865] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.772399] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.787861] device bridge_slave_0 entered promiscuous mode [ 71.803028] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.809533] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.826411] device bridge_slave_1 entered promiscuous mode [ 71.841504] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.848008] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.866012] device bridge_slave_1 entered promiscuous mode [ 71.883915] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.890417] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.910727] device bridge_slave_1 entered promiscuous mode [ 71.926261] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.932774] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.955197] device bridge_slave_1 entered promiscuous mode [ 71.980451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.993631] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.014873] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.021392] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.049420] device bridge_slave_1 entered promiscuous mode [ 72.065907] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.077516] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.085944] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.193809] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.206851] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.215104] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.242242] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.273767] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.292190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.315922] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.324910] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.458748] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.479698] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.578886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.712262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.719876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.840561] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.859361] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.941173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 72.948263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.976335] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.994569] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.029959] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.081992] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.098126] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.129968] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.218234] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.230316] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.265885] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.283345] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.299118] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.383351] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.390382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.408201] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.415300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.469857] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.476928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.498797] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.506384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.532744] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.544189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.559643] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.576899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.585082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.638535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.647942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.668223] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.677189] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.689666] team0: Port device team_slave_0 added [ 73.719168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.742771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.752429] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.763347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.782351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.816504] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.824335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.847855] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.856490] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.885492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.904079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.930358] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.951759] team0: Port device team_slave_1 added [ 73.975160] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.982772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.172744] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.179799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.193998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.345796] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.367329] team0: Port device team_slave_0 added [ 74.406980] ip (5040) used greatest stack depth: 53800 bytes left [ 74.418960] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.446260] team0: Port device team_slave_0 added [ 74.472252] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.480600] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.499258] team0: Port device team_slave_0 added [ 74.518914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.536409] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.576914] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.586018] team0: Port device team_slave_0 added [ 74.599257] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.617565] team0: Port device team_slave_0 added [ 74.634070] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.644904] team0: Port device team_slave_0 added [ 74.651695] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.669996] team0: Port device team_slave_0 added [ 74.682589] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.699234] team0: Port device team_slave_1 added [ 74.711791] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.723499] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.756778] team0: Port device team_slave_1 added [ 74.778373] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.792077] team0: Port device team_slave_1 added [ 74.825733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.841642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.860227] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.868756] team0: Port device team_slave_1 added [ 74.878279] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.886100] team0: Port device team_slave_1 added [ 74.905424] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.915847] team0: Port device team_slave_1 added [ 74.928670] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.939684] team0: Port device team_slave_1 added [ 74.946952] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.955911] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.966776] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.985520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.004652] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.043098] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.078236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.092640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.103386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.120478] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.141426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.150954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.163658] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.170691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.179526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.197191] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.207676] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.216350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.224240] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.231806] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.243458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.263882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.297980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.333838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.368886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.385622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.405833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.413831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.421694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.429831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.459387] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.466956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.477357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.489227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.496507] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.506700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.517492] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.529117] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.536138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.587085] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.615910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.648011] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.671763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.687336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.696364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.704478] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.712173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.719997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.729086] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.737094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.745828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.777143] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.789944] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.799635] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.808080] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.817768] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.825599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.843829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.867708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.905383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.934162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.969990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.978739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.987103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.995117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.003383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.012493] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.023145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.032239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.054268] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.075666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.084877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.121323] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.149714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.176372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.185719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.194210] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.202223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.213383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.226771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.242787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.262135] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.270175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.288405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.312522] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.367362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.391542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.753316] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.759826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.766700] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.773167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.805288] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.816904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.460274] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.466784] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.473625] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.480101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.533253] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.563257] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.569752] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.576617] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.583131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.591154] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.603100] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.609594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.616495] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.622958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.676451] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.686734] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.693221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.700123] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.706627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.740570] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.776738] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.783255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.790209] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.796709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.853781] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.860759] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.867255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.874169] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.880640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.894851] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.906649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.924352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.942620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.958559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.974899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.983365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.033691] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.040193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.047129] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.053593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.131615] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.967214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 86.799838] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.216765] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.267375] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.551525] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.595427] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.648767] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.693698] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.711488] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.010489] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.042334] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.076389] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.357566] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.443360] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.449727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.459405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.525478] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.545381] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.596838] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.786068] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.794084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.812161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.897482] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.903799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.916584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.968674] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 89.232412] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.325204] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.331585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.343299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.378602] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.384910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.397641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.443224] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.460641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.476963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.560320] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.566640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.579568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.666927] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.723893] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.850962] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.857313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.900000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.157311] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.258563] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.328329] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.401643] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.750143] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/08 19:26:53 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) syz_fuse_mount(&(0x7f0000000140)='.', 0x0, 0x0, 0x0, 0x0, 0x201c21) 2018/05/08 19:26:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)='/dev/uinput\x00', 0xfffffffffffffffa) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x303, &(0x7f0000000240), 0x10}}], 0x2, 0x0) 2018/05/08 19:26:53 executing program 5: r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x7, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000033000)={0xfb, @time}) 2018/05/08 19:26:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x7ff, 0x0, 0x0, 0xfffffffffffffff7}) 2018/05/08 19:26:53 executing program 7: r0 = socket(0x10, 0x1000000802, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000005fc8)={&(0x7f0000000ff4)={0x10}, 0xc, &(0x7f0000005000)={&(0x7f0000000040)=@ipv6_getnetconf={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@NETCONFA_IFINDEX={0x8, 0x1, r1}]}, 0x1c}, 0x1}, 0x0) 2018/05/08 19:26:53 executing program 6: r0 = memfd_create(&(0x7f0000000040)='vboxnet0\x00', 0x4) ftruncate(r0, 0x0) 2018/05/08 19:26:53 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000140)='cgroup*\x00', 0x0, 0x0, &(0x7f0000000180)) 2018/05/08 19:26:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000333f88)={0x2, 0x5, 0x0, 0xc, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2018/05/08 19:26:53 executing program 7: r0 = socket(0x10, 0x1000000802, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000005fc8)={&(0x7f0000000ff4)={0x10}, 0xc, &(0x7f0000005000)={&(0x7f0000000040)=@ipv6_getnetconf={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@NETCONFA_IFINDEX={0x8, 0x1, r1}]}, 0x1c}, 0x1}, 0x0) 2018/05/08 19:26:53 executing program 6: r0 = memfd_create(&(0x7f0000000040)='vboxnet0\x00', 0x4) ftruncate(r0, 0x0) 2018/05/08 19:26:53 executing program 5: r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x7, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000033000)={0xfb, @time}) 2018/05/08 19:26:53 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) syz_fuse_mount(&(0x7f0000000140)='.', 0x0, 0x0, 0x0, 0x0, 0x201c21) 2018/05/08 19:26:53 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000140)='cgroup*\x00', 0x0, 0x0, &(0x7f0000000180)) 2018/05/08 19:26:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)='/dev/uinput\x00', 0xfffffffffffffffa) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x303, &(0x7f0000000240), 0x10}}], 0x2, 0x0) 2018/05/08 19:26:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x7ff, 0x0, 0x0, 0xfffffffffffffff7}) 2018/05/08 19:26:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000333f88)={0x2, 0x5, 0x0, 0xc, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2018/05/08 19:26:53 executing program 6: r0 = memfd_create(&(0x7f0000000040)='vboxnet0\x00', 0x4) ftruncate(r0, 0x0) 2018/05/08 19:26:53 executing program 7: r0 = socket(0x10, 0x1000000802, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000005fc8)={&(0x7f0000000ff4)={0x10}, 0xc, &(0x7f0000005000)={&(0x7f0000000040)=@ipv6_getnetconf={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@NETCONFA_IFINDEX={0x8, 0x1, r1}]}, 0x1c}, 0x1}, 0x0) 2018/05/08 19:26:53 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000140)='cgroup*\x00', 0x0, 0x0, &(0x7f0000000180)) 2018/05/08 19:26:53 executing program 5: r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x7, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000033000)={0xfb, @time}) 2018/05/08 19:26:53 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) syz_fuse_mount(&(0x7f0000000140)='.', 0x0, 0x0, 0x0, 0x0, 0x201c21) 2018/05/08 19:26:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x7ff, 0x0, 0x0, 0xfffffffffffffff7}) 2018/05/08 19:26:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)='/dev/uinput\x00', 0xfffffffffffffffa) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x303, &(0x7f0000000240), 0x10}}], 0x2, 0x0) 2018/05/08 19:26:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000333f88)={0x2, 0x5, 0x0, 0xc, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2018/05/08 19:26:53 executing program 6: r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x7, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000033000)={0xfb, @time}) 2018/05/08 19:26:54 executing program 7: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x10f34a, 0x0) write$sndseq(r0, &(0x7f00000000c0), 0x0) 2018/05/08 19:26:54 executing program 3: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x818c2500, &(0x7f00008da000), &(0x7f00002b7000), &(0x7f0000bd1000), &(0x7f0000286fd1)) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000ff2000/0xe000)=nil, 0x4000) 2018/05/08 19:26:54 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000040)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) 2018/05/08 19:26:54 executing program 0: r0 = userfaultfd(0x0) r1 = dup(r0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000240)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) 2018/05/08 19:26:54 executing program 1: r0 = inotify_init1(0x0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00007fbffd)='H', 0x1) sendfile(r1, r1, &(0x7f00000011c0), 0x4000fed) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x200000011, r1, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setregset(0x4205, r2, 0x202, &(0x7f0000000000)) 2018/05/08 19:26:54 executing program 4: r0 = socket$inet(0xa, 0x801, 0x0) getsockopt$bt_hci(r0, 0x6, 0x1, &(0x7f0000000040)=""/245, &(0x7f0000000140)=0xf5) 2018/05/08 19:26:54 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000016000)={0x0, &(0x7f0000000040)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x24002, 0x0) pipe(&(0x7f0000000400)) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000300)={0x0}) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000340)={r0}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x5}) 2018/05/08 19:26:55 executing program 6: r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x7, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000033000)={0xfb, @time}) 2018/05/08 19:26:55 executing program 1: r0 = inotify_init1(0x0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00007fbffd)='H', 0x1) sendfile(r1, r1, &(0x7f00000011c0), 0x4000fed) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x200000011, r1, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setregset(0x4205, r2, 0x202, &(0x7f0000000000)) 2018/05/08 19:26:55 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000040)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) 2018/05/08 19:26:55 executing program 3: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x818c2500, &(0x7f00008da000), &(0x7f00002b7000), &(0x7f0000bd1000), &(0x7f0000286fd1)) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000ff2000/0xe000)=nil, 0x4000) 2018/05/08 19:26:55 executing program 4: r0 = socket$inet(0xa, 0x801, 0x0) getsockopt$bt_hci(r0, 0x6, 0x1, &(0x7f0000000040)=""/245, &(0x7f0000000140)=0xf5) 2018/05/08 19:26:55 executing program 7: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x10f34a, 0x0) write$sndseq(r0, &(0x7f00000000c0), 0x0) 2018/05/08 19:26:55 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000016000)={0x0, &(0x7f0000000040)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x24002, 0x0) pipe(&(0x7f0000000400)) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000300)={0x0}) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000340)={r0}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x5}) 2018/05/08 19:26:55 executing program 0: r0 = userfaultfd(0x0) r1 = dup(r0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000240)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) 2018/05/08 19:26:55 executing program 3: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x818c2500, &(0x7f00008da000), &(0x7f00002b7000), &(0x7f0000bd1000), &(0x7f0000286fd1)) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000ff2000/0xe000)=nil, 0x4000) 2018/05/08 19:26:55 executing program 7: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x10f34a, 0x0) write$sndseq(r0, &(0x7f00000000c0), 0x0) 2018/05/08 19:26:55 executing program 6: r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x7, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000033000)={0xfb, @time}) 2018/05/08 19:26:55 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000040)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) 2018/05/08 19:26:55 executing program 4: r0 = socket$inet(0xa, 0x801, 0x0) getsockopt$bt_hci(r0, 0x6, 0x1, &(0x7f0000000040)=""/245, &(0x7f0000000140)=0xf5) 2018/05/08 19:26:56 executing program 3: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x818c2500, &(0x7f00008da000), &(0x7f00002b7000), &(0x7f0000bd1000), &(0x7f0000286fd1)) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000ff2000/0xe000)=nil, 0x4000) 2018/05/08 19:26:56 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000016000)={0x0, &(0x7f0000000040)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x24002, 0x0) pipe(&(0x7f0000000400)) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000300)={0x0}) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000340)={r0}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x5}) 2018/05/08 19:26:56 executing program 7: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x10f34a, 0x0) write$sndseq(r0, &(0x7f00000000c0), 0x0) 2018/05/08 19:26:56 executing program 0: r0 = userfaultfd(0x0) r1 = dup(r0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000240)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) 2018/05/08 19:26:56 executing program 4: r0 = socket$inet(0xa, 0x801, 0x0) getsockopt$bt_hci(r0, 0x6, 0x1, &(0x7f0000000040)=""/245, &(0x7f0000000140)=0xf5) 2018/05/08 19:26:56 executing program 1: r0 = inotify_init1(0x0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00007fbffd)='H', 0x1) sendfile(r1, r1, &(0x7f00000011c0), 0x4000fed) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x200000011, r1, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setregset(0x4205, r2, 0x202, &(0x7f0000000000)) 2018/05/08 19:26:56 executing program 6: syz_emit_ethernet(0x19b, &(0x7f0000000540)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv6={0x86dd, {0x0, 0x6, "20a17e", 0x10, 0x2b, 0x0, @dev={0xfe, 0x80}, @local={0xfe, 0x80, [], 0xaa}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}}}}}}}, 0x0) 2018/05/08 19:26:56 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000040)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) 2018/05/08 19:26:56 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000080)=[{0x18, 0x0, 0x7, '@\a'}], 0x18}}], 0x2, 0x0) 2018/05/08 19:26:56 executing program 7: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000006000)="240000004200030207fffd946fa283bc0aeee6d87986c497271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 2018/05/08 19:26:56 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5b7e) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000000000)=0xfe90, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@empty, 0x0, r3}) 2018/05/08 19:26:56 executing program 6: syz_emit_ethernet(0x19b, &(0x7f0000000540)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv6={0x86dd, {0x0, 0x6, "20a17e", 0x10, 0x2b, 0x0, @dev={0xfe, 0x80}, @local={0xfe, 0x80, [], 0xaa}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}}}}}}}, 0x0) 2018/05/08 19:26:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000021000)}, 0xc100) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000a80)="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", 0x585}], 0x1}, 0x0) 2018/05/08 19:26:56 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000016000)={0x0, &(0x7f0000000040)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x24002, 0x0) pipe(&(0x7f0000000400)) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000300)={0x0}) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000340)={r0}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x5}) 2018/05/08 19:26:56 executing program 0: r0 = userfaultfd(0x0) r1 = dup(r0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000240)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) 2018/05/08 19:26:56 executing program 7: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000006000)="240000004200030207fffd946fa283bc0aeee6d87986c497271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 2018/05/08 19:26:56 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000080)=[{0x18, 0x0, 0x7, '@\a'}], 0x18}}], 0x2, 0x0) 2018/05/08 19:26:57 executing program 6: syz_emit_ethernet(0x19b, &(0x7f0000000540)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv6={0x86dd, {0x0, 0x6, "20a17e", 0x10, 0x2b, 0x0, @dev={0xfe, 0x80}, @local={0xfe, 0x80, [], 0xaa}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}}}}}}}, 0x0) 2018/05/08 19:26:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000007ffc), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000005ff0)={0x0, &(0x7f0000964ff8)}, 0x10) 2018/05/08 19:26:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000021000)}, 0xc100) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000a80)="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", 0x585}], 0x1}, 0x0) 2018/05/08 19:26:57 executing program 7: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000006000)="240000004200030207fffd946fa283bc0aeee6d87986c497271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 2018/05/08 19:26:57 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000080)=[{0x18, 0x0, 0x7, '@\a'}], 0x18}}], 0x2, 0x0) 2018/05/08 19:26:57 executing program 0: unshare(0x40000000) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x181800, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) r0 = socket$inet(0x2, 0x3, 0x200000000006) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x0, 0x401, 0x0, 0x2, 0x18cda1e9, 0x8, 0x0, 0x3}, &(0x7f0000001200)=0x20) accept4$ipx(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) bind$inet(r0, &(0x7f0000103ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) 2018/05/08 19:26:57 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5b7e) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000000000)=0xfe90, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@empty, 0x0, r3}) 2018/05/08 19:26:57 executing program 1: r0 = inotify_init1(0x0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00007fbffd)='H', 0x1) sendfile(r1, r1, &(0x7f00000011c0), 0x4000fed) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x200000011, r1, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setregset(0x4205, r2, 0x202, &(0x7f0000000000)) [ 99.356756] IPVS: ftp: loaded support on port[0] = 21 2018/05/08 19:26:57 executing program 6: syz_emit_ethernet(0x19b, &(0x7f0000000540)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv6={0x86dd, {0x0, 0x6, "20a17e", 0x10, 0x2b, 0x0, @dev={0xfe, 0x80}, @local={0xfe, 0x80, [], 0xaa}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}}}}}}}, 0x0) 2018/05/08 19:26:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000021000)}, 0xc100) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000a80)="05024f8489aac2302409371ae4c589362dbfa3db172a5e73e77f6a392957e4bf226024b1c7e1c363d8f756258f2b478a4e25b98312159822d96e4727006f7f23e9a4f6a139c82efb2b5f77e2836c22694fce1ea84736bb19bc4e824b1ccad6128aa6587e6096b9c694d218c9346d57f24136a15d4736ed7ae0d7a68092ab0da01f2614952fb62fd6f15fc600471f9b7425aec7980197ec55672150aa66bc93b01d95f0913994e592e5bac222d24a76f7c089506d311658c53483212b6fdc983bcb73fabafa284cd3916a3fe37ad7839fa7e360b76c836c0d6418c3c8fee09c30c92aef58dc7181fa92723eb632d7e279b58e1124427acb38e0aff3599f559bf2309f77909fecaec8d021fb2b448436c258aa65bd3ccc87f408c292fd1530e32acd79bb4230274e277eebbd30436993fed95d5831506042adaac6853f92b63acaaaf25a52a57045314c267df6cb96fcc047a864eedada0bf08708db11f99a70a581e5f33fb693837eee2bce6c93bbfc4f9f766ed8121343513790317d3fc2eee5ee066957928f7d1e3d88791c20eb6f4e82837aa31eae007f94cfd1f9e21787400f6a228eb9fa04b2b354f6a6fa026e3de69d0850610a172e13b92e313091bf423c246c8ef0f891079ebfc72f17b19a33fe0f60aa9f7fa636d92dcd8a8fa71643cd65994a9c4107f790f01770448d60f46965b9e85dece3c6bbea297e72c01104b952f4f7f2a924d114122bc9aeb2a494b49417f3ec98a9d1ef43a6636d4dd237ebe83d66ca53a1732ec10f408f1b10ef87424c83595d964443aee3311502366eb41a6de0fee3f92b34a2ba59fd9bc5b4b39cb30377a9a794125de4b9bd099f02c3972cee999c0a30fabe22c0d783d09e6524c10b6a15066bfd5965f7c4787b1eafc42736bad6761b498eb6c1a8864c3d0aa78a7b6c2bb2568c84af7a8ba00f59f27825b36c4da92cde0bb255660581d60e2d126ac47413c00136a01371d114f8e33e1c68e61ad1ac012c82639f88840178de82b3c4de7272df444059da2451ba5912a48f61cf5597959f2d14aa2a1b3bf295fe9be289976f18e19b7e2dd73e7d895af6f37c437ec9817e0dfcc9e9b8d18e09c0250e4a6f5955353d9aa546ed6f07af4f111b396b3a3c2e27213bf0ec791a4c9faaea3761058cf18a0d212b4cd919769a28f5db5828b782651509f87cecfdc63fb05bca1bd9da27fb59ae988ef5542b2d52f0257178b60d89293df4cbf8ac295469ba219113f38dbc37f1bbad9e182067f133b93c8457bb8aa9615776547b08f57896fd8420e2cecd4877e350f72f65fa30ecb15cff7d0a7b7b11876156025767ff8e783d3134ba1dacefd6aa02bc026dc9fd48f202eccfa234cf6d20b46e52172e7c296c083d33aac1268d6e7308e235144341fcb0fa596060444a72d43dd4b6c33d624ee96767990f2c316a2ba61423b796e63c4bc40f8795809b14251b92aa58fe94729282b0af3e8e892bf4f6fa97b11e9f520d181c65554c4079eb7f685aee90c26f456709b9b6c85134badfb4973cebf12ef1f6a362ce9a811fb63fd35ff714d8a21313e000d7d51afd353ef1bd315a7f9b2feb05f0a90c522c438a6b1e1aeb99f761bc5c70f6760f2bb7e0e98f1fbd5b94bfd502cd4b5301aa35e064a3c14fc9fd80333aeda0ab97c62b6fe9e8f45c9028b8c29c28cae43d980494e26971d994456e5c61c33885b08924ee2e45019c99a838f0577af42fc07510277d0dd7df03b4f05c52c766ac4a8bcf789688d104f345b696f3f4524772ca781b925da23ff6988835aad4ec0153a4654c63882210e78e2cf51abcff14ae087858b97fe82baaa73d816422f8679594f86337fb9073cf4073be04144fc6128aa4d378ad5c8f911132525875407a9dfad3fe23f8bbbee65a05e5951e64e0e48d274fdd5079c6836147d391228fa6d8ffa91035c6dc3b93a2249120ddcac18dec8b3ffe17cb7cc9d8f06529a096eff9c234f2d97d3a54", 0x585}], 0x1}, 0x0) 2018/05/08 19:26:57 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000080)=[{0x18, 0x0, 0x7, '@\a'}], 0x18}}], 0x2, 0x0) 2018/05/08 19:26:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000007ffc), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000005ff0)={0x0, &(0x7f0000964ff8)}, 0x10) 2018/05/08 19:26:57 executing program 7: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000006000)="240000004200030207fffd946fa283bc0aeee6d87986c497271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 2018/05/08 19:26:57 executing program 6: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5b7e) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000000000)=0xfe90, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@empty, 0x0, r3}) [ 99.630255] IPVS: ftp: loaded support on port[0] = 21 2018/05/08 19:26:58 executing program 6: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5b7e) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000000000)=0xfe90, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@empty, 0x0, r3}) 2018/05/08 19:26:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000007ffc), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000005ff0)={0x0, &(0x7f0000964ff8)}, 0x10) 2018/05/08 19:26:58 executing program 0: unshare(0x40000000) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x181800, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) r0 = socket$inet(0x2, 0x3, 0x200000000006) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x0, 0x401, 0x0, 0x2, 0x18cda1e9, 0x8, 0x0, 0x3}, &(0x7f0000001200)=0x20) accept4$ipx(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) bind$inet(r0, &(0x7f0000103ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) 2018/05/08 19:26:58 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5b7e) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000000000)=0xfe90, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@empty, 0x0, r3}) 2018/05/08 19:26:58 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x80000002286, &(0x7f0000c95ffe)) 2018/05/08 19:26:58 executing program 1: unshare(0x40000000) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x181800, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) r0 = socket$inet(0x2, 0x3, 0x200000000006) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x0, 0x401, 0x0, 0x2, 0x18cda1e9, 0x8, 0x0, 0x3}, &(0x7f0000001200)=0x20) accept4$ipx(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) bind$inet(r0, &(0x7f0000103ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) 2018/05/08 19:26:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000021000)}, 0xc100) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000a80)="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", 0x585}], 0x1}, 0x0) 2018/05/08 19:26:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x40004e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) [ 100.593114] IPVS: ftp: loaded support on port[0] = 21 [ 100.612495] IPVS: ftp: loaded support on port[0] = 21 2018/05/08 19:26:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x40004e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) 2018/05/08 19:26:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f000000d000)={0x10}, 0xc, &(0x7f0000007000)={&(0x7f0000015000)={0x24, 0x28, 0x301, 0x0, 0x0, {}, [@nested={0x4}, @generic="0ebfbbc5694a738607"]}, 0x24}, 0x1}, 0x0) 2018/05/08 19:26:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000007ffc), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000005ff0)={0x0, &(0x7f0000964ff8)}, 0x10) 2018/05/08 19:26:58 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x80000002286, &(0x7f0000c95ffe)) 2018/05/08 19:26:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x40004e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) 2018/05/08 19:26:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f000000d000)={0x10}, 0xc, &(0x7f0000007000)={&(0x7f0000015000)={0x24, 0x28, 0x301, 0x0, 0x0, {}, [@nested={0x4}, @generic="0ebfbbc5694a738607"]}, 0x24}, 0x1}, 0x0) 2018/05/08 19:26:59 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x80000002286, &(0x7f0000c95ffe)) 2018/05/08 19:26:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x40004e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) 2018/05/08 19:26:59 executing program 1: unshare(0x40000000) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x181800, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) r0 = socket$inet(0x2, 0x3, 0x200000000006) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x0, 0x401, 0x0, 0x2, 0x18cda1e9, 0x8, 0x0, 0x3}, &(0x7f0000001200)=0x20) accept4$ipx(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) bind$inet(r0, &(0x7f0000103ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) 2018/05/08 19:26:59 executing program 0: unshare(0x40000000) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x181800, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) r0 = socket$inet(0x2, 0x3, 0x200000000006) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x0, 0x401, 0x0, 0x2, 0x18cda1e9, 0x8, 0x0, 0x3}, &(0x7f0000001200)=0x20) accept4$ipx(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) bind$inet(r0, &(0x7f0000103ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) 2018/05/08 19:26:59 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x80000002286, &(0x7f0000c95ffe)) 2018/05/08 19:26:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f000000d000)={0x10}, 0xc, &(0x7f0000007000)={&(0x7f0000015000)={0x24, 0x28, 0x301, 0x0, 0x0, {}, [@nested={0x4}, @generic="0ebfbbc5694a738607"]}, 0x24}, 0x1}, 0x0) 2018/05/08 19:26:59 executing program 6: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5b7e) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000000000)=0xfe90, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@empty, 0x0, r3}) 2018/05/08 19:26:59 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5b7e) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000000000)=0xfe90, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@empty, 0x0, r3}) [ 101.510239] IPVS: ftp: loaded support on port[0] = 21 [ 101.527331] IPVS: ftp: loaded support on port[0] = 21 2018/05/08 19:26:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f000000d000)={0x10}, 0xc, &(0x7f0000007000)={&(0x7f0000015000)={0x24, 0x28, 0x301, 0x0, 0x0, {}, [@nested={0x4}, @generic="0ebfbbc5694a738607"]}, 0x24}, 0x1}, 0x0) 2018/05/08 19:26:59 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f000056effc), 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x5, "0eca149e83"}, &(0x7f0000001140)=0xd) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ee8672c93340f643a664f1306ab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c8840f476c8d753d000aa8faf8fb574dbffa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000100)={0xa7}) 2018/05/08 19:26:59 executing program 5: unshare(0x400) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000200)=""/214, 0xd6, 0x0, &(0x7f0000000340)) 2018/05/08 19:26:59 executing program 7: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x2, &(0x7f0000000200)=[&(0x7f000006a000/0x2000)=nil, &(0x7f0000be2000/0x4000)=nil], 0x0, &(0x7f0000000240), 0x0) 2018/05/08 19:26:59 executing program 5: unshare(0x400) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000200)=""/214, 0xd6, 0x0, &(0x7f0000000340)) 2018/05/08 19:26:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='gretap0\x00', 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x840, &(0x7f00000002c0)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/05/08 19:26:59 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f000056effc), 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x5, "0eca149e83"}, &(0x7f0000001140)=0xd) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ee8672c93340f643a664f1306ab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c8840f476c8d753d000aa8faf8fb574dbffa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000100)={0xa7}) 2018/05/08 19:26:59 executing program 7: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x2, &(0x7f0000000200)=[&(0x7f000006a000/0x2000)=nil, &(0x7f0000be2000/0x4000)=nil], 0x0, &(0x7f0000000240), 0x0) 2018/05/08 19:27:00 executing program 7: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x2, &(0x7f0000000200)=[&(0x7f000006a000/0x2000)=nil, &(0x7f0000be2000/0x4000)=nil], 0x0, &(0x7f0000000240), 0x0) 2018/05/08 19:27:00 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f000056effc), 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x5, "0eca149e83"}, &(0x7f0000001140)=0xd) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ee8672c93340f643a664f1306ab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c8840f476c8d753d000aa8faf8fb574dbffa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000100)={0xa7}) 2018/05/08 19:27:00 executing program 4: mkdir(&(0x7f00000007c0)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000000040)) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000800)=""/1679, 0x6ca) 2018/05/08 19:27:00 executing program 0: unshare(0x40000000) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x181800, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) r0 = socket$inet(0x2, 0x3, 0x200000000006) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x0, 0x401, 0x0, 0x2, 0x18cda1e9, 0x8, 0x0, 0x3}, &(0x7f0000001200)=0x20) accept4$ipx(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) bind$inet(r0, &(0x7f0000103ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) 2018/05/08 19:27:00 executing program 1: unshare(0x40000000) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x181800, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) r0 = socket$inet(0x2, 0x3, 0x200000000006) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x0, 0x401, 0x0, 0x2, 0x18cda1e9, 0x8, 0x0, 0x3}, &(0x7f0000001200)=0x20) accept4$ipx(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) bind$inet(r0, &(0x7f0000103ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) 2018/05/08 19:27:00 executing program 7: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x2, &(0x7f0000000200)=[&(0x7f000006a000/0x2000)=nil, &(0x7f0000be2000/0x4000)=nil], 0x0, &(0x7f0000000240), 0x0) 2018/05/08 19:27:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='gretap0\x00', 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x840, &(0x7f00000002c0)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/05/08 19:27:00 executing program 5: unshare(0x400) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000200)=""/214, 0xd6, 0x0, &(0x7f0000000340)) 2018/05/08 19:27:00 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000200)={0x3f}) [ 102.442651] IPVS: ftp: loaded support on port[0] = 21 [ 102.446842] IPVS: ftp: loaded support on port[0] = 21 2018/05/08 19:27:00 executing program 5: unshare(0x400) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000200)=""/214, 0xd6, 0x0, &(0x7f0000000340)) 2018/05/08 19:27:00 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f000056effc), 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x5, "0eca149e83"}, &(0x7f0000001140)=0xd) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ee8672c93340f643a664f1306ab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c8840f476c8d753d000aa8faf8fb574dbffa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000100)={0xa7}) 2018/05/08 19:27:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='gretap0\x00', 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x840, &(0x7f00000002c0)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/05/08 19:27:00 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240), 0x6e) 2018/05/08 19:27:00 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000200)={0x3f}) 2018/05/08 19:27:00 executing program 4: mkdir(&(0x7f00000007c0)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000000040)) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000800)=""/1679, 0x6ca) 2018/05/08 19:27:00 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, &(0x7f00000000c0)=""/188, &(0x7f0000000180)=0xffffffffffffff55) 2018/05/08 19:27:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='gretap0\x00', 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x840, &(0x7f00000002c0)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/05/08 19:27:00 executing program 3: openat$audio(0xffffffffffffff9c, &(0x7f0000000880)='/dev/audio\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f000066b000)=""/1, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) dup3(r1, r0, 0x0) 2018/05/08 19:27:00 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240), 0x6e) 2018/05/08 19:27:01 executing program 4: mkdir(&(0x7f00000007c0)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000000040)) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000800)=""/1679, 0x6ca) 2018/05/08 19:27:01 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000200)={0x3f}) 2018/05/08 19:27:01 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, &(0x7f00000000c0)=""/188, &(0x7f0000000180)=0xffffffffffffff55) 2018/05/08 19:27:01 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x1, [@local={0xac, 0x14, 0x14, 0xaa}]}, 0x155) close(r0) 2018/05/08 19:27:01 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x5, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @broadcast=0xffffffff}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) 2018/05/08 19:27:01 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240), 0x6e) 2018/05/08 19:27:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000026efff)="0f", 0x1, 0x0, &(0x7f0000021ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000029000)="c6", 0x1, 0x0, &(0x7f0000007ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) r1 = dup(r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf88c}, 0xb) 2018/05/08 19:27:01 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000c7df60)={0x7ff, @in6={{0xa}}}, &(0x7f000064b000)=0xa0) r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r1}, 0x8) 2018/05/08 19:27:01 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000c7df60)={0x7ff, @in6={{0xa}}}, &(0x7f000064b000)=0xa0) r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r1}, 0x8) 2018/05/08 19:27:01 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, &(0x7f00000000c0)=""/188, &(0x7f0000000180)=0xffffffffffffff55) 2018/05/08 19:27:02 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240), 0x6e) 2018/05/08 19:27:02 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000200)={0x3f}) 2018/05/08 19:27:02 executing program 4: mkdir(&(0x7f00000007c0)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000000040)) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000800)=""/1679, 0x6ca) 2018/05/08 19:27:02 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x1, [@local={0xac, 0x14, 0x14, 0xaa}]}, 0x155) close(r0) 2018/05/08 19:27:02 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x5, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @broadcast=0xffffffff}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) 2018/05/08 19:27:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000c7df60)={0x7ff, @in6={{0xa}}}, &(0x7f000064b000)=0xa0) r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r1}, 0x8) 2018/05/08 19:27:02 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, &(0x7f00000000c0)=""/188, &(0x7f0000000180)=0xffffffffffffff55) 2018/05/08 19:27:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000026efff)="0f", 0x1, 0x0, &(0x7f0000021ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000029000)="c6", 0x1, 0x0, &(0x7f0000007ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) r1 = dup(r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf88c}, 0xb) 2018/05/08 19:27:02 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x5, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @broadcast=0xffffffff}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) 2018/05/08 19:27:02 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x1, [@local={0xac, 0x14, 0x14, 0xaa}]}, 0x155) close(r0) 2018/05/08 19:27:02 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="cf", 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) 2018/05/08 19:27:02 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x7, 0x4}, 0xb) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0)=0x6, 0x4) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) read(r0, &(0x7f00005f6000)=""/99, 0x63) 2018/05/08 19:27:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000c7df60)={0x7ff, @in6={{0xa}}}, &(0x7f000064b000)=0xa0) r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r1}, 0x8) 2018/05/08 19:27:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f000033c000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002004e207f0000010000000000000000030005000000000002004e200000000000000000000000000800120002000100000000000000000030000000020100000000000000000000ff01000000000000000000000000200100000000000000000000ffffe0000001"], 0x80}, 0x1}, 0x0) 2018/05/08 19:27:02 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000026efff)="0f", 0x1, 0x0, &(0x7f0000021ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000029000)="c6", 0x1, 0x0, &(0x7f0000007ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) r1 = dup(r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf88c}, 0xb) 2018/05/08 19:27:03 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x5, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @broadcast=0xffffffff}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) 2018/05/08 19:27:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f000033c000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002004e207f0000010000000000000000030005000000000002004e200000000000000000000000000800120002000100000000000000000030000000020100000000000000000000ff01000000000000000000000000200100000000000000000000ffffe0000001"], 0x80}, 0x1}, 0x0) 2018/05/08 19:27:03 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x1, [@local={0xac, 0x14, 0x14, 0xaa}]}, 0x155) close(r0) 2018/05/08 19:27:03 executing program 1: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:03 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="cf", 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) 2018/05/08 19:27:03 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x7, 0x4}, 0xb) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0)=0x6, 0x4) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) read(r0, &(0x7f00005f6000)=""/99, 0x63) 2018/05/08 19:27:03 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000026efff)="0f", 0x1, 0x0, &(0x7f0000021ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000029000)="c6", 0x1, 0x0, &(0x7f0000007ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) r1 = dup(r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf88c}, 0xb) 2018/05/08 19:27:03 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x7, 0x4}, 0xb) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0)=0x6, 0x4) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) read(r0, &(0x7f00005f6000)=""/99, 0x63) 2018/05/08 19:27:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f000033c000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002004e207f0000010000000000000000030005000000000002004e200000000000000000000000000800120002000100000000000000000030000000020100000000000000000000ff01000000000000000000000000200100000000000000000000ffffe0000001"], 0x80}, 0x1}, 0x0) 2018/05/08 19:27:03 executing program 0: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x10000) keyctl$describe(0x6, r0, &(0x7f00000001c0)=""/56, 0x38) 2018/05/08 19:27:03 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="cf", 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) 2018/05/08 19:27:03 executing program 1: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000026efff)="0f", 0x1, 0x0, &(0x7f0000021ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000029000)="c6", 0x1, 0x0, &(0x7f0000007ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) r1 = dup(r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf88c}, 0xb) 2018/05/08 19:27:03 executing program 2: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x10000) keyctl$describe(0x6, r0, &(0x7f00000001c0)=""/56, 0x38) 2018/05/08 19:27:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f000033c000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002004e207f0000010000000000000000030005000000000002004e200000000000000000000000000800120002000100000000000000000030000000020100000000000000000000ff01000000000000000000000000200100000000000000000000ffffe0000001"], 0x80}, 0x1}, 0x0) 2018/05/08 19:27:04 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x7, 0x4}, 0xb) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0)=0x6, 0x4) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) read(r0, &(0x7f00005f6000)=""/99, 0x63) 2018/05/08 19:27:04 executing program 2: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:04 executing program 1: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="30bfff3c45f732fbd4a8b85478382238dc455864074c85e9a64e89d56db57f2ca5aec9bd93d5ba4f2e4545715d4740cb34dc4742c8a37d368395f31e3990320771e86ec357e24d4239063c60dba6ffd0488c074de1a8806590d36ed3c1b0514f958d79117ec174be838a214b3d493fc6b51511ff13961dc0a72dde3d92404b319a98c2c72b9bad03f6ff985dfa79cd49bd512b1b656876dc8c2cfeb8791dae605d2d37515534fd712e9595f5a7d51020bc5e08b55e2e9242b23bd846fe3412b406075e86914ee00a97da6bc732be9fc89ba4a75b0ae7e1cc21f2e2cb83d2bc4a09d445ed8fa05f4849afcc3fe84f1e6598e3f36a938386c114263747c5db325533a2288fb1c5a5ae46c30616a347466fd0da1732c871acd62464f3b09128143e244a8a0769882a321c64a72229c9d0b80a5ab185981ba598643438cc7071e48e73775c5f37b1d85b302e1489691a3b641c174b9727585054f7c6f31e3b188d96e58e4ad31019e7d269ac6d577bad905b691558525d8f69ae8266fa2a0b77aac91c837e167b669e13c513e0591fe854340f61dacb1f362a9edc611a6aed623f88e4aa102ea816548ed0f512835a3a66a64211df80fa57cc8aed54a2259e2b430eb6c8653af000eb1c5d23bb3b4f68afe5bc6f05000363c1afc262a99c794fbca1", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:04 executing program 5: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="30bfff3c45f732fbd4a8b85478382238dc455864074c85e9a64e89d56db57f2ca5aec9bd93d5ba4f2e4545715d4740cb34dc4742c8a37d368395f31e3990320771e86ec357e24d4239063c60dba6ffd0488c074de1a8806590d36ed3c1b0514f958d79117ec174be838a214b3d493fc6b51511ff13961dc0a72dde3d92404b319a98c2c72b9bad03f6ff985dfa79cd49bd512b1b656876dc8c2cfeb8791dae605d2d37515534fd712e9595f5a7d51020bc5e08b55e2e9242b23bd846fe3412b406075e86914ee00a97da6bc732be9fc89ba4a75b0ae7e1cc21f2e2cb83d2bc4a09d445ed8fa05f4849afcc3fe84f1e6598e3f36a938386c114263747c5db325533a2288fb1c5a5ae46c30616a347466fd0da1732c871acd62464f3b09128143e244a8a0769882a321c64a72229c9d0b80a5ab185981ba598643438cc7071e48e73775c5f37b1d85b302e1489691a3b641c174b9727585054f7c6f31e3b188d96e58e4ad31019e7d269ac6d577bad905b691558525d8f69ae8266fa2a0b77aac91c837e167b669e13c513e0591fe854340f61dacb1f362a9edc611a6aed623f88e4aa102ea816548ed0f512835a3a66a64211df80fa57cc8aed54a2259e2b430eb6c8653af000eb1c5d23bb3b4f68afe5bc6f05000363c1afc262a99c794fbca1", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x10000) keyctl$describe(0x6, r0, &(0x7f00000001c0)=""/56, 0x38) 2018/05/08 19:27:04 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="cf", 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) 2018/05/08 19:27:04 executing program 1: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="30bfff3c45f732fbd4a8b85478382238dc455864074c85e9a64e89d56db57f2ca5aec9bd93d5ba4f2e4545715d4740cb34dc4742c8a37d368395f31e3990320771e86ec357e24d4239063c60dba6ffd0488c074de1a8806590d36ed3c1b0514f958d79117ec174be838a214b3d493fc6b51511ff13961dc0a72dde3d92404b319a98c2c72b9bad03f6ff985dfa79cd49bd512b1b656876dc8c2cfeb8791dae605d2d37515534fd712e9595f5a7d51020bc5e08b55e2e9242b23bd846fe3412b406075e86914ee00a97da6bc732be9fc89ba4a75b0ae7e1cc21f2e2cb83d2bc4a09d445ed8fa05f4849afcc3fe84f1e6598e3f36a938386c114263747c5db325533a2288fb1c5a5ae46c30616a347466fd0da1732c871acd62464f3b09128143e244a8a0769882a321c64a72229c9d0b80a5ab185981ba598643438cc7071e48e73775c5f37b1d85b302e1489691a3b641c174b9727585054f7c6f31e3b188d96e58e4ad31019e7d269ac6d577bad905b691558525d8f69ae8266fa2a0b77aac91c837e167b669e13c513e0591fe854340f61dacb1f362a9edc611a6aed623f88e4aa102ea816548ed0f512835a3a66a64211df80fa57cc8aed54a2259e2b430eb6c8653af000eb1c5d23bb3b4f68afe5bc6f05000363c1afc262a99c794fbca1", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:04 executing program 7: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000026efff)="0f", 0x1, 0x0, &(0x7f0000021ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000029000)="c6", 0x1, 0x0, &(0x7f0000007ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) r1 = dup(r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf88c}, 0xb) 2018/05/08 19:27:04 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000026efff)="0f", 0x1, 0x0, &(0x7f0000021ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000029000)="c6", 0x1, 0x0, &(0x7f0000007ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) r1 = dup(r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf88c}, 0xb) 2018/05/08 19:27:04 executing program 4: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:04 executing program 5: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:04 executing program 2: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x10000) keyctl$describe(0x6, r0, &(0x7f00000001c0)=""/56, 0x38) 2018/05/08 19:27:05 executing program 0: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:05 executing program 7: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:05 executing program 2: truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fff, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r0, 0x0) 2018/05/08 19:27:05 executing program 4: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:05 executing program 5: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:05 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x9201, &(0x7f0000000000)) 2018/05/08 19:27:05 executing program 0: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:05 executing program 7: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="30bfff3c45f732fbd4a8b85478382238dc455864074c85e9a64e89d56db57f2ca5aec9bd93d5ba4f2e4545715d4740cb34dc4742c8a37d368395f31e3990320771e86ec357e24d4239063c60dba6ffd0488c074de1a8806590d36ed3c1b0514f958d79117ec174be838a214b3d493fc6b51511ff13961dc0a72dde3d92404b319a98c2c72b9bad03f6ff985dfa79cd49bd512b1b656876dc8c2cfeb8791dae605d2d37515534fd712e9595f5a7d51020bc5e08b55e2e9242b23bd846fe3412b406075e86914ee00a97da6bc732be9fc89ba4a75b0ae7e1cc21f2e2cb83d2bc4a09d445ed8fa05f4849afcc3fe84f1e6598e3f36a938386c114263747c5db325533a2288fb1c5a5ae46c30616a347466fd0da1732c871acd62464f3b09128143e244a8a0769882a321c64a72229c9d0b80a5ab185981ba598643438cc7071e48e73775c5f37b1d85b302e1489691a3b641c174b9727585054f7c6f31e3b188d96e58e4ad31019e7d269ac6d577bad905b691558525d8f69ae8266fa2a0b77aac91c837e167b669e13c513e0591fe854340f61dacb1f362a9edc611a6aed623f88e4aa102ea816548ed0f512835a3a66a64211df80fa57cc8aed54a2259e2b430eb6c8653af000eb1c5d23bb3b4f68afe5bc6f05000363c1afc262a99c794fbca1", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:05 executing program 2: truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fff, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r0, 0x0) 2018/05/08 19:27:05 executing program 4: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="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", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:05 executing program 0: epoll_create1(0x80000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000480)=""/212) epoll_create1(0x80000) r0 = epoll_create1(0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="3f00000000000000d581912100000000060000000104000002000000000000009a82000000000000000001000000000006000000000000000040000000000000000000000000000001010000000000000000000000000000ff0f0000000000000300000000000000ff0700000000000000000000000000000000000000000000800000000000000000000000007fcc73b43af5d62e9a000000"]) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x5000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2c871, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r2, 0x4, 0x4000000000046800) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000001200)="30bfff3c45f732fbd4a8b85478382238dc455864074c85e9a64e89d56db57f2ca5aec9bd93d5ba4f2e4545715d4740cb34dc4742c8a37d368395f31e3990320771e86ec357e24d4239063c60dba6ffd0488c074de1a8806590d36ed3c1b0514f958d79117ec174be838a214b3d493fc6b51511ff13961dc0a72dde3d92404b319a98c2c72b9bad03f6ff985dfa79cd49bd512b1b656876dc8c2cfeb8791dae605d2d37515534fd712e9595f5a7d51020bc5e08b55e2e9242b23bd846fe3412b406075e86914ee00a97da6bc732be9fc89ba4a75b0ae7e1cc21f2e2cb83d2bc4a09d445ed8fa05f4849afcc3fe84f1e6598e3f36a938386c114263747c5db325533a2288fb1c5a5ae46c30616a347466fd0da1732c871acd62464f3b09128143e244a8a0769882a321c64a72229c9d0b80a5ab185981ba598643438cc7071e48e73775c5f37b1d85b302e1489691a3b641c174b9727585054f7c6f31e3b188d96e58e4ad31019e7d269ac6d577bad905b691558525d8f69ae8266fa2a0b77aac91c837e167b669e13c513e0591fe854340f61dacb1f362a9edc611a6aed623f88e4aa102ea816548ed0f512835a3a66a64211df80fa57cc8aed54a2259e2b430eb6c8653af000eb1c5d23bb3b4f68afe5bc6f05000363c1afc262a99c794fbca1", 0x1e0}]) shmdt(r1) getrandom(&(0x7f00000001c0)=""/231, 0xe7, 0x1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00006e5000)) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0xd7, &(0x7f0000000080)="782f15427ab90b442f7a362669a6853a7fca9f746c8651923336bf35c3dc7f20079f0a5f19d11f9cd0c102ca0f46a525c9becc03f81c676f152c523eb26bfce41fd56f74f533db7a031dc1b413b8b717969103e461ad1dc00b56f4bfa673b526737da00f9dbee9cebe97e0fbbf6525f6f71196c681cde82486e29351d63e38b7f9a7c7864299a52a0d1f11db11043298f013f905697aa39dd52651fd4659391efdba5bb9b0343d8d397c75acb50d9ada9d346204b4ba3fd6c7888d89048bcc540056694305c90874eae2539719cbe952ff063b51b4739f"}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000580)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f0000000000)="75730700010000ce000078003798", 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') inotify_add_watch(r6, &(0x7f00000005c0)='./file1\x00', 0x81000000) sendfile(r6, r7, &(0x7f00006dbff8), 0xed5a) r8 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, r8) dup3(r4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 2018/05/08 19:27:05 executing program 7: truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fff, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r0, 0x0) 2018/05/08 19:27:05 executing program 6: truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fff, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r0, 0x0) 2018/05/08 19:27:05 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x9201, &(0x7f0000000000)) 2018/05/08 19:27:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000004c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$rdma_cm(r2, &(0x7f0000000080)=@resolve_route={0x4, 0x8, 0xfa00, {r1}}, 0x10) 2018/05/08 19:27:05 executing program 3: perf_event_open(&(0x7f0000b7a000)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() 2018/05/08 19:27:06 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x9201, &(0x7f0000000000)) 2018/05/08 19:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000004c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$rdma_cm(r2, &(0x7f0000000080)=@resolve_route={0x4, 0x8, 0xfa00, {r1}}, 0x10) 2018/05/08 19:27:06 executing program 6: truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fff, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r0, 0x0) 2018/05/08 19:27:06 executing program 2: truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fff, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r0, 0x0) 2018/05/08 19:27:06 executing program 7: truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fff, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r0, 0x0) 2018/05/08 19:27:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000004c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$rdma_cm(r2, &(0x7f0000000080)=@resolve_route={0x4, 0x8, 0xfa00, {r1}}, 0x10) 2018/05/08 19:27:06 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={"d208d7f6300000ae000000880000e710", 0x101}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vhan0\x00', 0x400}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x7) 2018/05/08 19:27:06 executing program 3: perf_event_open(&(0x7f0000b7a000)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() 2018/05/08 19:27:06 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x9201, &(0x7f0000000000)) 2018/05/08 19:27:06 executing program 2: truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fff, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r0, 0x0) 2018/05/08 19:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000004c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$rdma_cm(r2, &(0x7f0000000080)=@resolve_route={0x4, 0x8, 0xfa00, {r1}}, 0x10) 2018/05/08 19:27:06 executing program 6: truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fff, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r0, 0x0) 2018/05/08 19:27:06 executing program 7: truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fff, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r0, 0x0) 2018/05/08 19:27:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000004c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$rdma_cm(r2, &(0x7f0000000080)=@resolve_route={0x4, 0x8, 0xfa00, {r1}}, 0x10) 2018/05/08 19:27:06 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={"d208d7f6300000ae000000880000e710", 0x101}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vhan0\x00', 0x400}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x7) 2018/05/08 19:27:06 executing program 3: perf_event_open(&(0x7f0000b7a000)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() 2018/05/08 19:27:06 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000bbeff4)) shutdown(r0, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 2018/05/08 19:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000004c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$rdma_cm(r2, &(0x7f0000000080)=@resolve_route={0x4, 0x8, 0xfa00, {r1}}, 0x10) 2018/05/08 19:27:06 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000002c0)={[], 0x0, 0x1, 0x5}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 2018/05/08 19:27:06 executing program 6: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f000050c000/0x600000)=nil], &(0x7f000026bfec), &(0x7f0000002000), 0x0) 2018/05/08 19:27:06 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000bbeff4)) shutdown(r0, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 2018/05/08 19:27:06 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) sendto$inet(r0, &(0x7f00005c9000), 0x2c2, 0x800000020000000, &(0x7f0000000100)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000180)=[{}, {0x4, 0x2}, {}], 0xc6) 2018/05/08 19:27:06 executing program 3: perf_event_open(&(0x7f0000b7a000)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() 2018/05/08 19:27:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000004c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$rdma_cm(r2, &(0x7f0000000080)=@resolve_route={0x4, 0x8, 0xfa00, {r1}}, 0x10) 2018/05/08 19:27:06 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={"d208d7f6300000ae000000880000e710", 0x101}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vhan0\x00', 0x400}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x7) 2018/05/08 19:27:06 executing program 6: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f000050c000/0x600000)=nil], &(0x7f000026bfec), &(0x7f0000002000), 0x0) 2018/05/08 19:27:06 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x1, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 2018/05/08 19:27:06 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000002c0)={[], 0x0, 0x1, 0x5}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 2018/05/08 19:27:07 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000bbeff4)) shutdown(r0, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 2018/05/08 19:27:07 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={"d208d7f6300000ae000000880000e710", 0x101}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vhan0\x00', 0x400}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x7) 2018/05/08 19:27:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000002c0)={[], 0x0, 0x1, 0x5}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 2018/05/08 19:27:07 executing program 6: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f000050c000/0x600000)=nil], &(0x7f000026bfec), &(0x7f0000002000), 0x0) 2018/05/08 19:27:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000002c0)={[], 0x0, 0x1, 0x5}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 2018/05/08 19:27:07 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) sendto$inet(r0, &(0x7f00005c9000), 0x2c2, 0x800000020000000, &(0x7f0000000100)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000180)=[{}, {0x4, 0x2}, {}], 0xc6) 2018/05/08 19:27:07 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x1, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 2018/05/08 19:27:07 executing program 4: rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='.') 2018/05/08 19:27:07 executing program 6: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f000050c000/0x600000)=nil], &(0x7f000026bfec), &(0x7f0000002000), 0x0) 2018/05/08 19:27:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000002c0)={[], 0x0, 0x1, 0x5}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 2018/05/08 19:27:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000002c0)={[], 0x0, 0x1, 0x5}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 2018/05/08 19:27:07 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) sendto$inet(r0, &(0x7f00005c9000), 0x2c2, 0x800000020000000, &(0x7f0000000100)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000180)=[{}, {0x4, 0x2}, {}], 0xc6) 2018/05/08 19:27:07 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000bbeff4)) shutdown(r0, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 2018/05/08 19:27:07 executing program 4: rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='.') 2018/05/08 19:27:07 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x1, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 2018/05/08 19:27:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa}, {0xa}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x20a) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 2018/05/08 19:27:07 executing program 4: rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='.') 2018/05/08 19:27:07 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) sendto$inet(r0, &(0x7f00005c9000), 0x2c2, 0x800000020000000, &(0x7f0000000100)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000180)=[{}, {0x4, 0x2}, {}], 0xc6) 2018/05/08 19:27:07 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000341000)=@known='system.posix_acl_access\x00', &(0x7f0000648ff4)="020000002000000090748400", 0xc, 0x0) 2018/05/08 19:27:07 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x1, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 2018/05/08 19:27:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000002c0)={[], 0x0, 0x1, 0x5}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 2018/05/08 19:27:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa}, {0xa}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x20a) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 2018/05/08 19:27:07 executing program 2: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000f20000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000f1f000/0x1000)=nil) 2018/05/08 19:27:07 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000001ffc)=0xe) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) 2018/05/08 19:27:07 executing program 4: rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='.') 2018/05/08 19:27:07 executing program 2: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000f20000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000f1f000/0x1000)=nil) 2018/05/08 19:27:07 executing program 3: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000f20000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000f1f000/0x1000)=nil) 2018/05/08 19:27:07 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000001ffc)=0xe) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) 2018/05/08 19:27:08 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000341000)=@known='system.posix_acl_access\x00', &(0x7f0000648ff4)="020000002000000090748400", 0xc, 0x0) 2018/05/08 19:27:08 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000001ffc)=0xe) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) 2018/05/08 19:27:08 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x3000000c}) 2018/05/08 19:27:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa}, {0xa}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x20a) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 2018/05/08 19:27:08 executing program 3: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000f20000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000f1f000/0x1000)=nil) 2018/05/08 19:27:08 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000001ffc)=0xe) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) 2018/05/08 19:27:08 executing program 2: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000f20000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000f1f000/0x1000)=nil) 2018/05/08 19:27:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000180), &(0x7f00000001c0)=0xfd58) 2018/05/08 19:27:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa}, {0xa}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x20a) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 2018/05/08 19:27:08 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000341000)=@known='system.posix_acl_access\x00', &(0x7f0000648ff4)="020000002000000090748400", 0xc, 0x0) 2018/05/08 19:27:08 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000001ffc)=0xe) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) 2018/05/08 19:27:08 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x3000000c}) 2018/05/08 19:27:08 executing program 3: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000f20000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000f1f000/0x1000)=nil) 2018/05/08 19:27:08 executing program 2: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000f20000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000f1f000/0x1000)=nil) 2018/05/08 19:27:08 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000001ffc)=0xe) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) 2018/05/08 19:27:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000180), &(0x7f00000001c0)=0xfd58) 2018/05/08 19:27:08 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000341000)=@known='system.posix_acl_access\x00', &(0x7f0000648ff4)="020000002000000090748400", 0xc, 0x0) 2018/05/08 19:27:08 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x3000000c}) 2018/05/08 19:27:08 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000006c0)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha384-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="97948a2a3c085fd0c4931dfda6242d92aa7082d0ab662e4fce883dfc38d054f29022bdc7155ce524463f9d7e2bf0ceee3166afd71aa25bf69a9a75efbe0e2d5ac494dd3a964ddab45bf903e16a42b65c694ec21dd556f82466816ae521b433d0be2fa181b3d2d9ecab18f74eea36629713c0c648524fc0d6fa04ea916d5c05a314", 0x81) 2018/05/08 19:27:08 executing program 3: r0 = socket$inet6(0xa, 0x200000000000003, 0x3a) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) write$binfmt_elf32(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) 2018/05/08 19:27:08 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100)=0x4, 0x4) 2018/05/08 19:27:08 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f000063543e)='./file1\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='ramfs\x00', 0x0, &(0x7f000000a000)) chroot(&(0x7f00004d3ff8)='./file0\x00') mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 2018/05/08 19:27:08 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000001ffc)=0xe) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) 2018/05/08 19:27:08 executing program 0: unshare(0x40600) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000000)="981a39289599f62dd586e452dddde175", 0x10) 2018/05/08 19:27:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000180), &(0x7f00000001c0)=0xfd58) 2018/05/08 19:27:08 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x3000000c}) 2018/05/08 19:27:08 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_bridge\x00', 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000300)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000818ff0)=[{&(0x7f000016bde8)='\v', 0x1}], 0x1) 2018/05/08 19:27:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e40fee)='/dev/loop-control\x00', 0x0, 0x0) unshare(0x28060400) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) 2018/05/08 19:27:09 executing program 3: r0 = socket$inet6(0xa, 0x200000000000003, 0x3a) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) write$binfmt_elf32(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) 2018/05/08 19:27:09 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000180), &(0x7f00000001c0)=0xfd58) 2018/05/08 19:27:09 executing program 0: unshare(0x40600) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000000)="981a39289599f62dd586e452dddde175", 0x10) 2018/05/08 19:27:09 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100)=0x4, 0x4) 2018/05/08 19:27:09 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f000063543e)='./file1\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='ramfs\x00', 0x0, &(0x7f000000a000)) chroot(&(0x7f00004d3ff8)='./file0\x00') mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 2018/05/08 19:27:09 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000006c0)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha384-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="97948a2a3c085fd0c4931dfda6242d92aa7082d0ab662e4fce883dfc38d054f29022bdc7155ce524463f9d7e2bf0ceee3166afd71aa25bf69a9a75efbe0e2d5ac494dd3a964ddab45bf903e16a42b65c694ec21dd556f82466816ae521b433d0be2fa181b3d2d9ecab18f74eea36629713c0c648524fc0d6fa04ea916d5c05a314", 0x81) 2018/05/08 19:27:09 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_bridge\x00', 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000300)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000818ff0)=[{&(0x7f000016bde8)='\v', 0x1}], 0x1) 2018/05/08 19:27:09 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x2c, &(0x7f0000000680), 0x0, &(0x7f0000000040)=[{0x10, 0x29}], 0x10}}], 0x2, 0x0) 2018/05/08 19:27:09 executing program 0: unshare(0x40600) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000000)="981a39289599f62dd586e452dddde175", 0x10) 2018/05/08 19:27:09 executing program 3: r0 = socket$inet6(0xa, 0x200000000000003, 0x3a) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) write$binfmt_elf32(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) 2018/05/08 19:27:09 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100)=0x4, 0x4) 2018/05/08 19:27:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e40fee)='/dev/loop-control\x00', 0x0, 0x0) unshare(0x28060400) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) 2018/05/08 19:27:09 executing program 0: unshare(0x40600) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000000)="981a39289599f62dd586e452dddde175", 0x10) 2018/05/08 19:27:09 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f000063543e)='./file1\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='ramfs\x00', 0x0, &(0x7f000000a000)) chroot(&(0x7f00004d3ff8)='./file0\x00') mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 2018/05/08 19:27:09 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000006c0)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha384-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="97948a2a3c085fd0c4931dfda6242d92aa7082d0ab662e4fce883dfc38d054f29022bdc7155ce524463f9d7e2bf0ceee3166afd71aa25bf69a9a75efbe0e2d5ac494dd3a964ddab45bf903e16a42b65c694ec21dd556f82466816ae521b433d0be2fa181b3d2d9ecab18f74eea36629713c0c648524fc0d6fa04ea916d5c05a314", 0x81) 2018/05/08 19:27:09 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x2c, &(0x7f0000000680), 0x0, &(0x7f0000000040)=[{0x10, 0x29}], 0x10}}], 0x2, 0x0) 2018/05/08 19:27:09 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_bridge\x00', 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000300)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000818ff0)=[{&(0x7f000016bde8)='\v', 0x1}], 0x1) 2018/05/08 19:27:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e40fee)='/dev/loop-control\x00', 0x0, 0x0) unshare(0x28060400) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) 2018/05/08 19:27:09 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100)=0x4, 0x4) 2018/05/08 19:27:09 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000006c0)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha384-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="97948a2a3c085fd0c4931dfda6242d92aa7082d0ab662e4fce883dfc38d054f29022bdc7155ce524463f9d7e2bf0ceee3166afd71aa25bf69a9a75efbe0e2d5ac494dd3a964ddab45bf903e16a42b65c694ec21dd556f82466816ae521b433d0be2fa181b3d2d9ecab18f74eea36629713c0c648524fc0d6fa04ea916d5c05a314", 0x81) 2018/05/08 19:27:09 executing program 3: r0 = socket$inet6(0xa, 0x200000000000003, 0x3a) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) write$binfmt_elf32(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[], [], [], [], [], []]}, 0x658) 2018/05/08 19:27:09 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f000063543e)='./file1\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='ramfs\x00', 0x0, &(0x7f000000a000)) chroot(&(0x7f00004d3ff8)='./file0\x00') mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 2018/05/08 19:27:09 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_bridge\x00', 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000300)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000818ff0)=[{&(0x7f000016bde8)='\v', 0x1}], 0x1) 2018/05/08 19:27:09 executing program 7: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000053ff3)='/dev/snd/seq\x00', 0x0, 0x101802) r2 = dup2(r1, r0) write$sndseq(r2, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x1fd, @time={0x0, 0x989680}, {}, {}, @quote={{}, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw8={"209024dd518725df762c3bf7"}}}}], 0x30) 2018/05/08 19:27:09 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f000000d000)=@abs={0x1}, 0x8) connect$unix(r0, &(0x7f000000cff8)=@abs={0x1, 0x0, 0x1}, 0x8) 2018/05/08 19:27:09 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2", 0x19}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000afa000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0xffd}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/05/08 19:27:09 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x2c, &(0x7f0000000680), 0x0, &(0x7f0000000040)=[{0x10, 0x29}], 0x10}}], 0x2, 0x0) 2018/05/08 19:27:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e40fee)='/dev/loop-control\x00', 0x0, 0x0) unshare(0x28060400) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) 2018/05/08 19:27:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e40fee)='/dev/loop-control\x00', 0x0, 0x0) unshare(0x28060400) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) 2018/05/08 19:27:09 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) unshare(0x40600) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=""/193, &(0x7f0000000280)=""/97, &(0x7f0000000300)=""/127}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000380)=""/115, &(0x7f0000000400)=""/156, &(0x7f00000004c0)=""/185}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000005c0)=0x1) 2018/05/08 19:27:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x2c, &(0x7f0000000680), 0x0, &(0x7f0000000040)=[{0x10, 0x29}], 0x10}}], 0x2, 0x0) 2018/05/08 19:27:10 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f000000d000)=@abs={0x1}, 0x8) connect$unix(r0, &(0x7f000000cff8)=@abs={0x1, 0x0, 0x1}, 0x8) 2018/05/08 19:27:10 executing program 7: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000053ff3)='/dev/snd/seq\x00', 0x0, 0x101802) r2 = dup2(r1, r0) write$sndseq(r2, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x1fd, @time={0x0, 0x989680}, {}, {}, @quote={{}, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw8={"209024dd518725df762c3bf7"}}}}], 0x30) 2018/05/08 19:27:10 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e40fee)='/dev/loop-control\x00', 0x0, 0x0) unshare(0x28060400) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) 2018/05/08 19:27:10 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x20, 0x0, @in={0x2, 0x0, @rand_addr}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in=@dev={0xac, 0x14}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback=0x7f000001}}]}, 0x80}, 0x1}, 0x0) 2018/05/08 19:27:10 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e40fee)='/dev/loop-control\x00', 0x0, 0x0) unshare(0x28060400) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) 2018/05/08 19:27:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00003cf000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00005ad000)={&(0x7f0000000000)=@flushpolicy={0x5c, 0x1d, 0x1, 0x0, 0x0, "", [@algo_auth_trunc={0x4c, 0x14, {{'sha256_mb\x00'}}}]}, 0x5c}, 0x1}, 0x0) 2018/05/08 19:27:10 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2", 0x19}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000afa000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0xffd}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/05/08 19:27:10 executing program 7: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000053ff3)='/dev/snd/seq\x00', 0x0, 0x101802) r2 = dup2(r1, r0) write$sndseq(r2, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x1fd, @time={0x0, 0x989680}, {}, {}, @quote={{}, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw8={"209024dd518725df762c3bf7"}}}}], 0x30) 2018/05/08 19:27:10 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast=0xffffffff}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000000)) 2018/05/08 19:27:10 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f000000d000)=@abs={0x1}, 0x8) connect$unix(r0, &(0x7f000000cff8)=@abs={0x1, 0x0, 0x1}, 0x8) 2018/05/08 19:27:10 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2", 0x19}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000afa000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0xffd}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/05/08 19:27:10 executing program 5: r0 = gettid() r1 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r1, &(0x7f0000000300)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000e60000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x15) 2018/05/08 19:27:10 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x20, 0x0, @in={0x2, 0x0, @rand_addr}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in=@dev={0xac, 0x14}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback=0x7f000001}}]}, 0x80}, 0x1}, 0x0) 2018/05/08 19:27:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x85, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x188, &(0x7f00001a7f05)=""/251}, 0x48) 2018/05/08 19:27:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00003cf000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00005ad000)={&(0x7f0000000000)=@flushpolicy={0x5c, 0x1d, 0x1, 0x0, 0x0, "", [@algo_auth_trunc={0x4c, 0x14, {{'sha256_mb\x00'}}}]}, 0x5c}, 0x1}, 0x0) 2018/05/08 19:27:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000011c0)={0x0, 0xa0, "507f411f216a264dd7ac2763923455555deb78e7e67758b4fc9378aa0456b21956840265531300d385bebbfbd0b1a9c8e6e3107d28106768a7126a76d0d6fa3cc600011861f46233a1c066ec89b3889a7a9092a308c5f73046dd5fb5f0dc1aea55712469f1150f4c177db9694435dd0946e307e11ead424e87680bacc590e212fa983547e5967f6757c72576ffc5c133d6988689cbcd8dd7a0cc37dfad23786a"}, &(0x7f0000001280)=0xa8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={r4, 0x6, 0x8, 0x7f, 0x81, 0x3, 0x101, 0x5, {r5, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x8001, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r6 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r6, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="246c0ab8b12813d5baea55f35dfd559b3e202f267a5ab8fecbca453307b2aaacb3e4c2cf581c5c16641597343c143de06e9317dcc8f04c99a6a7a1a1ef34f7d80710986c0427544613748329e71cf83837e7862be861dc43316831895e2bc3c07d6f54b019dacce8d9954a7b6185cf976a6b2f74480bf71d6fe729d3cbe9c0a5eb234cdb5cf55e62965b3ce80d3ee967f9a399223b513e4b1bf2a0d3d77c85656d5ecb", 0xa3}], 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmmsg$inet_sctp(r6, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) vmsplice(r2, &(0x7f0000003740)=[{&(0x7f0000001080)=';', 0x1}], 0x1, 0x0) getpeername$ipx(r6, &(0x7f0000001440), &(0x7f0000001480)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000010c0)={r5, 0x3}, &(0x7f0000001400)=0x8) readv(r1, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0xfc74}], 0x3d) 2018/05/08 19:27:10 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f000000d000)=@abs={0x1}, 0x8) connect$unix(r0, &(0x7f000000cff8)=@abs={0x1, 0x0, 0x1}, 0x8) 2018/05/08 19:27:10 executing program 7: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000053ff3)='/dev/snd/seq\x00', 0x0, 0x101802) r2 = dup2(r1, r0) write$sndseq(r2, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x1fd, @time={0x0, 0x989680}, {}, {}, @quote={{}, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw8={"209024dd518725df762c3bf7"}}}}], 0x30) 2018/05/08 19:27:10 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2", 0x19}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000afa000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0xffd}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/05/08 19:27:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x85, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x188, &(0x7f00001a7f05)=""/251}, 0x48) 2018/05/08 19:27:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00003cf000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00005ad000)={&(0x7f0000000000)=@flushpolicy={0x5c, 0x1d, 0x1, 0x0, 0x0, "", [@algo_auth_trunc={0x4c, 0x14, {{'sha256_mb\x00'}}}]}, 0x5c}, 0x1}, 0x0) 2018/05/08 19:27:10 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x20, 0x0, @in={0x2, 0x0, @rand_addr}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in=@dev={0xac, 0x14}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback=0x7f000001}}]}, 0x80}, 0x1}, 0x0) 2018/05/08 19:27:10 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x800000000009}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000000080), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000df5ff0)={r1, &(0x7f0000eef000)}, 0x10) 2018/05/08 19:27:11 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000011c0)={0x0, 0xa0, "507f411f216a264dd7ac2763923455555deb78e7e67758b4fc9378aa0456b21956840265531300d385bebbfbd0b1a9c8e6e3107d28106768a7126a76d0d6fa3cc600011861f46233a1c066ec89b3889a7a9092a308c5f73046dd5fb5f0dc1aea55712469f1150f4c177db9694435dd0946e307e11ead424e87680bacc590e212fa983547e5967f6757c72576ffc5c133d6988689cbcd8dd7a0cc37dfad23786a"}, &(0x7f0000001280)=0xa8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={r4, 0x6, 0x8, 0x7f, 0x81, 0x3, 0x101, 0x5, {r5, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x8001, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r6 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r6, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="246c0ab8b12813d5baea55f35dfd559b3e202f267a5ab8fecbca453307b2aaacb3e4c2cf581c5c16641597343c143de06e9317dcc8f04c99a6a7a1a1ef34f7d80710986c0427544613748329e71cf83837e7862be861dc43316831895e2bc3c07d6f54b019dacce8d9954a7b6185cf976a6b2f74480bf71d6fe729d3cbe9c0a5eb234cdb5cf55e62965b3ce80d3ee967f9a399223b513e4b1bf2a0d3d77c85656d5ecb", 0xa3}], 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmmsg$inet_sctp(r6, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) vmsplice(r2, &(0x7f0000003740)=[{&(0x7f0000001080)=';', 0x1}], 0x1, 0x0) getpeername$ipx(r6, &(0x7f0000001440), &(0x7f0000001480)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000010c0)={r5, 0x3}, &(0x7f0000001400)=0x8) readv(r1, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0xfc74}], 0x3d) 2018/05/08 19:27:11 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000011c0)={0x0, 0xa0, "507f411f216a264dd7ac2763923455555deb78e7e67758b4fc9378aa0456b21956840265531300d385bebbfbd0b1a9c8e6e3107d28106768a7126a76d0d6fa3cc600011861f46233a1c066ec89b3889a7a9092a308c5f73046dd5fb5f0dc1aea55712469f1150f4c177db9694435dd0946e307e11ead424e87680bacc590e212fa983547e5967f6757c72576ffc5c133d6988689cbcd8dd7a0cc37dfad23786a"}, &(0x7f0000001280)=0xa8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={r4, 0x6, 0x8, 0x7f, 0x81, 0x3, 0x101, 0x5, {r5, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x8001, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r6 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r6, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="246c0ab8b12813d5baea55f35dfd559b3e202f267a5ab8fecbca453307b2aaacb3e4c2cf581c5c16641597343c143de06e9317dcc8f04c99a6a7a1a1ef34f7d80710986c0427544613748329e71cf83837e7862be861dc43316831895e2bc3c07d6f54b019dacce8d9954a7b6185cf976a6b2f74480bf71d6fe729d3cbe9c0a5eb234cdb5cf55e62965b3ce80d3ee967f9a399223b513e4b1bf2a0d3d77c85656d5ecb", 0xa3}], 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmmsg$inet_sctp(r6, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) vmsplice(r2, &(0x7f0000003740)=[{&(0x7f0000001080)=';', 0x1}], 0x1, 0x0) getpeername$ipx(r6, &(0x7f0000001440), &(0x7f0000001480)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000010c0)={r5, 0x3}, &(0x7f0000001400)=0x8) readv(r1, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0xfc74}], 0x3d) 2018/05/08 19:27:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00003cf000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00005ad000)={&(0x7f0000000000)=@flushpolicy={0x5c, 0x1d, 0x1, 0x0, 0x0, "", [@algo_auth_trunc={0x4c, 0x14, {{'sha256_mb\x00'}}}]}, 0x5c}, 0x1}, 0x0) 2018/05/08 19:27:11 executing program 3: r0 = userfaultfd(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000009ff4)) epoll_wait(r1, &(0x7f0000ffafdc)=[{}], 0x1, 0x0) 2018/05/08 19:27:11 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x20, 0x0, @in={0x2, 0x0, @rand_addr}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in=@dev={0xac, 0x14}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback=0x7f000001}}]}, 0x80}, 0x1}, 0x0) 2018/05/08 19:27:11 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x800000000009}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000000080), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000df5ff0)={r1, &(0x7f0000eef000)}, 0x10) 2018/05/08 19:27:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x85, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x188, &(0x7f00001a7f05)=""/251}, 0x48) 2018/05/08 19:27:11 executing program 5: r0 = gettid() r1 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r1, &(0x7f0000000300)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000e60000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x15) 2018/05/08 19:27:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x85, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x188, &(0x7f00001a7f05)=""/251}, 0x48) 2018/05/08 19:27:11 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000011c0)={0x0, 0xa0, "507f411f216a264dd7ac2763923455555deb78e7e67758b4fc9378aa0456b21956840265531300d385bebbfbd0b1a9c8e6e3107d28106768a7126a76d0d6fa3cc600011861f46233a1c066ec89b3889a7a9092a308c5f73046dd5fb5f0dc1aea55712469f1150f4c177db9694435dd0946e307e11ead424e87680bacc590e212fa983547e5967f6757c72576ffc5c133d6988689cbcd8dd7a0cc37dfad23786a"}, &(0x7f0000001280)=0xa8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={r4, 0x6, 0x8, 0x7f, 0x81, 0x3, 0x101, 0x5, {r5, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x8001, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r6 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r6, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="246c0ab8b12813d5baea55f35dfd559b3e202f267a5ab8fecbca453307b2aaacb3e4c2cf581c5c16641597343c143de06e9317dcc8f04c99a6a7a1a1ef34f7d80710986c0427544613748329e71cf83837e7862be861dc43316831895e2bc3c07d6f54b019dacce8d9954a7b6185cf976a6b2f74480bf71d6fe729d3cbe9c0a5eb234cdb5cf55e62965b3ce80d3ee967f9a399223b513e4b1bf2a0d3d77c85656d5ecb", 0xa3}], 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmmsg$inet_sctp(r6, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) vmsplice(r2, &(0x7f0000003740)=[{&(0x7f0000001080)=';', 0x1}], 0x1, 0x0) getpeername$ipx(r6, &(0x7f0000001440), &(0x7f0000001480)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000010c0)={r5, 0x3}, &(0x7f0000001400)=0x8) readv(r1, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0xfc74}], 0x3d) 2018/05/08 19:27:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000011c0)={0x0, 0xa0, "507f411f216a264dd7ac2763923455555deb78e7e67758b4fc9378aa0456b21956840265531300d385bebbfbd0b1a9c8e6e3107d28106768a7126a76d0d6fa3cc600011861f46233a1c066ec89b3889a7a9092a308c5f73046dd5fb5f0dc1aea55712469f1150f4c177db9694435dd0946e307e11ead424e87680bacc590e212fa983547e5967f6757c72576ffc5c133d6988689cbcd8dd7a0cc37dfad23786a"}, &(0x7f0000001280)=0xa8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={r4, 0x6, 0x8, 0x7f, 0x81, 0x3, 0x101, 0x5, {r5, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x8001, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r6 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r6, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="246c0ab8b12813d5baea55f35dfd559b3e202f267a5ab8fecbca453307b2aaacb3e4c2cf581c5c16641597343c143de06e9317dcc8f04c99a6a7a1a1ef34f7d80710986c0427544613748329e71cf83837e7862be861dc43316831895e2bc3c07d6f54b019dacce8d9954a7b6185cf976a6b2f74480bf71d6fe729d3cbe9c0a5eb234cdb5cf55e62965b3ce80d3ee967f9a399223b513e4b1bf2a0d3d77c85656d5ecb", 0xa3}], 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmmsg$inet_sctp(r6, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) vmsplice(r2, &(0x7f0000003740)=[{&(0x7f0000001080)=';', 0x1}], 0x1, 0x0) getpeername$ipx(r6, &(0x7f0000001440), &(0x7f0000001480)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000010c0)={r5, 0x3}, &(0x7f0000001400)=0x8) readv(r1, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0xfc74}], 0x3d) 2018/05/08 19:27:11 executing program 3: r0 = userfaultfd(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000009ff4)) epoll_wait(r1, &(0x7f0000ffafdc)=[{}], 0x1, 0x0) 2018/05/08 19:27:11 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x800000000009}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000000080), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000df5ff0)={r1, &(0x7f0000eef000)}, 0x10) 2018/05/08 19:27:11 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000011c0)={0x0, 0xa0, "507f411f216a264dd7ac2763923455555deb78e7e67758b4fc9378aa0456b21956840265531300d385bebbfbd0b1a9c8e6e3107d28106768a7126a76d0d6fa3cc600011861f46233a1c066ec89b3889a7a9092a308c5f73046dd5fb5f0dc1aea55712469f1150f4c177db9694435dd0946e307e11ead424e87680bacc590e212fa983547e5967f6757c72576ffc5c133d6988689cbcd8dd7a0cc37dfad23786a"}, &(0x7f0000001280)=0xa8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={r4, 0x6, 0x8, 0x7f, 0x81, 0x3, 0x101, 0x5, {r5, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x8001, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r6 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r6, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="246c0ab8b12813d5baea55f35dfd559b3e202f267a5ab8fecbca453307b2aaacb3e4c2cf581c5c16641597343c143de06e9317dcc8f04c99a6a7a1a1ef34f7d80710986c0427544613748329e71cf83837e7862be861dc43316831895e2bc3c07d6f54b019dacce8d9954a7b6185cf976a6b2f74480bf71d6fe729d3cbe9c0a5eb234cdb5cf55e62965b3ce80d3ee967f9a399223b513e4b1bf2a0d3d77c85656d5ecb", 0xa3}], 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmmsg$inet_sctp(r6, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) vmsplice(r2, &(0x7f0000003740)=[{&(0x7f0000001080)=';', 0x1}], 0x1, 0x0) getpeername$ipx(r6, &(0x7f0000001440), &(0x7f0000001480)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000010c0)={r5, 0x3}, &(0x7f0000001400)=0x8) readv(r1, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0xfc74}], 0x3d) 2018/05/08 19:27:11 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000011c0)={0x0, 0xa0, "507f411f216a264dd7ac2763923455555deb78e7e67758b4fc9378aa0456b21956840265531300d385bebbfbd0b1a9c8e6e3107d28106768a7126a76d0d6fa3cc600011861f46233a1c066ec89b3889a7a9092a308c5f73046dd5fb5f0dc1aea55712469f1150f4c177db9694435dd0946e307e11ead424e87680bacc590e212fa983547e5967f6757c72576ffc5c133d6988689cbcd8dd7a0cc37dfad23786a"}, &(0x7f0000001280)=0xa8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={r4, 0x6, 0x8, 0x7f, 0x81, 0x3, 0x101, 0x5, {r5, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x8001, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r6 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r6, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="246c0ab8b12813d5baea55f35dfd559b3e202f267a5ab8fecbca453307b2aaacb3e4c2cf581c5c16641597343c143de06e9317dcc8f04c99a6a7a1a1ef34f7d80710986c0427544613748329e71cf83837e7862be861dc43316831895e2bc3c07d6f54b019dacce8d9954a7b6185cf976a6b2f74480bf71d6fe729d3cbe9c0a5eb234cdb5cf55e62965b3ce80d3ee967f9a399223b513e4b1bf2a0d3d77c85656d5ecb", 0xa3}], 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmmsg$inet_sctp(r6, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) vmsplice(r2, &(0x7f0000003740)=[{&(0x7f0000001080)=';', 0x1}], 0x1, 0x0) getpeername$ipx(r6, &(0x7f0000001440), &(0x7f0000001480)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000010c0)={r5, 0x3}, &(0x7f0000001400)=0x8) readv(r1, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0xfc74}], 0x3d) 2018/05/08 19:27:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="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") readv(r0, &(0x7f0000001480)=[{&(0x7f0000000180)=""/41, 0x29}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/111, 0x6f}, {&(0x7f0000001340)=""/146, 0x92}, {&(0x7f0000001400)=""/68, 0x44}], 0x5) 2018/05/08 19:27:11 executing program 3: r0 = userfaultfd(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000009ff4)) epoll_wait(r1, &(0x7f0000ffafdc)=[{}], 0x1, 0x0) 2018/05/08 19:27:11 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x800000000009}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000000080), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000df5ff0)={r1, &(0x7f0000eef000)}, 0x10) 2018/05/08 19:27:11 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000011c0)={0x0, 0xa0, "507f411f216a264dd7ac2763923455555deb78e7e67758b4fc9378aa0456b21956840265531300d385bebbfbd0b1a9c8e6e3107d28106768a7126a76d0d6fa3cc600011861f46233a1c066ec89b3889a7a9092a308c5f73046dd5fb5f0dc1aea55712469f1150f4c177db9694435dd0946e307e11ead424e87680bacc590e212fa983547e5967f6757c72576ffc5c133d6988689cbcd8dd7a0cc37dfad23786a"}, &(0x7f0000001280)=0xa8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={r4, 0x6, 0x8, 0x7f, 0x81, 0x3, 0x101, 0x5, {r5, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x8001, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r6 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r6, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="246c0ab8b12813d5baea55f35dfd559b3e202f267a5ab8fecbca453307b2aaacb3e4c2cf581c5c16641597343c143de06e9317dcc8f04c99a6a7a1a1ef34f7d80710986c0427544613748329e71cf83837e7862be861dc43316831895e2bc3c07d6f54b019dacce8d9954a7b6185cf976a6b2f74480bf71d6fe729d3cbe9c0a5eb234cdb5cf55e62965b3ce80d3ee967f9a399223b513e4b1bf2a0d3d77c85656d5ecb", 0xa3}], 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmmsg$inet_sctp(r6, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) vmsplice(r2, &(0x7f0000003740)=[{&(0x7f0000001080)=';', 0x1}], 0x1, 0x0) getpeername$ipx(r6, &(0x7f0000001440), &(0x7f0000001480)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000010c0)={r5, 0x3}, &(0x7f0000001400)=0x8) readv(r1, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0xfc74}], 0x3d) 2018/05/08 19:27:12 executing program 3: r0 = userfaultfd(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000009ff4)) epoll_wait(r1, &(0x7f0000ffafdc)=[{}], 0x1, 0x0) 2018/05/08 19:27:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000011c0)={0x0, 0xa0, "507f411f216a264dd7ac2763923455555deb78e7e67758b4fc9378aa0456b21956840265531300d385bebbfbd0b1a9c8e6e3107d28106768a7126a76d0d6fa3cc600011861f46233a1c066ec89b3889a7a9092a308c5f73046dd5fb5f0dc1aea55712469f1150f4c177db9694435dd0946e307e11ead424e87680bacc590e212fa983547e5967f6757c72576ffc5c133d6988689cbcd8dd7a0cc37dfad23786a"}, &(0x7f0000001280)=0xa8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={r4, 0x6, 0x8, 0x7f, 0x81, 0x3, 0x101, 0x5, {r5, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x8001, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r6 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r6, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="246c0ab8b12813d5baea55f35dfd559b3e202f267a5ab8fecbca453307b2aaacb3e4c2cf581c5c16641597343c143de06e9317dcc8f04c99a6a7a1a1ef34f7d80710986c0427544613748329e71cf83837e7862be861dc43316831895e2bc3c07d6f54b019dacce8d9954a7b6185cf976a6b2f74480bf71d6fe729d3cbe9c0a5eb234cdb5cf55e62965b3ce80d3ee967f9a399223b513e4b1bf2a0d3d77c85656d5ecb", 0xa3}], 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmmsg$inet_sctp(r6, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) vmsplice(r2, &(0x7f0000003740)=[{&(0x7f0000001080)=';', 0x1}], 0x1, 0x0) getpeername$ipx(r6, &(0x7f0000001440), &(0x7f0000001480)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000010c0)={r5, 0x3}, &(0x7f0000001400)=0x8) readv(r1, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0xfc74}], 0x3d) 2018/05/08 19:27:12 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000011c0)={0x0, 0xa0, "507f411f216a264dd7ac2763923455555deb78e7e67758b4fc9378aa0456b21956840265531300d385bebbfbd0b1a9c8e6e3107d28106768a7126a76d0d6fa3cc600011861f46233a1c066ec89b3889a7a9092a308c5f73046dd5fb5f0dc1aea55712469f1150f4c177db9694435dd0946e307e11ead424e87680bacc590e212fa983547e5967f6757c72576ffc5c133d6988689cbcd8dd7a0cc37dfad23786a"}, &(0x7f0000001280)=0xa8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={r4, 0x6, 0x8, 0x7f, 0x81, 0x3, 0x101, 0x5, {r5, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x8001, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r6 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r6, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="246c0ab8b12813d5baea55f35dfd559b3e202f267a5ab8fecbca453307b2aaacb3e4c2cf581c5c16641597343c143de06e9317dcc8f04c99a6a7a1a1ef34f7d80710986c0427544613748329e71cf83837e7862be861dc43316831895e2bc3c07d6f54b019dacce8d9954a7b6185cf976a6b2f74480bf71d6fe729d3cbe9c0a5eb234cdb5cf55e62965b3ce80d3ee967f9a399223b513e4b1bf2a0d3d77c85656d5ecb", 0xa3}], 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmmsg$inet_sctp(r6, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) vmsplice(r2, &(0x7f0000003740)=[{&(0x7f0000001080)=';', 0x1}], 0x1, 0x0) getpeername$ipx(r6, &(0x7f0000001440), &(0x7f0000001480)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000010c0)={r5, 0x3}, &(0x7f0000001400)=0x8) readv(r1, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0xfc74}], 0x3d) 2018/05/08 19:27:12 executing program 1: r0 = epoll_create1(0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)={0xc0000000}) close(r1) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 2018/05/08 19:27:12 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000011c0)={0x0, 0xa0, "507f411f216a264dd7ac2763923455555deb78e7e67758b4fc9378aa0456b21956840265531300d385bebbfbd0b1a9c8e6e3107d28106768a7126a76d0d6fa3cc600011861f46233a1c066ec89b3889a7a9092a308c5f73046dd5fb5f0dc1aea55712469f1150f4c177db9694435dd0946e307e11ead424e87680bacc590e212fa983547e5967f6757c72576ffc5c133d6988689cbcd8dd7a0cc37dfad23786a"}, &(0x7f0000001280)=0xa8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={r4, 0x6, 0x8, 0x7f, 0x81, 0x3, 0x101, 0x5, {r5, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x8001, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r6 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r6, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="246c0ab8b12813d5baea55f35dfd559b3e202f267a5ab8fecbca453307b2aaacb3e4c2cf581c5c16641597343c143de06e9317dcc8f04c99a6a7a1a1ef34f7d80710986c0427544613748329e71cf83837e7862be861dc43316831895e2bc3c07d6f54b019dacce8d9954a7b6185cf976a6b2f74480bf71d6fe729d3cbe9c0a5eb234cdb5cf55e62965b3ce80d3ee967f9a399223b513e4b1bf2a0d3d77c85656d5ecb", 0xa3}], 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmmsg$inet_sctp(r6, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) vmsplice(r2, &(0x7f0000003740)=[{&(0x7f0000001080)=';', 0x1}], 0x1, 0x0) getpeername$ipx(r6, &(0x7f0000001440), &(0x7f0000001480)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000010c0)={r5, 0x3}, &(0x7f0000001400)=0x8) readv(r1, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0xfc74}], 0x3d) 2018/05/08 19:27:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="6e65742f6970365f666c6f776c6162656c00d6f04aeee7ce0282a1680b5c8b9fff62a7adc5c4bc5efd7b72d6831b373a6ff705e062dd7ebcff83b27e9a58be117a42d6dc0a89f9e8cb25eaf069537c444f1dfff4a839ff14c0d127b82ff910165070a6bcd7d61bb3f1d887a1e4b05c5130b766681a6cf3fbd79cff692268b643d99ebb59308374617d9a87d4ffb22f6d32863731b9a09190e4a365968b63edf8a43bdec2f88e171d5fedb6ee5f164aa0a6fa5346be6ebbb672fbf6eba9c10e3d13730fdf1cb7792f4fc8385fde555a94dbbe07688a78a8def773911cd37a32c846defb430ba87d65fd332c63fd0ad026c324d10795f1918d3c432f4a614d3d01c6ba681e37a3729e62013b6a17bd4d3310d0cd62a6c3ee7e49cdcc56a492de257831534349062de59329") readv(r0, &(0x7f0000001480)=[{&(0x7f0000000180)=""/41, 0x29}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/111, 0x6f}, {&(0x7f0000001340)=""/146, 0x92}, {&(0x7f0000001400)=""/68, 0x44}], 0x5) 2018/05/08 19:27:12 executing program 5: r0 = gettid() r1 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r1, &(0x7f0000000300)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000e60000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x15) 2018/05/08 19:27:12 executing program 3: r0 = socket$inet(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, '\x00', '\x00', '\x00', '\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], 0x898, 0x898, 0x8c8, [@quota={'quota\x00', 0x18}, @u32={'u32\x00', 0x7c0}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "0000000000a0c50c00000000f77f8200", '\x00', '\x00', '\x00\x00\x00@\x00', @random="46ca750fc811", [], @empty, [], 0x70, 0x70, 0xc0}}, @common=@log={'log\x00', 0x28, {{0x0, "19358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71"}}}}]}]}, 0xa90) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x1, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001040], 0x2, &(0x7f0000008000), &(0x7f0000001040)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x8137, 'bridge_slave_0\x00', '\x00', '\x00', 'yam0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], 0xe8, 0x190, 0x1e0, [@cluster={'cluster\x00', 0x10, {{0x8, 0x0, 0x0, 0x1}}}, @time={'time\x00', 0x18, {{0x1000, 0x3, 0x750f, 0x7, 0x7, 0x401, 0x3}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "88d723160be005dd28e669e4af13c267acbec0877fa169c7ca9f39f98b8b8792feeeabacd82ee6f5dd9c365c800de9134279a62d0d38655305745e36a64778b0"}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x288) 2018/05/08 19:27:12 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000011c0)={0x0, 0xa0, "507f411f216a264dd7ac2763923455555deb78e7e67758b4fc9378aa0456b21956840265531300d385bebbfbd0b1a9c8e6e3107d28106768a7126a76d0d6fa3cc600011861f46233a1c066ec89b3889a7a9092a308c5f73046dd5fb5f0dc1aea55712469f1150f4c177db9694435dd0946e307e11ead424e87680bacc590e212fa983547e5967f6757c72576ffc5c133d6988689cbcd8dd7a0cc37dfad23786a"}, &(0x7f0000001280)=0xa8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={r4, 0x6, 0x8, 0x7f, 0x81, 0x3, 0x101, 0x5, {r5, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x8001, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r6 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r6, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="246c0ab8b12813d5baea55f35dfd559b3e202f267a5ab8fecbca453307b2aaacb3e4c2cf581c5c16641597343c143de06e9317dcc8f04c99a6a7a1a1ef34f7d80710986c0427544613748329e71cf83837e7862be861dc43316831895e2bc3c07d6f54b019dacce8d9954a7b6185cf976a6b2f74480bf71d6fe729d3cbe9c0a5eb234cdb5cf55e62965b3ce80d3ee967f9a399223b513e4b1bf2a0d3d77c85656d5ecb", 0xa3}], 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmmsg$inet_sctp(r6, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) vmsplice(r2, &(0x7f0000003740)=[{&(0x7f0000001080)=';', 0x1}], 0x1, 0x0) getpeername$ipx(r6, &(0x7f0000001440), &(0x7f0000001480)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000010c0)={r5, 0x3}, &(0x7f0000001400)=0x8) readv(r1, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0xfc74}], 0x3d) 2018/05/08 19:27:12 executing program 1: r0 = epoll_create1(0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)={0xc0000000}) close(r1) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 2018/05/08 19:27:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="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") readv(r0, &(0x7f0000001480)=[{&(0x7f0000000180)=""/41, 0x29}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/111, 0x6f}, {&(0x7f0000001340)=""/146, 0x92}, {&(0x7f0000001400)=""/68, 0x44}], 0x5) 2018/05/08 19:27:12 executing program 7: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0xfffffffffffffc7c) sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{&(0x7f0000000a40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000001140), 0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="500000000000000000000000000000004cefe340ea34b159a910fece750c79ba54e4fb4c964e8b6237fc4d8cdd8880f8b0f1b0a6668737dcf2256e58b42683575601eda0336898cd90d242f7865e"], 0x4e}}], 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/05/08 19:27:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000011c0)={0x0, 0xa0, "507f411f216a264dd7ac2763923455555deb78e7e67758b4fc9378aa0456b21956840265531300d385bebbfbd0b1a9c8e6e3107d28106768a7126a76d0d6fa3cc600011861f46233a1c066ec89b3889a7a9092a308c5f73046dd5fb5f0dc1aea55712469f1150f4c177db9694435dd0946e307e11ead424e87680bacc590e212fa983547e5967f6757c72576ffc5c133d6988689cbcd8dd7a0cc37dfad23786a"}, &(0x7f0000001280)=0xa8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={r4, 0x6, 0x8, 0x7f, 0x81, 0x3, 0x101, 0x5, {r5, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x8001, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r6 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r6, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="246c0ab8b12813d5baea55f35dfd559b3e202f267a5ab8fecbca453307b2aaacb3e4c2cf581c5c16641597343c143de06e9317dcc8f04c99a6a7a1a1ef34f7d80710986c0427544613748329e71cf83837e7862be861dc43316831895e2bc3c07d6f54b019dacce8d9954a7b6185cf976a6b2f74480bf71d6fe729d3cbe9c0a5eb234cdb5cf55e62965b3ce80d3ee967f9a399223b513e4b1bf2a0d3d77c85656d5ecb", 0xa3}], 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmmsg$inet_sctp(r6, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) vmsplice(r2, &(0x7f0000003740)=[{&(0x7f0000001080)=';', 0x1}], 0x1, 0x0) getpeername$ipx(r6, &(0x7f0000001440), &(0x7f0000001480)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000010c0)={r5, 0x3}, &(0x7f0000001400)=0x8) readv(r1, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0xfc74}], 0x3d) 2018/05/08 19:27:12 executing program 6: unshare(0x8000400) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) connect$ipx(r0, &(0x7f0000000100)={0x4, 0x0, 0x0, "d4dc1a3e99db"}, 0x10) 2018/05/08 19:27:12 executing program 4: r0 = socket(0x200000000000002, 0x80003, 0x1) setsockopt(r0, 0xff, 0x1, &(0x7f0000000000), 0x19e) 2018/05/08 19:27:12 executing program 1: r0 = epoll_create1(0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)={0xc0000000}) close(r1) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 2018/05/08 19:27:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="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") readv(r0, &(0x7f0000001480)=[{&(0x7f0000000180)=""/41, 0x29}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/111, 0x6f}, {&(0x7f0000001340)=""/146, 0x92}, {&(0x7f0000001400)=""/68, 0x44}], 0x5) 2018/05/08 19:27:12 executing program 4: r0 = socket(0x200000000000002, 0x80003, 0x1) setsockopt(r0, 0xff, 0x1, &(0x7f0000000000), 0x19e) 2018/05/08 19:27:13 executing program 3: r0 = socket$inet(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, '\x00', '\x00', '\x00', '\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], 0x898, 0x898, 0x8c8, [@quota={'quota\x00', 0x18}, @u32={'u32\x00', 0x7c0}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "0000000000a0c50c00000000f77f8200", '\x00', '\x00', '\x00\x00\x00@\x00', @random="46ca750fc811", [], @empty, [], 0x70, 0x70, 0xc0}}, @common=@log={'log\x00', 0x28, {{0x0, "19358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71"}}}}]}]}, 0xa90) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x1, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001040], 0x2, &(0x7f0000008000), &(0x7f0000001040)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x8137, 'bridge_slave_0\x00', '\x00', '\x00', 'yam0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], 0xe8, 0x190, 0x1e0, [@cluster={'cluster\x00', 0x10, {{0x8, 0x0, 0x0, 0x1}}}, @time={'time\x00', 0x18, {{0x1000, 0x3, 0x750f, 0x7, 0x7, 0x401, 0x3}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "88d723160be005dd28e669e4af13c267acbec0877fa169c7ca9f39f98b8b8792feeeabacd82ee6f5dd9c365c800de9134279a62d0d38655305745e36a64778b0"}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x288) 2018/05/08 19:27:13 executing program 4: r0 = socket(0x200000000000002, 0x80003, 0x1) setsockopt(r0, 0xff, 0x1, &(0x7f0000000000), 0x19e) 2018/05/08 19:27:13 executing program 7: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0xfffffffffffffc7c) sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{&(0x7f0000000a40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000001140), 0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="500000000000000000000000000000004cefe340ea34b159a910fece750c79ba54e4fb4c964e8b6237fc4d8cdd8880f8b0f1b0a6668737dcf2256e58b42683575601eda0336898cd90d242f7865e"], 0x4e}}], 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/05/08 19:27:13 executing program 1: r0 = epoll_create1(0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)={0xc0000000}) close(r1) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 2018/05/08 19:27:13 executing program 6: unshare(0x8000400) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) connect$ipx(r0, &(0x7f0000000100)={0x4, 0x0, 0x0, "d4dc1a3e99db"}, 0x10) 2018/05/08 19:27:13 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='}\x00', 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x2012, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x4d) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, &(0x7f00000003c0)=0x9, 0x5fb, 0x0) io_setup(0x8, &(0x7f0000002000)) 2018/05/08 19:27:13 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_cmd={0x4e}}) 2018/05/08 19:27:13 executing program 5: r0 = gettid() r1 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r1, &(0x7f0000000300)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000e60000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x15) 2018/05/08 19:27:13 executing program 4: r0 = socket(0x200000000000002, 0x80003, 0x1) setsockopt(r0, 0xff, 0x1, &(0x7f0000000000), 0x19e) 2018/05/08 19:27:13 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_cmd={0x4e}}) 2018/05/08 19:27:13 executing program 7: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0xfffffffffffffc7c) sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{&(0x7f0000000a40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000001140), 0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="500000000000000000000000000000004cefe340ea34b159a910fece750c79ba54e4fb4c964e8b6237fc4d8cdd8880f8b0f1b0a6668737dcf2256e58b42683575601eda0336898cd90d242f7865e"], 0x4e}}], 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/05/08 19:27:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000186fe4)={0xa, 0x4e20}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x75, &(0x7f0000bb9000)={0x0, 0x7}, 0x8) sendto$inet6(r1, &(0x7f0000ff8fff)="e1", 0x1, 0x0, &(0x7f000069ffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @result}], 0x30) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='s'], 0x1) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00003f7000)={0x0, 0x6}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00009b6000), 0x4) 2018/05/08 19:27:13 executing program 6: unshare(0x8000400) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) connect$ipx(r0, &(0x7f0000000100)={0x4, 0x0, 0x0, "d4dc1a3e99db"}, 0x10) 2018/05/08 19:27:14 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='}\x00', 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x2012, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x4d) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, &(0x7f00000003c0)=0x9, 0x5fb, 0x0) io_setup(0x8, &(0x7f0000002000)) 2018/05/08 19:27:14 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2018/05/08 19:27:14 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_cmd={0x4e}}) 2018/05/08 19:27:14 executing program 3: r0 = socket$inet(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, '\x00', '\x00', '\x00', '\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], 0x898, 0x898, 0x8c8, [@quota={'quota\x00', 0x18}, @u32={'u32\x00', 0x7c0}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "0000000000a0c50c00000000f77f8200", '\x00', '\x00', '\x00\x00\x00@\x00', @random="46ca750fc811", [], @empty, [], 0x70, 0x70, 0xc0}}, @common=@log={'log\x00', 0x28, {{0x0, "19358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71"}}}}]}]}, 0xa90) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x1, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001040], 0x2, &(0x7f0000008000), &(0x7f0000001040)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x8137, 'bridge_slave_0\x00', '\x00', '\x00', 'yam0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], 0xe8, 0x190, 0x1e0, [@cluster={'cluster\x00', 0x10, {{0x8, 0x0, 0x0, 0x1}}}, @time={'time\x00', 0x18, {{0x1000, 0x3, 0x750f, 0x7, 0x7, 0x401, 0x3}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "88d723160be005dd28e669e4af13c267acbec0877fa169c7ca9f39f98b8b8792feeeabacd82ee6f5dd9c365c800de9134279a62d0d38655305745e36a64778b0"}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x288) 2018/05/08 19:27:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000186fe4)={0xa, 0x4e20}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x75, &(0x7f0000bb9000)={0x0, 0x7}, 0x8) sendto$inet6(r1, &(0x7f0000ff8fff)="e1", 0x1, 0x0, &(0x7f000069ffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @result}], 0x30) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='s'], 0x1) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00003f7000)={0x0, 0x6}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00009b6000), 0x4) 2018/05/08 19:27:14 executing program 6: unshare(0x8000400) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) connect$ipx(r0, &(0x7f0000000100)={0x4, 0x0, 0x0, "d4dc1a3e99db"}, 0x10) 2018/05/08 19:27:14 executing program 7: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0xfffffffffffffc7c) sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{&(0x7f0000000a40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000001140), 0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="500000000000000000000000000000004cefe340ea34b159a910fece750c79ba54e4fb4c964e8b6237fc4d8cdd8880f8b0f1b0a6668737dcf2256e58b42683575601eda0336898cd90d242f7865e"], 0x4e}}], 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/05/08 19:27:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000186fe4)={0xa, 0x4e20}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x75, &(0x7f0000bb9000)={0x0, 0x7}, 0x8) sendto$inet6(r1, &(0x7f0000ff8fff)="e1", 0x1, 0x0, &(0x7f000069ffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @result}], 0x30) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='s'], 0x1) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00003f7000)={0x0, 0x6}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00009b6000), 0x4) 2018/05/08 19:27:14 executing program 7: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) truncate(&(0x7f0000000000)='./file0/bus\x00', 0x5) r0 = open(&(0x7f0000a94ff4)='./file0/bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x3) 2018/05/08 19:27:14 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x4043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) shutdown(r2, 0x1) 2018/05/08 19:27:14 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='}\x00', 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x2012, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x4d) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, &(0x7f00000003c0)=0x9, 0x5fb, 0x0) io_setup(0x8, &(0x7f0000002000)) 2018/05/08 19:27:14 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_cmd={0x4e}}) 2018/05/08 19:27:14 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2018/05/08 19:27:14 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) socket$packet(0x11, 0x3, 0x300) write(r0, &(0x7f0000000080)="2700000014000707030e0000120f0a0011000100291a7648c9721011010e49d6a906ab4500d6ec", 0x27) 2018/05/08 19:27:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000186fe4)={0xa, 0x4e20}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x75, &(0x7f0000bb9000)={0x0, 0x7}, 0x8) sendto$inet6(r1, &(0x7f0000ff8fff)="e1", 0x1, 0x0, &(0x7f000069ffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @result}], 0x30) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='s'], 0x1) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00003f7000)={0x0, 0x6}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00009b6000), 0x4) [ 116.721609] ================================================================== [ 116.729134] BUG: KMSAN: uninit-value in __sctp_v6_cmp_addr+0x49a/0x850 [ 116.735807] CPU: 1 PID: 7968 Comm: syz-executor6 Not tainted 4.17.0-rc3+ #88 [ 116.742993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.752355] Call Trace: [ 116.754944] [ 116.757105] dump_stack+0x185/0x1d0 [ 116.760737] ? __sctp_v6_cmp_addr+0x49a/0x850 [ 116.765233] kmsan_report+0x142/0x240 [ 116.769471] __msan_warning_32+0x6c/0xb0 [ 116.773536] __sctp_v6_cmp_addr+0x49a/0x850 [ 116.777865] sctp_inet6_cmp_addr+0x3dc/0x400 [ 116.782277] ? sctp_inet6_af_supported+0xf0/0xf0 [ 116.787127] sctp_bind_addr_match+0x18b/0x2f0 [ 116.791632] sctp_addrs_lookup_transport+0x904/0xa20 [ 116.796744] sctp_rcv+0x15e6/0x4d30 [ 116.800377] ? raw_local_deliver+0x63/0x1660 [ 116.804789] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 116.810158] ? raw_local_deliver+0xe2/0x1660 [ 116.814570] ? iptable_nat_ipv4_fn+0xb0/0xb0 [ 116.818976] ? kmsan_set_origin_inline+0x6b/0x120 [ 116.823801] ? sctp_v4_cmp_addr+0x250/0x250 [ 116.828113] ? sctp_csum_combine+0xa0/0xa0 [ 116.832331] ip_local_deliver_finish+0x874/0xec0 [ 116.837083] ip_local_deliver+0x43c/0x4e0 [ 116.841227] ? ip_local_deliver+0x4e0/0x4e0 [ 116.845539] ? ip_call_ra_chain+0x7c0/0x7c0 [ 116.849844] ip_rcv_finish+0xa36/0x1d00 [ 116.853803] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 116.859157] ? nf_hook_slow+0x36f/0x3d0 [ 116.863117] ip_rcv+0x118f/0x16d0 [ 116.866560] ? ip_rcv+0x16d0/0x16d0 [ 116.870530] __netif_receive_skb_core+0x47df/0x4a90 [ 116.875545] ? ip_local_deliver_finish+0xec0/0xec0 [ 116.880467] process_backlog+0x62d/0xe20 [ 116.884526] ? rps_trigger_softirq+0x2f0/0x2f0 [ 116.889106] net_rx_action+0x7c1/0x1a70 [ 116.893085] ? net_tx_action+0xab0/0xab0 [ 116.897142] __do_softirq+0x56d/0x93d [ 116.900926] do_softirq_own_stack+0x2a/0x40 [ 116.905222] [ 116.907449] __local_bh_enable_ip+0x114/0x140 [ 116.911931] local_bh_enable+0x36/0x40 [ 116.915798] ip_finish_output2+0x135a/0x1470 [ 116.920213] ip_finish_output+0xcb2/0xff0 [ 116.924353] ip_output+0x505/0x5d0 [ 116.927874] ? ip_mc_finish_output+0x3b0/0x3b0 [ 116.932447] ? ip_finish_output+0xff0/0xff0 [ 116.936763] ip_queue_xmit+0x1a1e/0x1d10 [ 116.940814] ? __msan_poison_alloca+0x15c/0x1d0 [ 116.945472] ? sctp_chunk_put+0x29d/0x460 [ 116.949604] sctp_v4_xmit+0x188/0x210 [ 116.953383] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 116.958825] ? sctp_addr_wq_timeout_handler+0x840/0x840 [ 116.964176] sctp_packet_transmit+0x3eaa/0x4350 [ 116.968854] sctp_outq_flush+0x11e6/0x6320 [ 116.973085] ? __mod_timer+0x350/0x2c40 [ 116.977055] ? process_slab+0x830/0x1f20 [ 116.981115] sctp_outq_uncork+0xd2/0xf0 [ 116.985083] sctp_do_sm+0x8707/0x8d20 [ 116.988872] ? __msan_poison_alloca+0x15c/0x1d0 [ 116.993522] ? _raw_spin_unlock_bh+0x57/0x70 [ 116.997908] ? __local_bh_enable_ip+0x3b/0x140 [ 117.002469] ? _raw_spin_unlock_bh+0x57/0x70 [ 117.006857] ? __local_bh_enable_ip+0x3b/0x140 [ 117.011421] ? _raw_spin_unlock_bh+0x57/0x70 [ 117.015816] sctp_primitive_ASSOCIATE+0x172/0x1a0 [ 117.020641] __sctp_connect+0x1655/0x1b00 [ 117.024772] ? __msan_poison_alloca+0x15c/0x1d0 [ 117.029436] ? __local_bh_enable_ip+0x3b/0x140 [ 117.034008] sctp_connect+0x1b0/0x200 [ 117.037799] ? sctp_close+0xdb0/0xdb0 [ 117.041582] inet_dgram_connect+0x40c/0x670 [ 117.045891] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 117.051244] ? __inet_bind+0xff0/0xff0 [ 117.055127] __sys_connect+0x41a/0x510 [ 117.058999] ? syscall_return_slowpath+0xe9/0x700 [ 117.063829] __x64_sys_connect+0xd8/0x120 [ 117.067965] do_syscall_64+0x154/0x220 [ 117.071849] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.077030] RIP: 0033:0x455979 [ 117.080206] RSP: 002b:00007f8735803c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 117.087900] RAX: ffffffffffffffda RBX: 00007f87358046d4 RCX: 0000000000455979 [ 117.095158] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000015 [ 117.102418] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 117.109668] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 117.116929] R13: 000000000000005a R14: 00000000006f4910 R15: 0000000000000000 [ 117.124181] [ 117.125795] Local variable description: ----dest@sctp_rcv [ 117.131310] Variable was created at: [ 117.135015] sctp_rcv+0x13d/0x4d30 [ 117.138547] ip_local_deliver_finish+0x874/0xec0 [ 117.143285] ================================================================== [ 117.150622] Disabling lock debugging due to kernel taint [ 117.156083] Kernel panic - not syncing: panic_on_warn set ... [ 117.156083] [ 117.163442] CPU: 1 PID: 7968 Comm: syz-executor6 Tainted: G B 4.17.0-rc3+ #88 [ 117.171995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.181336] Call Trace: [ 117.183902] [ 117.186047] dump_stack+0x185/0x1d0 [ 117.189671] panic+0x39d/0x940 [ 117.192861] ? __sctp_v6_cmp_addr+0x49a/0x850 [ 117.197336] kmsan_report+0x238/0x240 [ 117.201125] __msan_warning_32+0x6c/0xb0 [ 117.205176] __sctp_v6_cmp_addr+0x49a/0x850 [ 117.209494] sctp_inet6_cmp_addr+0x3dc/0x400 [ 117.213896] ? sctp_inet6_af_supported+0xf0/0xf0 [ 117.218643] sctp_bind_addr_match+0x18b/0x2f0 [ 117.223121] sctp_addrs_lookup_transport+0x904/0xa20 [ 117.228220] sctp_rcv+0x15e6/0x4d30 [ 117.231839] ? raw_local_deliver+0x63/0x1660 [ 117.236237] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 117.241584] ? raw_local_deliver+0xe2/0x1660 [ 117.245988] ? iptable_nat_ipv4_fn+0xb0/0xb0 [ 117.250397] ? kmsan_set_origin_inline+0x6b/0x120 [ 117.255241] ? sctp_v4_cmp_addr+0x250/0x250 [ 117.259555] ? sctp_csum_combine+0xa0/0xa0 [ 117.263780] ip_local_deliver_finish+0x874/0xec0 [ 117.268528] ip_local_deliver+0x43c/0x4e0 [ 117.272656] ? ip_local_deliver+0x4e0/0x4e0 [ 117.276961] ? ip_call_ra_chain+0x7c0/0x7c0 [ 117.281267] ip_rcv_finish+0xa36/0x1d00 [ 117.285227] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 117.290578] ? nf_hook_slow+0x36f/0x3d0 [ 117.294558] ip_rcv+0x118f/0x16d0 [ 117.297995] ? ip_rcv+0x16d0/0x16d0 [ 117.301613] __netif_receive_skb_core+0x47df/0x4a90 [ 117.306617] ? ip_local_deliver_finish+0xec0/0xec0 [ 117.311618] process_backlog+0x62d/0xe20 [ 117.315667] ? rps_trigger_softirq+0x2f0/0x2f0 [ 117.320229] net_rx_action+0x7c1/0x1a70 [ 117.324191] ? net_tx_action+0xab0/0xab0 [ 117.328236] __do_softirq+0x56d/0x93d [ 117.332112] do_softirq_own_stack+0x2a/0x40 [ 117.336415] [ 117.338636] __local_bh_enable_ip+0x114/0x140 [ 117.343199] local_bh_enable+0x36/0x40 [ 117.347070] ip_finish_output2+0x135a/0x1470 [ 117.351466] ip_finish_output+0xcb2/0xff0 [ 117.355599] ip_output+0x505/0x5d0 [ 117.359125] ? ip_mc_finish_output+0x3b0/0x3b0 [ 117.363692] ? ip_finish_output+0xff0/0xff0 [ 117.367994] ip_queue_xmit+0x1a1e/0x1d10 [ 117.372046] ? __msan_poison_alloca+0x15c/0x1d0 [ 117.376704] ? sctp_chunk_put+0x29d/0x460 [ 117.380842] sctp_v4_xmit+0x188/0x210 [ 117.384627] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 117.390061] ? sctp_addr_wq_timeout_handler+0x840/0x840 [ 117.396277] sctp_packet_transmit+0x3eaa/0x4350 [ 117.400947] sctp_outq_flush+0x11e6/0x6320 [ 117.405167] ? __mod_timer+0x350/0x2c40 [ 117.409126] ? process_slab+0x830/0x1f20 [ 117.413188] sctp_outq_uncork+0xd2/0xf0 [ 117.417147] sctp_do_sm+0x8707/0x8d20 [ 117.420939] ? __msan_poison_alloca+0x15c/0x1d0 [ 117.425589] ? _raw_spin_unlock_bh+0x57/0x70 [ 117.429980] ? __local_bh_enable_ip+0x3b/0x140 [ 117.434540] ? _raw_spin_unlock_bh+0x57/0x70 [ 117.438937] ? __local_bh_enable_ip+0x3b/0x140 [ 117.443499] ? _raw_spin_unlock_bh+0x57/0x70 [ 117.447898] sctp_primitive_ASSOCIATE+0x172/0x1a0 [ 117.452733] __sctp_connect+0x1655/0x1b00 [ 117.456862] ? __msan_poison_alloca+0x15c/0x1d0 [ 117.461519] ? __local_bh_enable_ip+0x3b/0x140 [ 117.466085] sctp_connect+0x1b0/0x200 [ 117.469867] ? sctp_close+0xdb0/0xdb0 [ 117.473650] inet_dgram_connect+0x40c/0x670 [ 117.477955] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 117.483302] ? __inet_bind+0xff0/0xff0 [ 117.487173] __sys_connect+0x41a/0x510 [ 117.491051] ? syscall_return_slowpath+0xe9/0x700 [ 117.495881] __x64_sys_connect+0xd8/0x120 [ 117.500025] do_syscall_64+0x154/0x220 [ 117.503903] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.509072] RIP: 0033:0x455979 [ 117.512241] RSP: 002b:00007f8735803c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 117.519941] RAX: ffffffffffffffda RBX: 00007f87358046d4 RCX: 0000000000455979 [ 117.527189] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000015 [ 117.534440] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 117.541777] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 117.549032] R13: 000000000000005a R14: 00000000006f4910 R15: 0000000000000000 [ 117.556823] Dumping ftrace buffer: [ 117.560346] (ftrace buffer empty) [ 117.564043] Kernel Offset: disabled [ 117.567653] Rebooting in 86400 seconds..