INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.22' (ECDSA) to the list of known hosts. 2018/04/16 23:30:56 fuzzer started 2018/04/16 23:30:56 dialing manager at 10.128.0.26:45925 syzkaller login: [ 47.650192] can: request_module (can-proto-0) failed. [ 47.659132] can: request_module (can-proto-0) failed. 2018/04/16 23:31:14 kcov=true, comps=true 2018/04/16 23:31:19 executing program 0: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)={0x7fffffff, 0xffffffffffffffff}) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) process_vm_writev(r1, &(0x7f0000000080)=[{&(0x7f0000001600)=""/226, 0x2e0}], 0x1, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/16 23:31:19 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140), 0x8) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x4, 0x0, &(0x7f0000004fbc)=ANY=[@ANYBLOB='\x00c@@'], 0x1, 0x0, &(0x7f00000003c0)='+'}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x4, 0x0, &(0x7f0000000180)=[@enter_looper={0x630c}], 0x48, 0x0, &(0x7f00000001c0)="79c8043c6ccb55ca6862aca6ef67049803539d252b8e60508820fc32d4ab0dd2d9f45b45168a3aeae2a18666f6a05aea6327c9e75b5f125706c853cdf16ec9e31eafd8f25a5e9cf7"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)}}], 0x0, 0x0, &(0x7f0000000100)}) 2018/04/16 23:31:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000000200)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_NMI(r3, 0xae9a) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x852, r5, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="b907020000b851000000ba000000000f300f013ed808c4c27d5a8805000000b9800000c00f3235008000000f30b83f5e00000f23d80f21f835800000300f23f8660f1ac965640f001ef3262e0f013266bad10466ed", 0x55}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2018/04/16 23:31:19 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syncfs(r0) 2018/04/16 23:31:19 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tun(&(0x7f0000000000)='/dev/net//..\x00', 0x0, 0x2000000000414402) 2018/04/16 23:31:19 executing program 7: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013000), 0x4) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f0000001ffc)=0x4) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/04/16 23:31:19 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) ioctl$UFFDIO_REGISTER(r0, 0x8010aa01, &(0x7f0000006ffc)={{&(0x7f0000009000/0x4000)=nil, 0x4000}}) 2018/04/16 23:31:19 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xa0808400, &(0x7f0000000180), &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 52.947678] random: crng init done [ 53.160946] IPVS: ftp: loaded support on port[0] = 21 [ 53.195517] IPVS: ftp: loaded support on port[0] = 21 [ 53.247443] IPVS: ftp: loaded support on port[0] = 21 [ 53.290797] IPVS: ftp: loaded support on port[0] = 21 [ 53.299946] IPVS: ftp: loaded support on port[0] = 21 [ 53.309555] IPVS: ftp: loaded support on port[0] = 21 [ 53.318220] IPVS: ftp: loaded support on port[0] = 21 [ 53.331393] IPVS: ftp: loaded support on port[0] = 21 [ 55.283281] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.289802] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.302373] device bridge_slave_0 entered promiscuous mode [ 55.354766] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.361184] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.389150] device bridge_slave_0 entered promiscuous mode [ 55.424371] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.430763] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.438501] device bridge_slave_1 entered promiscuous mode [ 55.447713] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.454089] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.463206] device bridge_slave_0 entered promiscuous mode [ 55.474731] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.481097] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.492392] device bridge_slave_0 entered promiscuous mode [ 55.510957] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.517356] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.536288] device bridge_slave_1 entered promiscuous mode [ 55.552672] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.559061] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.567311] device bridge_slave_0 entered promiscuous mode [ 55.574802] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.581176] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.588766] device bridge_slave_0 entered promiscuous mode [ 55.598474] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.604864] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.619850] device bridge_slave_1 entered promiscuous mode [ 55.633580] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.639936] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.647790] device bridge_slave_0 entered promiscuous mode [ 55.660920] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.669630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.679073] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.685455] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.718154] device bridge_slave_1 entered promiscuous mode [ 55.731514] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.737935] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.745877] device bridge_slave_1 entered promiscuous mode [ 55.754547] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.760922] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.777467] device bridge_slave_1 entered promiscuous mode [ 55.785470] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.794493] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.800871] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.811586] device bridge_slave_1 entered promiscuous mode [ 55.820066] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.828584] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.838305] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.845467] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.851898] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.864955] device bridge_slave_0 entered promiscuous mode [ 55.895123] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.910186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.953839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.962835] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.971679] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.984219] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.990604] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.030162] device bridge_slave_1 entered promiscuous mode [ 56.038190] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.047715] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.105357] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.128358] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.174209] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.200765] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.265191] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.326905] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.373488] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.387807] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.405185] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.425257] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.434229] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.524122] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.534446] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.573318] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.586599] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.595301] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.622398] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.666779] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.675559] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.682575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.710939] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.718888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.736323] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.743215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.771115] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.778951] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.785877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.819039] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.827499] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.835525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.850595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.881174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.889691] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.897741] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.904997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.925539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.950320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.972945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 57.003992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.033818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 57.040728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.082579] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.109475] team0: Port device team_slave_0 added [ 57.126665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 57.133908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.149631] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.164842] team0: Port device team_slave_0 added [ 57.204535] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.225378] team0: Port device team_slave_0 added [ 57.254791] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.278211] team0: Port device team_slave_1 added [ 57.297586] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.310878] team0: Port device team_slave_0 added [ 57.323613] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.345463] team0: Port device team_slave_0 added [ 57.357896] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.368407] team0: Port device team_slave_1 added [ 57.376900] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.391624] team0: Port device team_slave_0 added [ 57.429906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.450937] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.462978] team0: Port device team_slave_1 added [ 57.469350] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.476651] team0: Port device team_slave_1 added [ 57.487131] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.497632] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.510949] team0: Port device team_slave_1 added [ 57.524931] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.542783] team0: Port device team_slave_1 added [ 57.561509] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.570239] team0: Port device team_slave_0 added [ 57.581975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.590415] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.604787] team0: Port device team_slave_0 added [ 57.615050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.627337] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 57.658628] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.675460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.699457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.716229] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.732196] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.739788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.746674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.755499] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.763720] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.771665] team0: Port device team_slave_1 added [ 57.779437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.790587] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 57.797993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.811847] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.824882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.840568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.850613] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.858852] team0: Port device team_slave_1 added [ 57.865176] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.872869] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.881671] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 57.893720] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 57.900809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.910211] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.928924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.945256] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.953342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.966491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.974843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.982844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.994206] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 58.002434] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.011360] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 58.019950] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.029403] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.038231] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.046487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.067463] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.093669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.114957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.131367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.139296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.146693] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.154531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.162302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.169963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.177699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.185540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.193484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.200642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.209680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.219749] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.228939] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.237914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.248737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.272839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.291189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.301725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.317215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.324792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.332524] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.342591] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.354178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.369794] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.384402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.394346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.412247] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.426688] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.434790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.453139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.469644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.483185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.502151] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.547081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.564045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.600946] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.608672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.632656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.652255] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.686861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.722944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.456447] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.462983] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.469941] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.476327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.529268] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.658128] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.664536] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.671200] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.677563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.710312] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.718895] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.725268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.731912] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.738287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.747359] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.759508] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.765877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.772526] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.778906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.809266] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.821709] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.828079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.834677] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.841067] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.854151] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.866074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.878805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.891620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.905664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.913809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.955873] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.962247] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.968908] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.975276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.983486] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 60.063880] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.070256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.076906] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.083282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.093722] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 60.227428] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.233840] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.240495] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.246867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.284192] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 60.896276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.917686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.946073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.591419] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.626786] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.660298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.687727] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.827440] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.965391] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.049672] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.082572] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.092902] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.135062] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.148040] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.217289] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.290777] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.473340] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.518503] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.532080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.544476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.564182] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.573871] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.592219] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.624873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.638443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.647692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.658409] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.675902] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.682336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.689842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.777658] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.838666] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.845475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.853839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.951770] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.958269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.968483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.999070] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.020992] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.142522] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.160971] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.171364] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.185356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.198517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.283626] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.289955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.300897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.392664] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.450138] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.648429] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.838696] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:31:35 executing program 5: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xa, 0x0, 0xf00}}) 2018/04/16 23:31:35 executing program 5: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xa, 0x0, 0xf00}}) 2018/04/16 23:31:35 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x60000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x70}, 0x1}, 0x0) 2018/04/16 23:31:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='devtmpfs\x00', 0x403, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000000400), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 2018/04/16 23:31:35 executing program 5: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xa, 0x0, 0xf00}}) 2018/04/16 23:31:35 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x80247008, &(0x7f0000000080)) [ 69.212883] capability: warning: `syz-executor0' uses 32-bit capabilities (legacy support in use) 2018/04/16 23:31:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@mpls_getroute={0x20, 0x1a, 0x1, 0x0, 0x0, {0x1c}, [@RTA_DST={0x4, 0x1}]}, 0x20}, 0x1}, 0x0) 2018/04/16 23:31:35 executing program 5: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xa, 0x0, 0xf00}}) [ 69.328580] netlink: 'syz-executor4': attribute type 1 has an invalid length. [ 69.574679] binder: BINDER_SET_CONTEXT_MGR already set [ 69.580457] binder: 6536:6540 ioctl 40046207 0 returned -16 [ 69.587087] binder_alloc: 6536: binder_alloc_buf, no vma [ 69.592785] binder: 6536:6540 transaction failed 29189/-3, size 0-0 line 2963 [ 69.622752] binder: undelivered TRANSACTION_COMPLETE 2018/04/16 23:31:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="d3ab27191a01002356ba602dff050022fef9b9afa4b20079", 0x18) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)="6d7c3aea08075fc63b363a30c497c721", 0x10}], 0x1, &(0x7f0000000080)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000d40)={&(0x7f0000000180)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000500)=""/18, 0x12}], 0x1, &(0x7f0000000cc0)=""/97, 0x61}, 0x0) 2018/04/16 23:31:36 executing program 6: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000b80)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000000), 0xfffffddd) read(r0, &(0x7f0000000c00)=""/194, 0xffffff58) prctl$getreaper(0x0, &(0x7f00000001c0)) 2018/04/16 23:31:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="1300000010ecffdde200f4088000050002230a", 0x13) 2018/04/16 23:31:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f000007ff6f)="9fa0291e41797c3d71854a9fe2cd858674c82988348b5ca3", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000029c0)=[{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000600)="6c70c1e3a3d4b9675c3d804ec42da4290b7711d1b3bf0bf759bc65171a7b8d6b1061fe5bc8fcaae9", 0x28}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000214fc8)={&(0x7f0000214fec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x14, &(0x7f0000140fd0)=[{&(0x7f0000154fd6)=""/42, 0x2a}], 0x1, &(0x7f0000214000)=""/155, 0x9b}, 0x0) 2018/04/16 23:31:36 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000e2d000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f0000000140)={0x1, {&(0x7f0000000100)=""/24, 0x18, &(0x7f00000001c0)=""/101, 0x0, 0x3}}, 0x68) 2018/04/16 23:31:36 executing program 7: r0 = socket(0x10, 0x400000802, 0x0) write(r0, &(0x7f00000eefe1)="1f0000005e00070100021b0a000008ff0a325793a93c791bca0000fe441951", 0x1f) 2018/04/16 23:31:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140), 0x8) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x4, 0x0, &(0x7f0000004fbc)=ANY=[@ANYBLOB='\x00c@@'], 0x1, 0x0, &(0x7f00000003c0)='+'}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x4, 0x0, &(0x7f0000000180)=[@enter_looper={0x630c}], 0x48, 0x0, &(0x7f00000001c0)="79c8043c6ccb55ca6862aca6ef67049803539d252b8e60508820fc32d4ab0dd2d9f45b45168a3aeae2a18666f6a05aea6327c9e75b5f125706c853cdf16ec9e31eafd8f25a5e9cf7"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)}}], 0x0, 0x0, &(0x7f0000000100)}) 2018/04/16 23:31:36 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'ifb0\x00', 0x1}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) write$tun(r1, &(0x7f0000001500)={@pi={0x0, 0x8847}, @void, @ipv6={0x0, 0x6, '"Zl', 0x8, 0x0, 0x0, @dev={0xfe, 0x80}, @mcast1={0xff, 0x1, [], 0x1}, {[], @udp={0x0, 0x0, 0x8}}}}, 0x34) 2018/04/16 23:31:36 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x2000000000000011, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in=@dev={0xac, 0x14}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}, 0x1}, 0x0) 2018/04/16 23:31:36 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0xffffa888], [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x28, 0x6, "cb155d", 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}}}}}}}, 0x0) 2018/04/16 23:31:36 executing program 3: r0 = eventfd2(0x2, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$eventfd(r0, &(0x7f0000000080)=0xfffffffffffffffd, 0x8) readv(r0, &(0x7f0000002fe0)=[{&(0x7f0000002f94)=""/108, 0x6c}], 0x1) 2018/04/16 23:31:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="42c40c54b076d27e82d99dd19acc905de78b9104f7e76c2de83f775b62914a657002211d0c68cde9dbe15f3d6eb902a4", 0x30) [ 70.570184] dccp_v6_rcv: dropped packet with invalid checksum 2018/04/16 23:31:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x22, 0x331, 0x0, 0x0, {0x20000000006}}, 0x14}, 0x1}, 0x0) 2018/04/16 23:31:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000087d000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f000087cf79)={@in, 0x0, 0x0, 0x0, "d858834181332e435893f760968f541b42c41db0f53229e10458031e411acc910b07deaa85a7158cb72317b9229c05a260f51652df313a01eba60958f71aa48ae177e2e4fe748f1a5499840c5abde9e6"}, 0x160) [ 70.620688] dccp_v6_rcv: dropped packet with invalid checksum [ 71.261979] binder: undelivered TRANSACTION_COMPLETE [ 71.402103] syz-executor6 (6647) used greatest stack depth: 13288 bytes left 2018/04/16 23:31:37 executing program 3: mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, &(0x7f0000000180)) syz_fuse_mount(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0), &(0x7f0000000300)=0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0xfffffffffffffc7f) 2018/04/16 23:31:37 executing program 4: prctl$seccomp(0x26, 0x1, &(0x7f0000000040)) 2018/04/16 23:31:37 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000000)='./file0\x00'}, 0x61) 2018/04/16 23:31:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rpc\x00') fstat(r0, &(0x7f0000000180)) 2018/04/16 23:31:37 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140), 0x8) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x4, 0x0, &(0x7f0000004fbc)=ANY=[@ANYBLOB='\x00c@@'], 0x1, 0x0, &(0x7f00000003c0)='+'}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x4, 0x0, &(0x7f0000000180)=[@enter_looper={0x630c}], 0x48, 0x0, &(0x7f00000001c0)="79c8043c6ccb55ca6862aca6ef67049803539d252b8e60508820fc32d4ab0dd2d9f45b45168a3aeae2a18666f6a05aea6327c9e75b5f125706c853cdf16ec9e31eafd8f25a5e9cf7"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)}}], 0x0, 0x0, &(0x7f0000000100)}) 2018/04/16 23:31:37 executing program 7: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') umount2(&(0x7f0000000100)='./control/file1\x00', 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) 2018/04/16 23:31:37 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) poll(&(0x7f0000000000)=[{r2}], 0x1, 0xf779) dup3(r4, r3, 0x0) 2018/04/16 23:31:37 executing program 0: prctl$intptr(0x200000002f, 0x4) [ 72.310895] binder: undelivered TRANSACTION_COMPLETE 2018/04/16 23:31:38 executing program 4: syz_emit_ethernet(0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6050a09c07f40600fe8000000000000000000000000100aefe8000000000000000000000000000aa000000000008907861437b46a7e7ff69aeabcd2a883d1e7212aba476faccfc31dfd1476e6da5240a5d3282f943690920777ec26e6c4075229b7739c36dd4c8de5ae04cb41fab277b7a78cb9a60b98faaa5aaadc64d0681eef625d462ab88f5c6d770414bd77ce08fc5696e457e6e00005e9ea120f6725bb5691e1e2c561f36f29d18511d785dd654a87a946774722359d2e8ffbcdf882644dc6a4c6f6f8f23c9321560b411e8b0e07cc1710fa915ef0eb352d8b3695cc7692a7deb"], &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x82a]}) 2018/04/16 23:31:38 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000040)=0x0) dup3(r0, r1, 0x0) io_submit(r2, 0x1, &(0x7f00000000c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000200), 0x138}]) 2018/04/16 23:31:38 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/203) 2018/04/16 23:31:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3c1268fe}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000fc2000)=0x2) 2018/04/16 23:31:38 executing program 3: mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, &(0x7f0000000180)) syz_fuse_mount(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0), &(0x7f0000000300)=0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0xfffffffffffffc7f) 2018/04/16 23:31:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140), 0x8) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x4, 0x0, &(0x7f0000004fbc)=ANY=[@ANYBLOB='\x00c@@'], 0x1, 0x0, &(0x7f00000003c0)='+'}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x4, 0x0, &(0x7f0000000180)=[@enter_looper={0x630c}], 0x48, 0x0, &(0x7f00000001c0)="79c8043c6ccb55ca6862aca6ef67049803539d252b8e60508820fc32d4ab0dd2d9f45b45168a3aeae2a18666f6a05aea6327c9e75b5f125706c853cdf16ec9e31eafd8f25a5e9cf7"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)}}], 0x0, 0x0, &(0x7f0000000100)}) 2018/04/16 23:31:38 executing program 6: syz_emit_ethernet(0x9e, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x0) 2018/04/16 23:31:38 executing program 7: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000767fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 2018/04/16 23:31:38 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000017fdc)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) dup3(r0, r1, 0x0) 2018/04/16 23:31:38 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000040)) 2018/04/16 23:31:38 executing program 7: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000767fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 2018/04/16 23:31:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "01"}], 0x18}, 0x0) setrlimit(0x7, &(0x7f0000becff0)={0x16, 0x88}) recvmsg(r0, &(0x7f0000000880)={&(0x7f0000000240)=@nl=@unspec, 0xc, &(0x7f0000001640), 0x0, &(0x7f0000000800)=""/86, 0x56}, 0x0) 2018/04/16 23:31:38 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/203) 2018/04/16 23:31:39 executing program 3: mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, &(0x7f0000000180)) syz_fuse_mount(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0), &(0x7f0000000300)=0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0xfffffffffffffc7f) 2018/04/16 23:31:39 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000001540)='./file0\x00', 0x0, 0x0, &(0x7f0000002580), 0x0, &(0x7f00000025c0)={'nouuid,'}) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000002600)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) [ 72.630397] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 2018/04/16 23:31:39 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000040)) 2018/04/16 23:31:39 executing program 2: syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x1000008000000010) r1 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0xfffffffffffffffd, 0x2000) setns(r0, 0xffffffffffdffff9) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000)=0x4, 0x5) setxattr(&(0x7f0000000b00)='.', &(0x7f0000000ac0)=@known='system.posix_acl_access\x00', &(0x7f0000000100)='/vmnet0\x00', 0xffffffffffffff57, 0x0) poll(&(0x7f0000000300)=[{r1, 0x200}, {r0, 0x10}], 0x2, 0x3f) r2 = getpid() ioprio_get$pid(0x0, r2) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000004c0)=""/245, 0xf5}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x5) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000a00)=@ax25={0x3, {"3c1b7251c1894a"}, 0x1}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000003400), 0x0, 0x80}, 0x40000020) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0x2, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x80) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa462cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8a") mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f00000009c0)='bdev\x00', 0x0, &(0x7f0000000bc0)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)="9af576624811f8f8bf3ff31413ad09a266f00a06") mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f0000000d40)=""/225) preadv(r3, &(0x7f00000023c0), 0x0, 0x0) unlink(&(0x7f0000000580)='./file0\x00') [ 72.840108] XFS (loop5): Invalid superblock magic number [ 72.933718] XFS (loop5): Invalid superblock magic number [ 73.271749] binder: undelivered TRANSACTION_COMPLETE 2018/04/16 23:31:43 executing program 7: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000767fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 2018/04/16 23:31:43 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x121000, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x0, &(0x7f0000000200)="107a60467a3aec315182c2c1bef24b387fbe333021768e09bc9af0d010372c06dcae7dcebb1218b473645205e68585cfb7dfd3e8e40d397fcc58ca5c89a40eb77b2d51183a1b72157c95af2c1083d43899f06fa3a42fa21f0bc773b2e14248ab69f68a2255621b485f93914952e3683708bdcf", 0x73) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_mr_vif\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000017000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd2(0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000358fe0)={r4, 0x0, 0x2, r4}) r5 = eventfd2(0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r6 = eventfd2(0x23, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000018000)={r6, 0x5, 0x400000000000002, r4}) connect$ax25(r1, &(0x7f0000000080)={0x3, {"c63421d8db3d2e"}, 0x1}, 0x10) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000c68000)={r5, 0x0, 0x2000000002, r4}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180), &(0x7f0000000140)=0xfffffc6c) 2018/04/16 23:31:43 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/203) 2018/04/16 23:31:43 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000017fdc)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) dup3(r0, r1, 0x0) 2018/04/16 23:31:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000003c0)="c4627918c5c4e1c975d6c4c23d0c2f8fea7810af050000001ad50000b805000000b9d08680d00f01c1430f01ca3e0fd33dfeffffff66b872000f00d0c7442400f0000000c744240276000000ff1c24450f00d0", 0x53}], 0x1, 0x0, &(0x7f0000000080), 0x0) 2018/04/16 23:31:43 executing program 3: mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, &(0x7f0000000180)) syz_fuse_mount(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0), &(0x7f0000000300)=0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0xfffffffffffffc7f) 2018/04/16 23:31:43 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000040)) 2018/04/16 23:31:43 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0/control/file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0x0, &(0x7f000001c000)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000001c0)='./file1\x00', r0, &(0x7f0000000240)='./file1\x00') getdents(r0, &(0x7f0000000600)=""/195, 0xc3) unlinkat(r0, &(0x7f0000000200)='./file1\x00', 0x0) 2018/04/16 23:31:43 executing program 3: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x2b, &(0x7f0000000080)={0x0, 0x0, 0x1}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000deefe7)=""/128, 0x80) [ 77.431948] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 2018/04/16 23:31:43 executing program 7: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000767fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 2018/04/16 23:31:43 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000040)) 2018/04/16 23:31:43 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/203) 2018/04/16 23:31:43 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00001f0ff8)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000bc000)=@abs, 0x8) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) dup2(r0, r1) 2018/04/16 23:31:43 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000017fdc)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) dup3(r0, r1, 0x0) 2018/04/16 23:31:44 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) ftruncate(r0, 0x3f) 2018/04/16 23:31:44 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000736000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f000074d000)={0x81, 0x0, [0x3]}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000000000000002"]) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000000c0)={0x0, 0x1}) [ 77.664848] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 2018/04/16 23:31:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1810946b61e21cd52bed74c30000000000cf11e483387e566060a4"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/16 23:31:44 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) personality(0x400000003ffff8) uname(&(0x7f0000484000)) 2018/04/16 23:31:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000240)={0x1, 0x0, [{0x6e0}]}) 2018/04/16 23:31:44 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000017fdc)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) dup3(r0, r1, 0x0) 2018/04/16 23:31:44 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000007ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2288, &(0x7f0000000040)) 2018/04/16 23:31:44 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="240000001a0001000700fd686fa2f8bc02000d0000000000031d9994080019000103f21a", 0x24}], 0x1}, 0x0) 2018/04/16 23:31:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100)="ce", &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="ce"}, 0x10) 2018/04/16 23:31:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ptmx\x00', 0x109, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000001000)) [ 78.487106] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 2018/04/16 23:31:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(anubis-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000967000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendto(r1, &(0x7f0000000100)="224b49fd1e310f215feac34bbc176bfc0006f72f9a0f4a6f3f21009562f8c0e3e8f2000000c896d61f3f2d0b9d7bcffc88dbe6b7acdc870f6aee9cc9c4d0021036486bc45228c0dd1e38e4ce49ba4d1ec4373d242e635bdbc45641adf232f7a6f3da8285001a2e70b58306e1793f7abe92abc48367298e347485d520a88c47d7", 0x80, 0x0, &(0x7f0000001280)=ANY=[], 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/16 23:31:44 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="240000001a0001000700fd686fa2f8bc02000d0000000000031d9994080019000103f21a", 0x24}], 0x1}, 0x0) 2018/04/16 23:31:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5424, &(0x7f00000000c0)) 2018/04/16 23:31:45 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fdinfo\x00') exit(0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 2018/04/16 23:31:45 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000797ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x20000000005385, &(0x7f0000000000)) 2018/04/16 23:31:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1810946b61e21cd52bed74c30000000000cf11e483387e566060a4"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/16 23:31:45 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000004000/0x9000)=nil, 0x9000, 0x4003, &(0x7f0000000040)=0x6, 0x8, 0x7) 2018/04/16 23:31:45 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff92}, {0xb0}}) 2018/04/16 23:31:45 executing program 7: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000005c0)={0x80fed}) clone(0x200, &(0x7f00000051c0), &(0x7f0000005180), &(0x7f00000052c0), &(0x7f00000000c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x0, 0x7}, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200), &(0x7f0000000380)) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) r2 = getpid() fcntl$setown(r0, 0x8, r2) waitid(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) tkill(r2, 0x800000000016) open(&(0x7f0000000340)='./file0\x00', 0x401, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/04/16 23:31:46 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="240000001a0001000700fd686fa2f8bc02000d0000000000031d9994080019000103f21a", 0x24}], 0x1}, 0x0) 2018/04/16 23:31:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x0, @loopback=0x7f000001}, 0xf) 2018/04/16 23:31:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1810946b61e21cd52bed74c30000000000cf11e483387e566060a4"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/16 23:31:46 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4c}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x36, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}}}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000300)}, 0x0) 2018/04/16 23:31:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipv6_route\x00') r1 = syz_open_dev$urandom(&(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x6) sendfile(r1, r0, &(0x7f0000000000), 0x7fffffff) 2018/04/16 23:31:46 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(r0, &(0x7f00000016c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000001880)=[{&(0x7f0000001700)=""/97, 0x61}, {&(0x7f0000000300)=""/254, 0xfe}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000100)=""/3, 0x3}, {&(0x7f0000001400)=""/81, 0x51}, {&(0x7f0000001780)=""/254, 0xfe}, {&(0x7f0000000180)}, {&(0x7f0000001580)=""/155, 0xfffffd92}], 0x8, &(0x7f0000001b80)=""/4096, 0x371}, 0x40002100) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) close(r1) 2018/04/16 23:31:46 executing program 7: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000005c0)={0x80fed}) clone(0x200, &(0x7f00000051c0), &(0x7f0000005180), &(0x7f00000052c0), &(0x7f00000000c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x0, 0x7}, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200), &(0x7f0000000380)) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) r2 = getpid() fcntl$setown(r0, 0x8, r2) waitid(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) tkill(r2, 0x800000000016) open(&(0x7f0000000340)='./file0\x00', 0x401, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/04/16 23:31:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup2(r0, r0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="59f1e7a94cbf3a3417b66166bfff7c0f3ceec2fb8152eda4f01dd2c1c3796a6a38875f5300e339ff6519eb2160efc2883937b964e6eab1a28beab5bcfc98346d482ed88b6841c5", 0x47, 0xffffffff}], 0x4, &(0x7f0000000240)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0x1000) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)) read(r0, &(0x7f00004bdf32)=""/206, 0xce) r2 = syz_open_pts(r1, 0x300) ioctl$TCFLSH(r2, 0x540b, 0x1) 2018/04/16 23:31:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1810946b61e21cd52bed74c30000000000cf11e483387e566060a4"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 80.280138] hfs: can't find a HFS filesystem on dev loop4 2018/04/16 23:31:46 executing program 0: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000005c0)={0x80fed}) clone(0x200, &(0x7f00000051c0), &(0x7f0000005180), &(0x7f00000052c0), &(0x7f00000000c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x0, 0x7}, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200), &(0x7f0000000380)) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) r2 = getpid() fcntl$setown(r0, 0x8, r2) waitid(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) tkill(r2, 0x800000000016) open(&(0x7f0000000340)='./file0\x00', 0x401, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/04/16 23:31:46 executing program 1: r0 = socket$inet(0x2, 0x100000000805, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00007dc000), 0x0) 2018/04/16 23:31:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipv6_route\x00') r1 = syz_open_dev$urandom(&(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x6) sendfile(r1, r0, &(0x7f0000000000), 0x7fffffff) 2018/04/16 23:31:46 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="240000001a0001000700fd686fa2f8bc02000d0000000000031d9994080019000103f21a", 0x24}], 0x1}, 0x0) [ 81.042235] hfs: can't find a HFS filesystem on dev loop4 2018/04/16 23:31:47 executing program 0: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000005c0)={0x80fed}) clone(0x200, &(0x7f00000051c0), &(0x7f0000005180), &(0x7f00000052c0), &(0x7f00000000c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x0, 0x7}, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200), &(0x7f0000000380)) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) r2 = getpid() fcntl$setown(r0, 0x8, r2) waitid(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) tkill(r2, 0x800000000016) open(&(0x7f0000000340)='./file0\x00', 0x401, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/04/16 23:31:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='codepage=862']) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000000380)='./file0//ile0\x00', 0x0) creat(&(0x7f00000000c0)="2e2f66696c65302f2f696c6530ff", 0x0) 2018/04/16 23:31:47 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(r0, &(0x7f00000016c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000001880)=[{&(0x7f0000001700)=""/97, 0x61}, {&(0x7f0000000300)=""/254, 0xfe}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000100)=""/3, 0x3}, {&(0x7f0000001400)=""/81, 0x51}, {&(0x7f0000001780)=""/254, 0xfe}, {&(0x7f0000000180)}, {&(0x7f0000001580)=""/155, 0xfffffd92}], 0x8, &(0x7f0000001b80)=""/4096, 0x371}, 0x40002100) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) close(r1) 2018/04/16 23:31:47 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0x0) request_key(&(0x7f0000000240)='cifs.idmap\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)='/dev/net/tun\x00', 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000003c0)="a7c6826f181a21ac48", 0x9, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0) syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) r2 = socket$inet(0x15, 0x5, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) sendmsg(r2, &(0x7f0000000200)={0x0, 0x290, &(0x7f0000000140), 0x1}, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ftruncate(0xffffffffffffffff, 0x105) tkill(r3, 0x1000000000016) 2018/04/16 23:31:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipv6_route\x00') r1 = syz_open_dev$urandom(&(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x6) sendfile(r1, r0, &(0x7f0000000000), 0x7fffffff) 2018/04/16 23:31:47 executing program 7: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000005c0)={0x80fed}) clone(0x200, &(0x7f00000051c0), &(0x7f0000005180), &(0x7f00000052c0), &(0x7f00000000c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x0, 0x7}, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200), &(0x7f0000000380)) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) r2 = getpid() fcntl$setown(r0, 0x8, r2) waitid(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) tkill(r2, 0x800000000016) open(&(0x7f0000000340)='./file0\x00', 0x401, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/04/16 23:31:47 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x4) 2018/04/16 23:31:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)="0bad", &(0x7f0000000440)=""/4096}, 0x18) 2018/04/16 23:31:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x7}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000240)=""/4096}, 0x18) 2018/04/16 23:31:47 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000040), 0x4) 2018/04/16 23:31:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipv6_route\x00') r1 = syz_open_dev$urandom(&(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x6) sendfile(r1, r0, &(0x7f0000000000), 0x7fffffff) 2018/04/16 23:31:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='codepage=862']) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000000380)='./file0//ile0\x00', 0x0) creat(&(0x7f00000000c0)="2e2f66696c65302f2f696c6530ff", 0x0) 2018/04/16 23:31:47 executing program 2: geteuid() r0 = socket$inet6(0xa, 0x80803, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in=@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x6c}, 0x0, @in6}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@rand_addr, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x6c}, 0x0, @in=@multicast2=0xe0000002}}, 0xe8) 2018/04/16 23:31:47 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000002, &(0x7f0000ed4000)=0x79, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000818000)=[{0x1000000006, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x3c058533fd59b3f3, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x3) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="80", 0x1}], 0x1}, 0x0) 2018/04/16 23:31:47 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000ffd8)={'vcan0\x00', 0x0}) r2 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r2, &(0x7f0000010ff0)={0x1d}, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000007ff0)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x3, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000017000)=0x230, 0x4) readv(r2, &(0x7f0000015000)=[{&(0x7f0000015000)=""/44, 0x2c}], 0x1) 2018/04/16 23:31:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='codepage=862']) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000000380)='./file0//ile0\x00', 0x0) creat(&(0x7f00000000c0)="2e2f66696c65302f2f696c6530ff", 0x0) 2018/04/16 23:31:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40040010000004c, &(0x7f0000000000), 0xb6) 2018/04/16 23:31:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) 2018/04/16 23:31:48 executing program 7: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000005c0)={0x80fed}) clone(0x200, &(0x7f00000051c0), &(0x7f0000005180), &(0x7f00000052c0), &(0x7f00000000c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x0, 0x7}, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200), &(0x7f0000000380)) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) r2 = getpid() fcntl$setown(r0, 0x8, r2) waitid(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) tkill(r2, 0x800000000016) open(&(0x7f0000000340)='./file0\x00', 0x401, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/04/16 23:31:48 executing program 6: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="24000000210025f0071c0165ff0ffc0e02003c000000000000e1000c0800020000000005", 0x24) 2018/04/16 23:31:48 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(r0, &(0x7f00000016c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000001880)=[{&(0x7f0000001700)=""/97, 0x61}, {&(0x7f0000000300)=""/254, 0xfe}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000100)=""/3, 0x3}, {&(0x7f0000001400)=""/81, 0x51}, {&(0x7f0000001780)=""/254, 0xfe}, {&(0x7f0000000180)}, {&(0x7f0000001580)=""/155, 0xfffffd92}], 0x8, &(0x7f0000001b80)=""/4096, 0x371}, 0x40002100) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) close(r1) 2018/04/16 23:31:48 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000002, &(0x7f0000ed4000)=0x79, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000818000)=[{0x1000000006, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x3c058533fd59b3f3, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x3) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="80", 0x1}], 0x1}, 0x0) 2018/04/16 23:31:48 executing program 0: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000005c0)={0x80fed}) clone(0x200, &(0x7f00000051c0), &(0x7f0000005180), &(0x7f00000052c0), &(0x7f00000000c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x0, 0x7}, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200), &(0x7f0000000380)) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) r2 = getpid() fcntl$setown(r0, 0x8, r2) waitid(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) tkill(r2, 0x800000000016) open(&(0x7f0000000340)='./file0\x00', 0x401, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/04/16 23:31:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cubic\x00', 0x6) 2018/04/16 23:31:48 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0x23c, &(0x7f0000015ff0)={&(0x7f0000013000)={0x2c, 0x20, 0x2ff, 0x0, 0x0, {0xa}, [@typed={0xc, 0x0, @u32}, @typed={0xc, 0x14, @u32=0xffffffffffffffff}]}, 0x2c}, 0x1}, 0x0) 2018/04/16 23:31:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='codepage=862']) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000000380)='./file0//ile0\x00', 0x0) creat(&(0x7f00000000c0)="2e2f66696c65302f2f696c6530ff", 0x0) 2018/04/16 23:31:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)={0x0, 0x0}) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 82.613251] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/16 23:31:49 executing program 6: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0xfffffc99) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x0, 0x0, &(0x7f0000001000)=@raw, &(0x7f0000001ff6)='syzkaller\x00', 0x0, 0xdb, &(0x7f0000004ffd)=""/219}, 0x48) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/16 23:31:49 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000380), 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006780)=[{{&(0x7f0000000800)=@nfc_llcp, 0x80, &(0x7f0000001e80)=[{&(0x7f0000000880)=""/85, 0x55}, {&(0x7f0000000900)=""/220, 0xdc}, {&(0x7f0000000a00)=""/233, 0xe9}, {&(0x7f0000000b00)=""/78, 0x4e}, {&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f0000001b80)=""/145, 0x91}, {&(0x7f0000001c40)=""/192, 0xc0}, {&(0x7f0000001d00)=""/85, 0x55}, {&(0x7f0000001d80)=""/212, 0xd4}], 0x9, &(0x7f0000001f40)=""/163, 0xa3, 0x802c}, 0x1000000000000000}, {{&(0x7f0000002000)=@vsock={0x0, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000002140)=[{&(0x7f0000002080)=""/175, 0xaf}], 0x1, &(0x7f0000002180)=""/91, 0x5b, 0x40}}, {{&(0x7f0000002200)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000002600)=[{&(0x7f0000002280)=""/171, 0xab}, {&(0x7f0000002340)=""/109, 0x6d}, {&(0x7f00000023c0)=""/46, 0x2e}, {&(0x7f0000002400)=""/103, 0x67}, {&(0x7f0000002480)=""/65, 0x41}, {&(0x7f0000002500)=""/25, 0x19}, {&(0x7f0000002540)=""/95, 0x5f}, {&(0x7f00000025c0)=""/13, 0xd}], 0x8, &(0x7f0000002680)=""/247, 0xf7, 0x5014}, 0x6}, {{&(0x7f0000002780)=@sco, 0x80, &(0x7f0000004e40)=[{&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000003800)=""/195, 0xc3}, {&(0x7f0000003900)=""/183, 0xb7}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f00000049c0)=""/160, 0xa0}, {&(0x7f0000004a80)=""/97, 0x61}, {&(0x7f0000004b00)=""/215, 0xd7}, {&(0x7f0000004c00)=""/187, 0xbb}, {&(0x7f0000004cc0)=""/196, 0xc4}, {&(0x7f0000004dc0)=""/88, 0x58}], 0xa, &(0x7f0000004f00)=""/72, 0x48, 0x10001}, 0x8}, {{&(0x7f0000004f80), 0x80, &(0x7f0000006300)=[{&(0x7f0000005000)=""/153, 0x99}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/168, 0xa8}, {&(0x7f0000006180)=""/170, 0xaa}, {&(0x7f0000006240)=""/186, 0xba}], 0x5, 0x0, 0x0, 0x9}, 0x2db8}, {{&(0x7f0000006380)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000006640)=[{&(0x7f0000006400)=""/74, 0x4a}, {&(0x7f0000006480)=""/171, 0xab}, {&(0x7f0000006540)=""/165, 0xa5}, {&(0x7f0000006600)}], 0x4, &(0x7f0000006680)=""/213, 0xd5, 0x3f}, 0x9}], 0x6, 0x22, &(0x7f0000006900)={0x0, 0x989680}) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000006940)=@routing={0xff, 0x12, 0x2, 0x400, 0x0, [@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @mcast2={0xff, 0x2, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, @remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, @loopback={0x0, 0x1}, @local={0xfe, 0x80, [], 0xaa}]}, 0x98) mlock2(&(0x7f0000ae2000/0x1000)=nil, 0x1000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0xea3}, &(0x7f0000000080)=0x8) dup2(r1, r1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e22, 0xe5, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x200}}, 0x5, 0x2}, 0x90) r3 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f00009db000)=""/28, 0xc) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x440, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f000019ffe9)={0xc1}) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000480)={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0x40bc5311, &(0x7f0000000140)={0x80, 0x1}) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000380)=0x1, 0x4) r7 = add_key(&(0x7f0000000500)='logon\x00', &(0x7f0000000640)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000680)="e3f41736ed263fe42110a46bde15c4f689e02be7af41acd157b6d954de1a78212505657c6847e4120fa24f9654957f9edcda833a932550dd79c27f13b9721f70f6749139f9b330e112c0c41cf8c5f3d31296484dc89e36576c677d675e6ab7e3fda161baa30a00a2a5b445b9d5ff1702a6d8", 0x72, 0xfffffffffffffffb) getsockname(r6, &(0x7f0000000780)=@ipx, &(0x7f0000000580)=0x80) request_key(&(0x7f0000000200)='cifs.spnego\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)='-wlan0+vboxnet0em1\x00', r7) r8 = request_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="012e5d00", 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000600)={0x73, 0x79, 0x7a}, 0x0, 0x0, r8) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0) utime(&(0x7f0000000740)='./file0/file0\x00', &(0x7f00000005c0)) modify_ldt$write(0x1, &(0x7f0000000340)={0x7, 0x0, 0x2000, 0x1, 0x6, 0x265, 0x800000000000, 0x0, 0x3, 0x1}, 0x10) mbind(&(0x7f0000126000/0x3000)=nil, 0x3321a8df32ee8487, 0x0, &(0x7f000016e000), 0x5, 0x0) 2018/04/16 23:31:49 executing program 1: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f00001adff8)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000f48ffa)='ramfs\x00', 0x0, &(0x7f0000b78000)) getxattr(&(0x7f00001b0ff8)='./file0\x00', &(0x7f00008d6000)=@known='security.capability\x00', &(0x7f0000f5d000)=""/44, 0x2c) 2018/04/16 23:31:49 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 82.840184] rpcbind: RPC call returned error 22 [ 82.855385] rpcbind: RPC call returned error 22 2018/04/16 23:31:49 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x6e, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) 2018/04/16 23:31:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000fe0ffc)=0x4c) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000188fec)) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0xc97c0}, &(0x7f00000000c0)) 2018/04/16 23:31:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x223}, 0xfffffffffffffec2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8dbccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000080)) 2018/04/16 23:31:49 executing program 2: mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080), &(0x7f00000000c0)=0x18) 2018/04/16 23:31:49 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(r0, &(0x7f00000016c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000001880)=[{&(0x7f0000001700)=""/97, 0x61}, {&(0x7f0000000300)=""/254, 0xfe}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000100)=""/3, 0x3}, {&(0x7f0000001400)=""/81, 0x51}, {&(0x7f0000001780)=""/254, 0xfe}, {&(0x7f0000000180)}, {&(0x7f0000001580)=""/155, 0xfffffd92}], 0x8, &(0x7f0000001b80)=""/4096, 0x371}, 0x40002100) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) close(r1) 2018/04/16 23:31:49 executing program 7: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000280)={[0x39, 0x34, 0x33, 0x31, 0x37, 0x32, 0x30, 0x35, 0x36, 0x34]}, 0xa) 2018/04/16 23:31:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000002, &(0x7f0000ed4000)=0x79, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000818000)=[{0x1000000006, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x3c058533fd59b3f3, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x3) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="80", 0x1}], 0x1}, 0x0) 2018/04/16 23:31:49 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"6966623000329c8e0000ffffff000200", 0x140f}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ifb0\x00', 0xa201}) io_setup(0x469, &(0x7f0000000180)=0x0) io_submit(r2, 0x1, &(0x7f00000016c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000080)}]) 2018/04/16 23:31:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x852, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) 2018/04/16 23:31:49 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = dup(r0) connect$ipx(r1, &(0x7f0000000000)={0x4, 0x0, 0x0, "177e837ce8a2"}, 0x10) 2018/04/16 23:31:49 executing program 7: r0 = memfd_create(&(0x7f0000000080)="6d81351e39cfc228a4c67200", 0x0) pwritev(r0, &(0x7f0000623ff0)=[{&(0x7f0000607f0d)="98", 0x1}], 0x1, 0x7fffc) fallocate(r0, 0x0, 0x0, 0x7) lseek(r0, 0x0, 0x3) 2018/04/16 23:31:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x112, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x100000012, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) recvmsg(r0, &(0x7f0000001740)={&(0x7f0000000040)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x3a, &(0x7f0000001680)}, 0x2000) 2018/04/16 23:31:49 executing program 6: mbind(&(0x7f0000024000/0xc00000)=nil, 0xc00000, 0x8001, &(0x7f0000c28000)=0x800003f, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000531000)='numa_maps\x00') sendfile(r0, r0, &(0x7f00009c7000)=0x40000000, 0x400000ff) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) 2018/04/16 23:31:50 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"6966623000329c8e0000ffffff000200", 0x140f}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ifb0\x00', 0xa201}) io_setup(0x469, &(0x7f0000000180)=0x0) io_submit(r2, 0x1, &(0x7f00000016c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000080)}]) 2018/04/16 23:31:50 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) sendmmsg(r1, &(0x7f00000025c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000100)}}, {{&(0x7f00000000c0)=@can={0x1d}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=ANY=[]}}, {{0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f0000002500)}}], 0x477, 0x0) dup3(r0, r1, 0x0) 2018/04/16 23:31:50 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x40000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x401070c9, 0xffffffffffffffff) 2018/04/16 23:31:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/16 23:31:50 executing program 7: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write$sndseq(r1, &(0x7f000082cf40), 0x2082cf40) recvmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000100)=@sco, 0x80, &(0x7f0000000280)=[{&(0x7f0000000180)=""/253, 0xfd}], 0x1, &(0x7f00000002c0)=""/80, 0x50}}, {{&(0x7f0000000340)=@nfc_llcp, 0x80, &(0x7f00000003c0)}}], 0x2, 0x0, &(0x7f0000005280)={0x77359400}) close(r0) 2018/04/16 23:31:50 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x40000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x401070c9, 0xffffffffffffffff) 2018/04/16 23:31:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x6, 0x4) sendto$inet6(r0, &(0x7f0000000000)="0401000000e3cd682c46090000b24066514d670600c0e180283db150877eac3587ca92a0cc14ab6650782299e623", 0x2e, 0x0, &(0x7f0000000200)={0xa, 0x800, 0x2, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) 2018/04/16 23:31:50 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x20000190, &(0x7f0000000080), &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140), 0x0) 2018/04/16 23:31:50 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x40000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x401070c9, 0xffffffffffffffff) 2018/04/16 23:31:50 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"6966623000329c8e0000ffffff000200", 0x140f}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ifb0\x00', 0xa201}) io_setup(0x469, &(0x7f0000000180)=0x0) io_submit(r2, 0x1, &(0x7f00000016c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000080)}]) 2018/04/16 23:31:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x80005, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x1d, &(0x7f0000000000), 0x4) 2018/04/16 23:31:50 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), 0x8) 2018/04/16 23:31:50 executing program 5: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x2691d0877f1cca9b}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) write$tun(r1, &(0x7f00000000c0)={@pi, @hdr={0x3, 0x3, 0x0, 0x46b9}, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @multicast1=0xe0000001, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x2a) 2018/04/16 23:31:50 executing program 7: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'ip6_vti0\x00'}}, 0x1e) syz_emit_ethernet(0x14, &(0x7f0000000080)={@dev={[0xaa, 0xaa, 0xaa, 0xaa]}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@generic={0x8864, "42a703000000"}}}, &(0x7f0000000100)) 2018/04/16 23:31:50 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000002, &(0x7f0000ed4000)=0x79, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000818000)=[{0x1000000006, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x3c058533fd59b3f3, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x3) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="80", 0x1}], 0x1}, 0x0) 2018/04/16 23:31:51 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f}, 0xe) listen(r0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 2018/04/16 23:31:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x40000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x401070c9, 0xffffffffffffffff) 2018/04/16 23:31:51 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000005faa)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "c0e544", 0x18, 0x40000000003a, 0x0, @dev={0xfe, 0x80}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}}}, 0x0) 2018/04/16 23:31:51 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') io_setup(0x1, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x19, 0x0, 0x0, r0, &(0x7f0000002200)}]) 2018/04/16 23:31:51 executing program 7: r0 = socket$inet6(0xa, 0x80005, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000ff2)=@dstopts={0x0, 0x0, [], [@ra={0x5, 0x2}]}, 0xc) 2018/04/16 23:31:51 executing program 5: mknod(&(0x7f0000000840)='./file0\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000280)='./file0\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0xb) 2018/04/16 23:31:51 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"6966623000329c8e0000ffffff000200", 0x140f}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ifb0\x00', 0xa201}) io_setup(0x469, &(0x7f0000000180)=0x0) io_submit(r2, 0x1, &(0x7f00000016c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000080)}]) 2018/04/16 23:31:51 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x1, &(0x7f0000261f44)=""/188, &(0x7f0000000ffc)=0xbc) 2018/04/16 23:31:51 executing program 1: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@ax25, &(0x7f00000001c0)=0x80, 0x800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000002600)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002640)={{{@in=@local, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000002740)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) socket$inet_tcp(0x2, 0x1, 0x0) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000002bc0)) socketpair(0xb, 0x8080a, 0x6, &(0x7f0000002c00)) socket$nl_netfilter(0x10, 0x3, 0xc) accept$inet6(0xffffffffffffff9c, &(0x7f0000002c40)={0x0, 0x0, 0x0, @dev}, &(0x7f0000002c80)=0x1c) accept$netrom(0xffffffffffffffff, &(0x7f0000003180)=@full, &(0x7f0000003200)=0x48) socketpair$ax25(0x3, 0x7, 0xca, &(0x7f0000003240)) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003280), &(0x7f00000032c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) epoll_create1(0x80000) socket$inet6_dccp(0xa, 0x6, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000003400)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000003440)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003480)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000003580)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) socket$inet6_dccp(0xa, 0x6, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003ac0)=0xffffffff, 0x4) epoll_create(0x7) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000003b00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003b40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000003c40)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) socket$inet_icmp(0x2, 0x2, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000004280)) r1 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in6=@ipv4, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000043c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004400)={0x0, 0x0, 0x0}, &(0x7f0000004440)=0xc) r4 = accept4$netrom(0xffffffffffffff9c, 0x0, &(0x7f0000004480), 0x80800) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000044c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = accept4$ipx(0xffffffffffffffff, &(0x7f0000004500), &(0x7f0000004540)=0x10, 0x80800) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004940)={0x0, 0x0}, &(0x7f0000004980)=0xc) r8 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004a00)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004b00)=0xe8) r10 = getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000005040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005080)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000005180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000051c0), &(0x7f0000005200)=0xc) sendmmsg$unix(r0, &(0x7f0000005280)=[{&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002580)=[{&(0x7f0000000280)="112095aeb759db5932495184301f3cc89b9e7b660e6fa1c8fb487e234e", 0x1d}, {&(0x7f0000000500)="023a874237cc29e67b5fa5d52631be9255cf62703f783b48800cc63536bf53bf3871615cd10fb79e8e87b9ca2a209420cfa766e6861f669351f3405b8f9ca358a361b2f37fac897c6e5141e5f630073d5afdd2433d92649b546ec98cbe33973c2114c498d943c6fc2fc5a2e40ba022e964b4177290", 0x75}], 0x2, &(0x7f0000002800), 0x0, 0x40000}, {&(0x7f0000002840)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000029c0)=[{&(0x7f00000028c0)="b20b04811edcb5d70a9b9990c536af059eb492f529b4cc11710dd12d5800ea78bbff2094cf18c30d008ca6c88ceb052c4066c2ba735032180b50047c00ef6838f9035c6da9d1ed45834c7fea6cb2859c284c845831213e7dd3dc191bd3912dbf1ccc27cdd541adc6f517d61575efaa34d7e48e8d198852da5a0cf62ad44bc53ef305a8ca4c2f35bdb293b3cf62485b9c615631959856436f3d5ca7ce9fef5adaa1efd5f74a35da3cd008898a00c183ed0a11e9d08d0379cd679b5fcd7808cac445", 0xc1}], 0x1, 0x0, 0x0, 0x4}, {&(0x7f0000003700)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003a40)=[{&(0x7f0000003780)="23b2b01cf337f25d7e5f93cb9c56c50f07d457b35dc2266535744468770171d11e6a54c67e3a48be14db0d713efef3c72336498b12b77143b8f8451dff7d9940d4162c6dca9d7bcf13ac75f41db2bb6d3f90a9ab5589b9d798e80a5cc940e030d40908016483ad1c9aba59b900b2311d04c0f7fa00f837955f55ebd69367c5b415043db16a2a41f4c4c908be2c6c575c7713370934b9c8e58a2c6a8b0c3969e87840bce4ada244", 0xa7}, {&(0x7f0000003980)="f76b6e8d44caa27687f6617c2fbfbd5d8862219591df28df5c0272a6ad284a3ce2cac086219b5e3d057f4e8a53977c145b2556c756e38668bc812104558f679b78957f0d75aec4db81357dcfde32f38c0789d4f93a2fa4d6782e2c825a96d3d585d87196f49d1ab125e56e4d9b8ec294546d6f4616b818496d2f975ec00afd410e98c5c7749dd18b71990c2ce49808", 0x8f}], 0x2, &(0x7f0000003d00), 0x0, 0x40000}, {&(0x7f0000003d40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000004200)=[{&(0x7f0000003dc0)="2db3546d92cbd688109cc6fb5264535e65df029ae7cb5dba6b637028ec8036001a85f276f9db260cb119b3617ec34bfe60f7ac7079e1ea71c70878b7ffbb234b65abff37f0202b2f5f8e49868b88fd3db8", 0x51}, {&(0x7f0000004080)="3822dadc2f4810ca9b2bd7809ed89840431fc05b5e93bc05ee6d7595e4", 0x1d}], 0x2, &(0x7f0000004580)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x20, 0x1, 0x1, [r4, r5, r6]}], 0x40, 0x40000}, {&(0x7f0000004600)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000048c0)=[{&(0x7f0000004680)="94eec757f4d7378aac15d1e1724560afce46e9718b7192f18c3de50dec649b8746a0df186a8b6698dbedc53f74b61f29257c5325c79df9bebe093710f41da4f890eb1f1c0c3ccfeb20a2e6ced88105194ef81b45cea415b95df22379d0b3f6cc7d65fc4b5412cdeadc5d3593463e23716df905edd8d2880a82edfc766f9668048a50f307466190f99454", 0x8a}], 0x1, &(0x7f0000004b40)=[@cred={0x20, 0x1, 0x2, 0x0, r7, r8}, @cred={0x20, 0x1, 0x2, 0x0, r9, r10}], 0x40, 0x40}, {&(0x7f0000004b80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004e00)=[{&(0x7f0000004c00)="345d1cc2c1aedac047e560a757f5dada75b2841e333da5d05973d445e0db12cbc8084165aa11795767b0e76c7a53d2121dfbd19e8750f66714b1f90c69c14683af8ba90fa0e82f57d4b9f55a04158ee61bb31d711bb946214fdb63ea42adce3f3e6dabc45dee292b00d851ab89d04c2fef284fd33672fe022418cb8d264b9907436ffaa4e63e65ea9fac64a62881b89bda119d57b63df63df027e694f1f7bf543d08d52e4c9983ace6f105bcf40833f3fba8e2e9a21419942506bd9bd636e36147405a289fe56c548711fe18843d77555dba36abfefb6ca0aeb184ff1a386cc40d85764b5ac78b410e5a8364b5aa4c3741a8cb1c6b", 0xf5}], 0x1, 0x0, 0x0, 0x40000}], 0x6, 0x800) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r11, r14, 0x8001, 0x0) tee(r11, r14, 0x8004, 0x0) setsockopt$sock_void(r12, 0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r13, 0x1, 0x1a, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x3, 0xc6, 0x7, 0x20}, {0x8000, 0x4, 0x1, 0x7}, {0x6, 0xfff, 0x1c83, 0x7}, {0xa9e, 0x6, 0x9, 0x3}, {0x0, 0x9f5, 0x7fffffff}, {0x3, 0x800, 0x4, 0x7}]}, 0x10) connect$unix(r12, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) write(r12, &(0x7f00000000c0), 0xffdd) tee(r11, r14, 0x1, 0x3) [ 85.093694] device bridge_slave_1 left promiscuous mode [ 85.099481] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.119782] device bridge_slave_0 left promiscuous mode [ 85.125294] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.164502] team0 (unregistering): Port device team_slave_1 removed [ 85.176120] team0 (unregistering): Port device team_slave_0 removed [ 85.186595] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 85.206164] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 85.235134] bond0 (unregistering): Released all slaves 2018/04/16 23:31:52 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000335000), 0x10052) fcntl$setpipe(r0, 0x407, 0x0) 2018/04/16 23:31:52 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0xa) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000100)={0x84, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'sh\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/16 23:31:52 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/16 23:31:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x677acff3, 0x0, 0x0, 0x0, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCGLCKTRMIOS(r2, 0x5412, &(0x7f0000000100)={0xffffffff}) 2018/04/16 23:31:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="480f21af37668c"], &(0x7f0000000240)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:31:52 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@random="875db04ddf52", @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0xac1414aa, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/16 23:31:52 executing program 1: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@ax25, &(0x7f00000001c0)=0x80, 0x800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000002600)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002640)={{{@in=@local, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000002740)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) socket$inet_tcp(0x2, 0x1, 0x0) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000002bc0)) socketpair(0xb, 0x8080a, 0x6, &(0x7f0000002c00)) socket$nl_netfilter(0x10, 0x3, 0xc) accept$inet6(0xffffffffffffff9c, &(0x7f0000002c40)={0x0, 0x0, 0x0, @dev}, &(0x7f0000002c80)=0x1c) accept$netrom(0xffffffffffffffff, &(0x7f0000003180)=@full, &(0x7f0000003200)=0x48) socketpair$ax25(0x3, 0x7, 0xca, &(0x7f0000003240)) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003280), &(0x7f00000032c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) epoll_create1(0x80000) socket$inet6_dccp(0xa, 0x6, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000003400)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000003440)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003480)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000003580)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) socket$inet6_dccp(0xa, 0x6, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003ac0)=0xffffffff, 0x4) epoll_create(0x7) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000003b00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003b40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000003c40)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) socket$inet_icmp(0x2, 0x2, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000004280)) r1 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in6=@ipv4, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000043c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004400)={0x0, 0x0, 0x0}, &(0x7f0000004440)=0xc) r4 = accept4$netrom(0xffffffffffffff9c, 0x0, &(0x7f0000004480), 0x80800) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000044c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = accept4$ipx(0xffffffffffffffff, &(0x7f0000004500), &(0x7f0000004540)=0x10, 0x80800) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004940)={0x0, 0x0}, &(0x7f0000004980)=0xc) r8 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004a00)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004b00)=0xe8) r10 = getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000005040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005080)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000005180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000051c0), &(0x7f0000005200)=0xc) sendmmsg$unix(r0, &(0x7f0000005280)=[{&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002580)=[{&(0x7f0000000280)="112095aeb759db5932495184301f3cc89b9e7b660e6fa1c8fb487e234e", 0x1d}, {&(0x7f0000000500)="023a874237cc29e67b5fa5d52631be9255cf62703f783b48800cc63536bf53bf3871615cd10fb79e8e87b9ca2a209420cfa766e6861f669351f3405b8f9ca358a361b2f37fac897c6e5141e5f630073d5afdd2433d92649b546ec98cbe33973c2114c498d943c6fc2fc5a2e40ba022e964b4177290", 0x75}], 0x2, &(0x7f0000002800), 0x0, 0x40000}, {&(0x7f0000002840)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000029c0)=[{&(0x7f00000028c0)="b20b04811edcb5d70a9b9990c536af059eb492f529b4cc11710dd12d5800ea78bbff2094cf18c30d008ca6c88ceb052c4066c2ba735032180b50047c00ef6838f9035c6da9d1ed45834c7fea6cb2859c284c845831213e7dd3dc191bd3912dbf1ccc27cdd541adc6f517d61575efaa34d7e48e8d198852da5a0cf62ad44bc53ef305a8ca4c2f35bdb293b3cf62485b9c615631959856436f3d5ca7ce9fef5adaa1efd5f74a35da3cd008898a00c183ed0a11e9d08d0379cd679b5fcd7808cac445", 0xc1}], 0x1, 0x0, 0x0, 0x4}, {&(0x7f0000003700)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003a40)=[{&(0x7f0000003780)="23b2b01cf337f25d7e5f93cb9c56c50f07d457b35dc2266535744468770171d11e6a54c67e3a48be14db0d713efef3c72336498b12b77143b8f8451dff7d9940d4162c6dca9d7bcf13ac75f41db2bb6d3f90a9ab5589b9d798e80a5cc940e030d40908016483ad1c9aba59b900b2311d04c0f7fa00f837955f55ebd69367c5b415043db16a2a41f4c4c908be2c6c575c7713370934b9c8e58a2c6a8b0c3969e87840bce4ada244", 0xa7}, {&(0x7f0000003980)="f76b6e8d44caa27687f6617c2fbfbd5d8862219591df28df5c0272a6ad284a3ce2cac086219b5e3d057f4e8a53977c145b2556c756e38668bc812104558f679b78957f0d75aec4db81357dcfde32f38c0789d4f93a2fa4d6782e2c825a96d3d585d87196f49d1ab125e56e4d9b8ec294546d6f4616b818496d2f975ec00afd410e98c5c7749dd18b71990c2ce49808", 0x8f}], 0x2, &(0x7f0000003d00), 0x0, 0x40000}, {&(0x7f0000003d40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000004200)=[{&(0x7f0000003dc0)="2db3546d92cbd688109cc6fb5264535e65df029ae7cb5dba6b637028ec8036001a85f276f9db260cb119b3617ec34bfe60f7ac7079e1ea71c70878b7ffbb234b65abff37f0202b2f5f8e49868b88fd3db8", 0x51}, {&(0x7f0000004080)="3822dadc2f4810ca9b2bd7809ed89840431fc05b5e93bc05ee6d7595e4", 0x1d}], 0x2, &(0x7f0000004580)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x20, 0x1, 0x1, [r4, r5, r6]}], 0x40, 0x40000}, {&(0x7f0000004600)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000048c0)=[{&(0x7f0000004680)="94eec757f4d7378aac15d1e1724560afce46e9718b7192f18c3de50dec649b8746a0df186a8b6698dbedc53f74b61f29257c5325c79df9bebe093710f41da4f890eb1f1c0c3ccfeb20a2e6ced88105194ef81b45cea415b95df22379d0b3f6cc7d65fc4b5412cdeadc5d3593463e23716df905edd8d2880a82edfc766f9668048a50f307466190f99454", 0x8a}], 0x1, &(0x7f0000004b40)=[@cred={0x20, 0x1, 0x2, 0x0, r7, r8}, @cred={0x20, 0x1, 0x2, 0x0, r9, r10}], 0x40, 0x40}, {&(0x7f0000004b80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004e00)=[{&(0x7f0000004c00)="345d1cc2c1aedac047e560a757f5dada75b2841e333da5d05973d445e0db12cbc8084165aa11795767b0e76c7a53d2121dfbd19e8750f66714b1f90c69c14683af8ba90fa0e82f57d4b9f55a04158ee61bb31d711bb946214fdb63ea42adce3f3e6dabc45dee292b00d851ab89d04c2fef284fd33672fe022418cb8d264b9907436ffaa4e63e65ea9fac64a62881b89bda119d57b63df63df027e694f1f7bf543d08d52e4c9983ace6f105bcf40833f3fba8e2e9a21419942506bd9bd636e36147405a289fe56c548711fe18843d77555dba36abfefb6ca0aeb184ff1a386cc40d85764b5ac78b410e5a8364b5aa4c3741a8cb1c6b", 0xf5}], 0x1, 0x0, 0x0, 0x40000}], 0x6, 0x800) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r11, r14, 0x8001, 0x0) tee(r11, r14, 0x8004, 0x0) setsockopt$sock_void(r12, 0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r13, 0x1, 0x1a, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x3, 0xc6, 0x7, 0x20}, {0x8000, 0x4, 0x1, 0x7}, {0x6, 0xfff, 0x1c83, 0x7}, {0xa9e, 0x6, 0x9, 0x3}, {0x0, 0x9f5, 0x7fffffff}, {0x3, 0x800, 0x4, 0x7}]}, 0x10) connect$unix(r12, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) write(r12, &(0x7f00000000c0), 0xffdd) tee(r11, r14, 0x1, 0x3) 2018/04/16 23:31:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000018c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001880)={0xffffffff}, 0x13f}}, 0x20) write$rdma_cm(r0, &(0x7f0000000340)=@set_option={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x1b6) write$rdma_cm(r0, &(0x7f0000000100)=@bind_ip={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @loopback={0x0, 0x1}}, r1}}, 0x30) getpid() 2018/04/16 23:31:52 executing program 6: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f000058a000)={0x0, 0x0, 0x4}) clock_gettime(0x0, &(0x7f0000000080)) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={0x7fffffff}, 0x8, 0x0) readv(r2, &(0x7f0000000080), 0x162) 2018/04/16 23:31:52 executing program 7: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/37, 0x25}, {&(0x7f0000000300)=""/30, 0x1e}], 0x2) [ 87.586226] IPVS: ftp: loaded support on port[0] = 21 [ 87.899267] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.905661] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.912795] device bridge_slave_0 entered promiscuous mode [ 87.935837] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.942193] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.949921] device bridge_slave_1 entered promiscuous mode [ 87.972488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 87.995051] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 88.056294] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 88.080368] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 88.172924] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 88.179971] team0: Port device team_slave_0 added [ 88.200606] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 88.207659] team0: Port device team_slave_1 added [ 88.229633] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.253988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 88.277487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.301586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.498561] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.504929] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.511550] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.517906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.220839] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.291633] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 89.360933] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.367102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.374530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.439067] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:31:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)) 2018/04/16 23:31:56 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@random="875db04ddf52", @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0xac1414aa, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/16 23:31:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x10, &(0x7f0000000340)="18000300000001000000be5ea6cd88360000080203000008000006000e640002b900100000011c6900bb77a107567e5bdba17e19470055040097ec67a1e2010049fc2d63e0000000000014180000000000130000c88ebbff06010000ad000000000000061496d7220342000747ecf48b05000000e7ec75e848ccfff6ba00b3b40f0000c62cc6e96c7a442ef629cd7ed089f74164536dab653670786eaec0ef151332450f779c4865c287b7e75ab4f1b8fc393d26960300ba5aeae20000000000000000089c6120c6", 0xc8) 2018/04/16 23:31:56 executing program 7: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') mount(&(0x7f0000000080)='./control/file1\x00', &(0x7f0000000100)='./control\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) 2018/04/16 23:31:56 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xca9000)=nil, 0xca9000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ptrace(0x4207, r1) ptrace$getenv(0x4201, r1, 0x0, &(0x7f00000001c0)) 2018/04/16 23:31:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}}, 0x0, 0x1, 0x0, "111d6c1ba6050dd77cf3f2f09d1cb02a25988f1ea9c5be7d9801641c99b0def45ac625ada3316175a9d341111c181811e12c196e1ab99946e5e47e0594e415670d1330cd611c3974c55bb4d50000e111"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}}, 0x0, 0x0, 0x0, "411b3f1c08455047284bea37cf1ab7534db964b7958943c7db1b29d39d5221fac53a751f6f97a5f406473879b8171ae0d09086cb18d602ee628a185531290242710b99b8401772c02989f80629dc1d9e"}, 0xd8) dup3(r0, r1, 0x0) 2018/04/16 23:31:56 executing program 2: mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00007fefe0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, &(0x7f0000f63ffc)=0x20) 2018/04/16 23:31:56 executing program 1: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@ax25, &(0x7f00000001c0)=0x80, 0x800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000002600)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002640)={{{@in=@local, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000002740)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) socket$inet_tcp(0x2, 0x1, 0x0) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000002bc0)) socketpair(0xb, 0x8080a, 0x6, &(0x7f0000002c00)) socket$nl_netfilter(0x10, 0x3, 0xc) accept$inet6(0xffffffffffffff9c, &(0x7f0000002c40)={0x0, 0x0, 0x0, @dev}, &(0x7f0000002c80)=0x1c) accept$netrom(0xffffffffffffffff, &(0x7f0000003180)=@full, &(0x7f0000003200)=0x48) socketpair$ax25(0x3, 0x7, 0xca, &(0x7f0000003240)) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003280), &(0x7f00000032c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) epoll_create1(0x80000) socket$inet6_dccp(0xa, 0x6, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000003400)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000003440)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003480)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000003580)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) socket$inet6_dccp(0xa, 0x6, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003ac0)=0xffffffff, 0x4) epoll_create(0x7) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000003b00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003b40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000003c40)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) socket$inet_icmp(0x2, 0x2, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000004280)) r1 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in6=@ipv4, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000043c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004400)={0x0, 0x0, 0x0}, &(0x7f0000004440)=0xc) r4 = accept4$netrom(0xffffffffffffff9c, 0x0, &(0x7f0000004480), 0x80800) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000044c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = accept4$ipx(0xffffffffffffffff, &(0x7f0000004500), &(0x7f0000004540)=0x10, 0x80800) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004940)={0x0, 0x0}, &(0x7f0000004980)=0xc) r8 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004a00)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004b00)=0xe8) r10 = getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000005040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005080)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000005180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000051c0), &(0x7f0000005200)=0xc) sendmmsg$unix(r0, &(0x7f0000005280)=[{&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002580)=[{&(0x7f0000000280)="112095aeb759db5932495184301f3cc89b9e7b660e6fa1c8fb487e234e", 0x1d}, {&(0x7f0000000500)="023a874237cc29e67b5fa5d52631be9255cf62703f783b48800cc63536bf53bf3871615cd10fb79e8e87b9ca2a209420cfa766e6861f669351f3405b8f9ca358a361b2f37fac897c6e5141e5f630073d5afdd2433d92649b546ec98cbe33973c2114c498d943c6fc2fc5a2e40ba022e964b4177290", 0x75}], 0x2, &(0x7f0000002800), 0x0, 0x40000}, {&(0x7f0000002840)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000029c0)=[{&(0x7f00000028c0)="b20b04811edcb5d70a9b9990c536af059eb492f529b4cc11710dd12d5800ea78bbff2094cf18c30d008ca6c88ceb052c4066c2ba735032180b50047c00ef6838f9035c6da9d1ed45834c7fea6cb2859c284c845831213e7dd3dc191bd3912dbf1ccc27cdd541adc6f517d61575efaa34d7e48e8d198852da5a0cf62ad44bc53ef305a8ca4c2f35bdb293b3cf62485b9c615631959856436f3d5ca7ce9fef5adaa1efd5f74a35da3cd008898a00c183ed0a11e9d08d0379cd679b5fcd7808cac445", 0xc1}], 0x1, 0x0, 0x0, 0x4}, {&(0x7f0000003700)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003a40)=[{&(0x7f0000003780)="23b2b01cf337f25d7e5f93cb9c56c50f07d457b35dc2266535744468770171d11e6a54c67e3a48be14db0d713efef3c72336498b12b77143b8f8451dff7d9940d4162c6dca9d7bcf13ac75f41db2bb6d3f90a9ab5589b9d798e80a5cc940e030d40908016483ad1c9aba59b900b2311d04c0f7fa00f837955f55ebd69367c5b415043db16a2a41f4c4c908be2c6c575c7713370934b9c8e58a2c6a8b0c3969e87840bce4ada244", 0xa7}, {&(0x7f0000003980)="f76b6e8d44caa27687f6617c2fbfbd5d8862219591df28df5c0272a6ad284a3ce2cac086219b5e3d057f4e8a53977c145b2556c756e38668bc812104558f679b78957f0d75aec4db81357dcfde32f38c0789d4f93a2fa4d6782e2c825a96d3d585d87196f49d1ab125e56e4d9b8ec294546d6f4616b818496d2f975ec00afd410e98c5c7749dd18b71990c2ce49808", 0x8f}], 0x2, &(0x7f0000003d00), 0x0, 0x40000}, {&(0x7f0000003d40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000004200)=[{&(0x7f0000003dc0)="2db3546d92cbd688109cc6fb5264535e65df029ae7cb5dba6b637028ec8036001a85f276f9db260cb119b3617ec34bfe60f7ac7079e1ea71c70878b7ffbb234b65abff37f0202b2f5f8e49868b88fd3db8", 0x51}, {&(0x7f0000004080)="3822dadc2f4810ca9b2bd7809ed89840431fc05b5e93bc05ee6d7595e4", 0x1d}], 0x2, &(0x7f0000004580)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x20, 0x1, 0x1, [r4, r5, r6]}], 0x40, 0x40000}, {&(0x7f0000004600)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000048c0)=[{&(0x7f0000004680)="94eec757f4d7378aac15d1e1724560afce46e9718b7192f18c3de50dec649b8746a0df186a8b6698dbedc53f74b61f29257c5325c79df9bebe093710f41da4f890eb1f1c0c3ccfeb20a2e6ced88105194ef81b45cea415b95df22379d0b3f6cc7d65fc4b5412cdeadc5d3593463e23716df905edd8d2880a82edfc766f9668048a50f307466190f99454", 0x8a}], 0x1, &(0x7f0000004b40)=[@cred={0x20, 0x1, 0x2, 0x0, r7, r8}, @cred={0x20, 0x1, 0x2, 0x0, r9, r10}], 0x40, 0x40}, {&(0x7f0000004b80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004e00)=[{&(0x7f0000004c00)="345d1cc2c1aedac047e560a757f5dada75b2841e333da5d05973d445e0db12cbc8084165aa11795767b0e76c7a53d2121dfbd19e8750f66714b1f90c69c14683af8ba90fa0e82f57d4b9f55a04158ee61bb31d711bb946214fdb63ea42adce3f3e6dabc45dee292b00d851ab89d04c2fef284fd33672fe022418cb8d264b9907436ffaa4e63e65ea9fac64a62881b89bda119d57b63df63df027e694f1f7bf543d08d52e4c9983ace6f105bcf40833f3fba8e2e9a21419942506bd9bd636e36147405a289fe56c548711fe18843d77555dba36abfefb6ca0aeb184ff1a386cc40d85764b5ac78b410e5a8364b5aa4c3741a8cb1c6b", 0xf5}], 0x1, 0x0, 0x0, 0x40000}], 0x6, 0x800) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r11, r14, 0x8001, 0x0) tee(r11, r14, 0x8004, 0x0) setsockopt$sock_void(r12, 0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r13, 0x1, 0x1a, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x3, 0xc6, 0x7, 0x20}, {0x8000, 0x4, 0x1, 0x7}, {0x6, 0xfff, 0x1c83, 0x7}, {0xa9e, 0x6, 0x9, 0x3}, {0x0, 0x9f5, 0x7fffffff}, {0x3, 0x800, 0x4, 0x7}]}, 0x10) connect$unix(r12, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) write(r12, &(0x7f00000000c0), 0xffdd) tee(r11, r14, 0x1, 0x3) 2018/04/16 23:31:56 executing program 6: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'bridge0\x00'}}, 0x1e) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}) 2018/04/16 23:31:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="390000001100090469000000810000000700fd3f03000000450001070000001419001a000400230007000000020000080900020000f41ee400", 0x39}], 0x1) 2018/04/16 23:31:56 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1275, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) 2018/04/16 23:31:56 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@random="875db04ddf52", @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0xac1414aa, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/16 23:31:56 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$inet(0x2, 0x1, 0x7ff) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x5, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xf92}}, 0x26, 0x4000400}, &(0x7f0000000380)=0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000003c0)={r2, 0xfffffffffffffe01}, 0x8) getsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000ff0)={0x0, 0x0}, &(0x7f0000000000)=0x10) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000ff0)={0x77359400, r3}, 0x10) 2018/04/16 23:31:56 executing program 4: pipe2(&(0x7f0000989000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) poll(&(0x7f0000000080)=[{r0}, {r3, 0x40}, {r2, 0x1000}, {r3}, {r1}, {r2, 0x8228}, {r0, 0x508}, {r2}], 0x8, 0x528) unshare(0x20000) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000f4c000)='jfs\x00', 0x1023402, 0x0) write$tun(r3, &(0x7f0000000200)={@pi={0x0, 0x11}, @hdr={0x2, 0x84, 0x8, 0x4, 0xbf5c, 0x960000}, @ipv4={{0x1d, 0x4, 0x62e, 0xd32a, 0xfb, 0x67, 0x54f, 0x9, 0xff, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr=0x81, {[@generic={0x1, 0x5, "b9384d"}, @end, @end, @ssrr={0x89, 0xf, 0x40, [@remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x17}, @rand_addr=0x8]}, @generic={0x0, 0x12, "b813a9704bda8310b35714f7013f0741"}, @timestamp={0x44, 0x1c, 0x6, 0x0, 0xd9, [{[], 0xfffffffffffff3e1}, {[@empty]}, {[@local={0xac, 0x14, 0x14, 0xaa}], 0x8}, {[], 0x214}]}, @noop={0x1}, @rr={0x7, 0x1b, 0x6, [@multicast2=0xe0000002, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001, @multicast2=0xe0000002, @multicast1=0xe0000001]}]}}, @udp={0x4e21, 0x4e20, 0x87, 0x0, [@guehdr={0x2, 0xffffffff, 0x8, 0x3, 0x100, [0x0]}, @guehdr={0x2, 0x0, 0x0, 0x8000, 0x100, [0x80]}, @guehdr={0x1, 0x7ff, 0xb5, 0x100000000, 0x100}, @guehdr={0x2, 0xfffffffff7d08149, 0x997, 0xfffffffffffffffd, 0x100, [0x80]}, @guehdr={0x1, 0x9, 0x213d, 0x5, 0x100}, @guehdr={0x2, 0x4, 0x4a, 0x2, 0x100, [0x80]}], "c66f6efe40079f1db4f3c3b3a47b2fa723bed7406482582d959716580f485e0aa32bb2677f133d93779f43111314f5ae0322d5c44d8af30143a879653d67dd35ece54922e51013f877a3f644207bd6f409c241af2db90b"}}}, 0x109) unlink(&(0x7f00003b3000)='./file0\x00') dup2(r0, r2) syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/16 23:31:56 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x100000000800) ioctl$KVM_GET_REG_LIST(r0, 0x4018920a, &(0x7f0000000100)) 2018/04/16 23:31:56 executing program 3: unshare(0x40600) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000180)={{0x77359400}}, &(0x7f0000000200)) timerfd_gettime(r0, &(0x7f0000003fe0)) 2018/04/16 23:31:56 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@random="875db04ddf52", @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0xac1414aa, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/16 23:31:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0x8) 2018/04/16 23:31:56 executing program 6: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'bridge0\x00'}}, 0x1e) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}) 2018/04/16 23:31:57 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00X', 0x8, r2) r4 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x182, r0) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280)="75ab227c58b94ff4d448f5f5049048e6e6", 0x11, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'rmd256-generic\x00'}}) 2018/04/16 23:31:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TCFLSH(r0, 0x540b, 0x1) 2018/04/16 23:31:57 executing program 3: r0 = epoll_create(0x3da) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) 2018/04/16 23:31:57 executing program 2: setitimer(0x2, &(0x7f0000000000)={{0x100000000000}}, &(0x7f00000000c0)) 2018/04/16 23:31:57 executing program 0: r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000480)=ANY=[]) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r0, &(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYBLOB="d4e77692e5871960bd8ae48acab2f4c2d2ec102f3b1e19dd0b20041b622a9e5f46d8d45e8fb92ac42e264cb4232db2910f3930351093d7474a5d3316279edd13c1c8287d84142d2ff4938ee059a8aaae9cf3723ad21c52bea59775de029631000eb0e013d4db2c8bee0a0b45d6ad075bd2c87b17bd073054b878b9ffa867131490e3c8e708634b819ab9cd54b6f5fae0604686f2abbc9ee6b30ee55d006a82febe5691665603909a9272d7c6adfb9ccf3d55bfdc3421c7e89650ccf140a6d32bc3a0d523b1c1e9100286c210c0b183624bbd2eb4a49ec791d4f7e830731be2da87aae5", @ANYRES64=r0, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES16=r0, @ANYRES32=r0, @ANYPTR, @ANYPTR64, @ANYRES64=r1, @ANYRES64]], @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES32=r0, @ANYRES16=r0]], 0x10) fallocate(r1, 0x3, 0x0, 0x3000000004) 2018/04/16 23:31:57 executing program 6: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'bridge0\x00'}}, 0x1e) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}) 2018/04/16 23:31:57 executing program 1: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@ax25, &(0x7f00000001c0)=0x80, 0x800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000002600)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002640)={{{@in=@local, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000002740)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) socket$inet_tcp(0x2, 0x1, 0x0) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000002bc0)) socketpair(0xb, 0x8080a, 0x6, &(0x7f0000002c00)) socket$nl_netfilter(0x10, 0x3, 0xc) accept$inet6(0xffffffffffffff9c, &(0x7f0000002c40)={0x0, 0x0, 0x0, @dev}, &(0x7f0000002c80)=0x1c) accept$netrom(0xffffffffffffffff, &(0x7f0000003180)=@full, &(0x7f0000003200)=0x48) socketpair$ax25(0x3, 0x7, 0xca, &(0x7f0000003240)) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003280), &(0x7f00000032c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) epoll_create1(0x80000) socket$inet6_dccp(0xa, 0x6, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000003400)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000003440)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003480)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000003580)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) socket$inet6_dccp(0xa, 0x6, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003ac0)=0xffffffff, 0x4) epoll_create(0x7) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000003b00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003b40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000003c40)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) socket$inet_icmp(0x2, 0x2, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000004280)) r1 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in6=@ipv4, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000043c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004400)={0x0, 0x0, 0x0}, &(0x7f0000004440)=0xc) r4 = accept4$netrom(0xffffffffffffff9c, 0x0, &(0x7f0000004480), 0x80800) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000044c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = accept4$ipx(0xffffffffffffffff, &(0x7f0000004500), &(0x7f0000004540)=0x10, 0x80800) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004940)={0x0, 0x0}, &(0x7f0000004980)=0xc) r8 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004a00)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004b00)=0xe8) r10 = getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000005040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005080)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000005180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000051c0), &(0x7f0000005200)=0xc) sendmmsg$unix(r0, &(0x7f0000005280)=[{&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002580)=[{&(0x7f0000000280)="112095aeb759db5932495184301f3cc89b9e7b660e6fa1c8fb487e234e", 0x1d}, {&(0x7f0000000500)="023a874237cc29e67b5fa5d52631be9255cf62703f783b48800cc63536bf53bf3871615cd10fb79e8e87b9ca2a209420cfa766e6861f669351f3405b8f9ca358a361b2f37fac897c6e5141e5f630073d5afdd2433d92649b546ec98cbe33973c2114c498d943c6fc2fc5a2e40ba022e964b4177290", 0x75}], 0x2, &(0x7f0000002800), 0x0, 0x40000}, {&(0x7f0000002840)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000029c0)=[{&(0x7f00000028c0)="b20b04811edcb5d70a9b9990c536af059eb492f529b4cc11710dd12d5800ea78bbff2094cf18c30d008ca6c88ceb052c4066c2ba735032180b50047c00ef6838f9035c6da9d1ed45834c7fea6cb2859c284c845831213e7dd3dc191bd3912dbf1ccc27cdd541adc6f517d61575efaa34d7e48e8d198852da5a0cf62ad44bc53ef305a8ca4c2f35bdb293b3cf62485b9c615631959856436f3d5ca7ce9fef5adaa1efd5f74a35da3cd008898a00c183ed0a11e9d08d0379cd679b5fcd7808cac445", 0xc1}], 0x1, 0x0, 0x0, 0x4}, {&(0x7f0000003700)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003a40)=[{&(0x7f0000003780)="23b2b01cf337f25d7e5f93cb9c56c50f07d457b35dc2266535744468770171d11e6a54c67e3a48be14db0d713efef3c72336498b12b77143b8f8451dff7d9940d4162c6dca9d7bcf13ac75f41db2bb6d3f90a9ab5589b9d798e80a5cc940e030d40908016483ad1c9aba59b900b2311d04c0f7fa00f837955f55ebd69367c5b415043db16a2a41f4c4c908be2c6c575c7713370934b9c8e58a2c6a8b0c3969e87840bce4ada244", 0xa7}, {&(0x7f0000003980)="f76b6e8d44caa27687f6617c2fbfbd5d8862219591df28df5c0272a6ad284a3ce2cac086219b5e3d057f4e8a53977c145b2556c756e38668bc812104558f679b78957f0d75aec4db81357dcfde32f38c0789d4f93a2fa4d6782e2c825a96d3d585d87196f49d1ab125e56e4d9b8ec294546d6f4616b818496d2f975ec00afd410e98c5c7749dd18b71990c2ce49808", 0x8f}], 0x2, &(0x7f0000003d00), 0x0, 0x40000}, {&(0x7f0000003d40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000004200)=[{&(0x7f0000003dc0)="2db3546d92cbd688109cc6fb5264535e65df029ae7cb5dba6b637028ec8036001a85f276f9db260cb119b3617ec34bfe60f7ac7079e1ea71c70878b7ffbb234b65abff37f0202b2f5f8e49868b88fd3db8", 0x51}, {&(0x7f0000004080)="3822dadc2f4810ca9b2bd7809ed89840431fc05b5e93bc05ee6d7595e4", 0x1d}], 0x2, &(0x7f0000004580)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x20, 0x1, 0x1, [r4, r5, r6]}], 0x40, 0x40000}, {&(0x7f0000004600)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000048c0)=[{&(0x7f0000004680)="94eec757f4d7378aac15d1e1724560afce46e9718b7192f18c3de50dec649b8746a0df186a8b6698dbedc53f74b61f29257c5325c79df9bebe093710f41da4f890eb1f1c0c3ccfeb20a2e6ced88105194ef81b45cea415b95df22379d0b3f6cc7d65fc4b5412cdeadc5d3593463e23716df905edd8d2880a82edfc766f9668048a50f307466190f99454", 0x8a}], 0x1, &(0x7f0000004b40)=[@cred={0x20, 0x1, 0x2, 0x0, r7, r8}, @cred={0x20, 0x1, 0x2, 0x0, r9, r10}], 0x40, 0x40}, {&(0x7f0000004b80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004e00)=[{&(0x7f0000004c00)="345d1cc2c1aedac047e560a757f5dada75b2841e333da5d05973d445e0db12cbc8084165aa11795767b0e76c7a53d2121dfbd19e8750f66714b1f90c69c14683af8ba90fa0e82f57d4b9f55a04158ee61bb31d711bb946214fdb63ea42adce3f3e6dabc45dee292b00d851ab89d04c2fef284fd33672fe022418cb8d264b9907436ffaa4e63e65ea9fac64a62881b89bda119d57b63df63df027e694f1f7bf543d08d52e4c9983ace6f105bcf40833f3fba8e2e9a21419942506bd9bd636e36147405a289fe56c548711fe18843d77555dba36abfefb6ca0aeb184ff1a386cc40d85764b5ac78b410e5a8364b5aa4c3741a8cb1c6b", 0xf5}], 0x1, 0x0, 0x0, 0x40000}], 0x6, 0x800) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r11, r14, 0x8001, 0x0) tee(r11, r14, 0x8004, 0x0) setsockopt$sock_void(r12, 0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r13, 0x1, 0x1a, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x3, 0xc6, 0x7, 0x20}, {0x8000, 0x4, 0x1, 0x7}, {0x6, 0xfff, 0x1c83, 0x7}, {0xa9e, 0x6, 0x9, 0x3}, {0x0, 0x9f5, 0x7fffffff}, {0x3, 0x800, 0x4, 0x7}]}, 0x10) connect$unix(r12, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) write(r12, &(0x7f00000000c0), 0xffdd) tee(r11, r14, 0x1, 0x3) 2018/04/16 23:31:57 executing program 3: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0xb, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/04/16 23:31:57 executing program 2: getrandom(&(0x7f0000000000)=""/1, 0x1, 0x5) 2018/04/16 23:31:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") ioctl$fiemap(r0, 0x40286608, &(0x7f0000000080)=ANY=[]) [ 90.998967] EXT4-fs warning (device sda1): ext4_group_add:1634: No reserved GDT blocks, can't resize 2018/04/16 23:31:58 executing program 4: pipe2(&(0x7f0000989000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) poll(&(0x7f0000000080)=[{r0}, {r3, 0x40}, {r2, 0x1000}, {r3}, {r1}, {r2, 0x8228}, {r0, 0x508}, {r2}], 0x8, 0x528) unshare(0x20000) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000f4c000)='jfs\x00', 0x1023402, 0x0) write$tun(r3, &(0x7f0000000200)={@pi={0x0, 0x11}, @hdr={0x2, 0x84, 0x8, 0x4, 0xbf5c, 0x960000}, @ipv4={{0x1d, 0x4, 0x62e, 0xd32a, 0xfb, 0x67, 0x54f, 0x9, 0xff, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr=0x81, {[@generic={0x1, 0x5, "b9384d"}, @end, @end, @ssrr={0x89, 0xf, 0x40, [@remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x17}, @rand_addr=0x8]}, @generic={0x0, 0x12, "b813a9704bda8310b35714f7013f0741"}, @timestamp={0x44, 0x1c, 0x6, 0x0, 0xd9, [{[], 0xfffffffffffff3e1}, {[@empty]}, {[@local={0xac, 0x14, 0x14, 0xaa}], 0x8}, {[], 0x214}]}, @noop={0x1}, @rr={0x7, 0x1b, 0x6, [@multicast2=0xe0000002, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001, @multicast2=0xe0000002, @multicast1=0xe0000001]}]}}, @udp={0x4e21, 0x4e20, 0x87, 0x0, [@guehdr={0x2, 0xffffffff, 0x8, 0x3, 0x100, [0x0]}, @guehdr={0x2, 0x0, 0x0, 0x8000, 0x100, [0x80]}, @guehdr={0x1, 0x7ff, 0xb5, 0x100000000, 0x100}, @guehdr={0x2, 0xfffffffff7d08149, 0x997, 0xfffffffffffffffd, 0x100, [0x80]}, @guehdr={0x1, 0x9, 0x213d, 0x5, 0x100}, @guehdr={0x2, 0x4, 0x4a, 0x2, 0x100, [0x80]}], "c66f6efe40079f1db4f3c3b3a47b2fa723bed7406482582d959716580f485e0aa32bb2677f133d93779f43111314f5ae0322d5c44d8af30143a879653d67dd35ece54922e51013f877a3f644207bd6f409c241af2db90b"}}}, 0x109) unlink(&(0x7f00003b3000)='./file0\x00') dup2(r0, r2) syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/16 23:31:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="82493e9cd6a3", [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0xffffff8f, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x0, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}}}}}}}, 0x0) 2018/04/16 23:31:58 executing program 1: userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) clock_nanosleep(0x0, 0x0, &(0x7f0000011000), &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0x8010aa02, &(0x7f00000c0ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) 2018/04/16 23:31:58 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18550d00000000000000000002800000850000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)="4750c3ff", 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x86, &(0x7f0000000300)="c41223036a8a4ebaed6b2dbb0c4b", &(0x7f0000000380)=""/134}, 0x28) 2018/04/16 23:31:58 executing program 0: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000000bffc)={0x0, 0x6}, 0x4) mmap(&(0x7f0000000000/0xfd4000)=nil, 0xfd4000, 0x0, 0x40000000000031, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f000000c000)={0x0, &(0x7f000000c000)}, 0x10) 2018/04/16 23:31:58 executing program 6: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'bridge0\x00'}}, 0x1e) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}) 2018/04/16 23:31:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x400000085, 0x0, &(0x7f0000004000)={0x77359400}, &(0x7f0000000000), 0x402ffffffd) 2018/04/16 23:31:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2}}, 0x7fffffff, 0x0, 0x0, 0x0, 0x1}, 0x98) 2018/04/16 23:31:58 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000001580)='ntfs\x00', &(0x7f00000015c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB='uid=']) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000016c0)='./file0\x00', &(0x7f0000000080)='devtmpfs\x00', 0x0, &(0x7f0000001740)) 2018/04/16 23:31:58 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000fdfe8)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x58, 0x0, &(0x7f00000d6000)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000a09fb0), &(0x7f0000711000)}}}, @free_buffer={0x40086303, r1}], 0x0, 0x0, &(0x7f0000f97fde)}) 2018/04/16 23:31:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000040)='/\x00', 0x0, 0xaaaaaaaaaaaaca4, &(0x7f0000001340), 0x28020, &(0x7f0000000000)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, [0x37]}, 0x2c}]}) 2018/04/16 23:31:58 executing program 7: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000018c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001880)={0xffffffff}, 0x13f}}, 0x20) write$rdma_cm(r0, &(0x7f0000000140)=@reject={0x9, 0x0, 0xfa00, {r1, 0x0, "b337d3", "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"}}, 0x5b7) 2018/04/16 23:31:58 executing program 5: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000d1000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 2018/04/16 23:31:58 executing program 6: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'vhan0\x00', 0x400}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 2018/04/16 23:31:58 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000051f000)='./file0\x00', 0x40, 0x43e) execveat(r0, &(0x7f0000001ff8)='./file0\x00', &(0x7f0000000ff0), &(0x7f0000001fe4)=[&(0x7f0000000000)='/dev/vcs\x00', &(0x7f0000001000)="747275737465641e00", &(0x7f0000001fff)='\x00'], 0x1000) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x0) [ 91.886141] binder: 7770:7774 BC_FREE_BUFFER u00000000204edf8a no match [ 91.903881] ntfs: (device loop3): parse_options(): The uid option requires an argument. [ 91.935570] binder: BINDER_SET_CONTEXT_MGR already set 2018/04/16 23:31:58 executing program 7: mkdir(&(0x7f00000e1000)='./file0\x00', 0x0) r0 = open(&(0x7f0000851000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000080)=""/25, 0x19) getdents64(r0, &(0x7f00000000c0)=""/4096, 0xffffffffffffffea) [ 91.960897] binder: 7770:7796 ioctl 40046207 0 returned -16 [ 91.993049] binder_alloc: 7770: binder_alloc_buf, no vma [ 91.998637] binder: 7770:7774 transaction failed 29189/-3, size 40-8 line 2963 [ 92.037871] ntfs: (device loop3): parse_options(): The uid option requires an argument. [ 92.039564] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 [ 92.157902] binder: undelivered TRANSACTION_ERROR: 29189 [ 92.163881] binder: release 7770:7774 transaction 15 out, still active [ 92.170795] binder: unexpected work type, 4, not freed [ 92.176209] binder: undelivered TRANSACTION_COMPLETE [ 92.181339] binder: undelivered TRANSACTION_COMPLETE [ 92.186739] binder: send failed reply for transaction 15, target dead [ 92.193351] binder: undelivered transaction 18, process died. [ 92.205859] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 2018/04/16 23:31:59 executing program 4: pipe2(&(0x7f0000989000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) poll(&(0x7f0000000080)=[{r0}, {r3, 0x40}, {r2, 0x1000}, {r3}, {r1}, {r2, 0x8228}, {r0, 0x508}, {r2}], 0x8, 0x528) unshare(0x20000) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000f4c000)='jfs\x00', 0x1023402, 0x0) write$tun(r3, &(0x7f0000000200)={@pi={0x0, 0x11}, @hdr={0x2, 0x84, 0x8, 0x4, 0xbf5c, 0x960000}, @ipv4={{0x1d, 0x4, 0x62e, 0xd32a, 0xfb, 0x67, 0x54f, 0x9, 0xff, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr=0x81, {[@generic={0x1, 0x5, "b9384d"}, @end, @end, @ssrr={0x89, 0xf, 0x40, [@remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x17}, @rand_addr=0x8]}, @generic={0x0, 0x12, "b813a9704bda8310b35714f7013f0741"}, @timestamp={0x44, 0x1c, 0x6, 0x0, 0xd9, [{[], 0xfffffffffffff3e1}, {[@empty]}, {[@local={0xac, 0x14, 0x14, 0xaa}], 0x8}, {[], 0x214}]}, @noop={0x1}, @rr={0x7, 0x1b, 0x6, [@multicast2=0xe0000002, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001, @multicast2=0xe0000002, @multicast1=0xe0000001]}]}}, @udp={0x4e21, 0x4e20, 0x87, 0x0, [@guehdr={0x2, 0xffffffff, 0x8, 0x3, 0x100, [0x0]}, @guehdr={0x2, 0x0, 0x0, 0x8000, 0x100, [0x80]}, @guehdr={0x1, 0x7ff, 0xb5, 0x100000000, 0x100}, @guehdr={0x2, 0xfffffffff7d08149, 0x997, 0xfffffffffffffffd, 0x100, [0x80]}, @guehdr={0x1, 0x9, 0x213d, 0x5, 0x100}, @guehdr={0x2, 0x4, 0x4a, 0x2, 0x100, [0x80]}], "c66f6efe40079f1db4f3c3b3a47b2fa723bed7406482582d959716580f485e0aa32bb2677f133d93779f43111314f5ae0322d5c44d8af30143a879653d67dd35ece54922e51013f877a3f644207bd6f409c241af2db90b"}}}, 0x109) unlink(&(0x7f00003b3000)='./file0\x00') dup2(r0, r2) syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/16 23:31:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000080)=0x842, 0x8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0x0, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000100)="b9870300000f329a1a00c0fee400c4c31120660d4ab981030000b806000000ba000000000f30c4e2392db636fb66ed0f3266b817018ed0c4e161f1c70f01cf66b8dc008ec8", 0x45}], 0x1, 0x0, &(0x7f0000000040)=[@cstype3={0x5}], 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2018/04/16 23:31:59 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x38, 0x3a, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "cb155d", 0x0, 0x2f, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}, [], "8df06558eb6a17d1"}}}}}}}, 0x0) 2018/04/16 23:31:59 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) 2018/04/16 23:31:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) 2018/04/16 23:31:59 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, r0, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r0, 0x0) readv(r1, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) 2018/04/16 23:31:59 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000fdfe8)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x58, 0x0, &(0x7f00000d6000)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000a09fb0), &(0x7f0000711000)}}}, @free_buffer={0x40086303, r1}], 0x0, 0x0, &(0x7f0000f97fde)}) 2018/04/16 23:31:59 executing program 1: r0 = socket$nl_generic(0xa, 0x3, 0x3a) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000080)={&(0x7f00000001c0)={0xa}, 0x18, &(0x7f0000000040)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x5ac}, 0x1}, 0x0) 2018/04/16 23:31:59 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getpeername(r0, &(0x7f0000000280)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, &(0x7f0000000080)=0x80) [ 92.678359] binder: 7830:7834 BC_FREE_BUFFER u00000000204edf8a no match 2018/04/16 23:31:59 executing program 6: r0 = timerfd_create(0x0, 0x0) r1 = dup(r0) sched_setaffinity(0x0, 0xffffffffffffff36, &(0x7f0000000140)=0x2) read(r0, &(0x7f0000000040)=""/172, 0xac) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0x40085400, &(0x7f0000000000)={0xffff8000}) 2018/04/16 23:31:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(generic-gcm-aesni)\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x8000000000008) 2018/04/16 23:31:59 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80184151, &(0x7f0000005e0b)) 2018/04/16 23:31:59 executing program 7: r0 = memfd_create(&(0x7f0000000000)="2f645951a2f2326b", 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [], 0xa}, 0xb) mknod(&(0x7f0000000040)='./file0\x00', 0x1, 0x0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000240), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000007060804002000fffc0c6565643b799365195f1b76"], 0x1000) 2018/04/16 23:31:59 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000fdfe8)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x58, 0x0, &(0x7f00000d6000)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000a09fb0), &(0x7f0000711000)}}}, @free_buffer={0x40086303, r1}], 0x0, 0x0, &(0x7f0000f97fde)}) 2018/04/16 23:31:59 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r0, &(0x7f0000000000)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000d07000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) tkill(r1, 0x1000000000016) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) [ 92.790353] binder: release 7830:7834 transaction 21 out, still active [ 92.797126] binder: unexpected work type, 4, not freed [ 92.802448] binder: undelivered TRANSACTION_COMPLETE [ 92.807579] binder: undelivered TRANSACTION_COMPLETE [ 92.812759] binder: send failed reply for transaction 21, target dead [ 92.819367] binder: undelivered transaction 24, process died. 2018/04/16 23:31:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020400102", 0xe}], 0x0, &(0x7f000007e200)) [ 92.914065] binder: 7868:7871 BC_FREE_BUFFER u00000000204edf8a no match [ 92.926031] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 92.944686] binder: release 7868:7871 transaction 26 out, still active [ 92.951525] binder: unexpected work type, 4, not freed [ 92.956863] binder: undelivered TRANSACTION_COMPLETE [ 92.961992] binder: undelivered TRANSACTION_COMPLETE [ 92.967162] binder: send failed reply for transaction 26, target dead [ 92.973776] binder: undelivered transaction 29, process died. [ 92.990266] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 2018/04/16 23:32:00 executing program 4: pipe2(&(0x7f0000989000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) poll(&(0x7f0000000080)=[{r0}, {r3, 0x40}, {r2, 0x1000}, {r3}, {r1}, {r2, 0x8228}, {r0, 0x508}, {r2}], 0x8, 0x528) unshare(0x20000) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000f4c000)='jfs\x00', 0x1023402, 0x0) write$tun(r3, &(0x7f0000000200)={@pi={0x0, 0x11}, @hdr={0x2, 0x84, 0x8, 0x4, 0xbf5c, 0x960000}, @ipv4={{0x1d, 0x4, 0x62e, 0xd32a, 0xfb, 0x67, 0x54f, 0x9, 0xff, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr=0x81, {[@generic={0x1, 0x5, "b9384d"}, @end, @end, @ssrr={0x89, 0xf, 0x40, [@remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x17}, @rand_addr=0x8]}, @generic={0x0, 0x12, "b813a9704bda8310b35714f7013f0741"}, @timestamp={0x44, 0x1c, 0x6, 0x0, 0xd9, [{[], 0xfffffffffffff3e1}, {[@empty]}, {[@local={0xac, 0x14, 0x14, 0xaa}], 0x8}, {[], 0x214}]}, @noop={0x1}, @rr={0x7, 0x1b, 0x6, [@multicast2=0xe0000002, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001, @multicast2=0xe0000002, @multicast1=0xe0000001]}]}}, @udp={0x4e21, 0x4e20, 0x87, 0x0, [@guehdr={0x2, 0xffffffff, 0x8, 0x3, 0x100, [0x0]}, @guehdr={0x2, 0x0, 0x0, 0x8000, 0x100, [0x80]}, @guehdr={0x1, 0x7ff, 0xb5, 0x100000000, 0x100}, @guehdr={0x2, 0xfffffffff7d08149, 0x997, 0xfffffffffffffffd, 0x100, [0x80]}, @guehdr={0x1, 0x9, 0x213d, 0x5, 0x100}, @guehdr={0x2, 0x4, 0x4a, 0x2, 0x100, [0x80]}], "c66f6efe40079f1db4f3c3b3a47b2fa723bed7406482582d959716580f485e0aa32bb2677f133d93779f43111314f5ae0322d5c44d8af30143a879653d67dd35ece54922e51013f877a3f644207bd6f409c241af2db90b"}}}, 0x109) unlink(&(0x7f00003b3000)='./file0\x00') dup2(r0, r2) syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/16 23:32:00 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r0, &(0x7f0000000000)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000d07000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) tkill(r1, 0x1000000000016) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) 2018/04/16 23:32:00 executing program 6: perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000000200)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') open(&(0x7f0000000100)='../file0/file0\x00', 0x0, 0x0) 2018/04/16 23:32:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/195, 0xc3}], 0x1, 0x0) 2018/04/16 23:32:00 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000b7aff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0x8) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0xfffffffffffffffe, 0x80da14, 0x3, 0x20000000}) fstatfs(r0, &(0x7f0000000040)=""/22) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x10) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/16 23:32:00 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000fdfe8)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x58, 0x0, &(0x7f00000d6000)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000a09fb0), &(0x7f0000711000)}}}, @free_buffer={0x40086303, r1}], 0x0, 0x0, &(0x7f0000f97fde)}) 2018/04/16 23:32:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x15, &(0x7f0000007ffc), &(0x7f000000cffc)=0x4) 2018/04/16 23:32:00 executing program 7: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x1fd) [ 93.770562] binder: 7909:7911 BC_FREE_BUFFER u00000000204edf8a no match 2018/04/16 23:32:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000040)=0x2, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 2018/04/16 23:32:00 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 2018/04/16 23:32:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0xc, 0x5, 0x5, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000000, 0x0}, 0x2c) 2018/04/16 23:32:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(xtea-generic)\x00'}, 0x59) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003380)=[{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000140)="e29204adc2760a90ef45dba62ce59188", 0x10}], 0x1, &(0x7f0000000040)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0xffffff6e}, 0x0) 2018/04/16 23:32:00 executing program 6: perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000000200)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') open(&(0x7f0000000100)='../file0/file0\x00', 0x0, 0x0) 2018/04/16 23:32:00 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5437, &(0x7f0000981ffe)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x84}) ioctl$TCSETSF(r0, 0x5441, &(0x7f0000000000)) dup2(r0, r1) [ 93.846384] binder: release 7909:7911 transaction 31 out, still active [ 93.853173] binder: unexpected work type, 4, not freed [ 93.858708] binder: undelivered TRANSACTION_COMPLETE [ 93.863856] binder: undelivered TRANSACTION_COMPLETE [ 93.869047] binder: send failed reply for transaction 31, target dead [ 93.875647] binder: undelivered transaction 34, process died. [ 93.901811] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2018/04/16 23:32:00 executing program 7: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000040)) 2018/04/16 23:32:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0xc, 0x5, 0x5, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000000, 0x0}, 0x2c) [ 93.987259] pts pts0: tty_release: tty->count(3) != (#fd's(2) + #kopen's(0)) [ 94.067670] pts pts1: tty_release: tty->count(3) != (#fd's(2) + #kopen's(0)) 2018/04/16 23:32:01 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r0, &(0x7f0000000000)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000d07000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) tkill(r1, 0x1000000000016) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) 2018/04/16 23:32:01 executing program 6: perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000000200)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') open(&(0x7f0000000100)='../file0/file0\x00', 0x0, 0x0) 2018/04/16 23:32:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000040)=0x2, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 2018/04/16 23:32:01 executing program 7: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000040)) 2018/04/16 23:32:01 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000800)) 2018/04/16 23:32:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0xc, 0x5, 0x5, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000000, 0x0}, 0x2c) 2018/04/16 23:32:01 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000002ff0)={0x1d}, 0x10) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000005ff0)={&(0x7f0000375000)={0x5, 0x0, 0x0, 0x0, 0x2000000000000325, 0x0, 0x0, 0x0, [@sadb_sa={0x0, 0x1}, @sadb_x_nat_t_port={0x0, 0x0, 0x4e21}]}, 0x38}, 0x1}, 0x0) 2018/04/16 23:32:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)=@bridge_newneigh={0x30, 0x1a, 0x1, 0x0, 0x0, {0xa}, [@NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}]}, 0x30}, 0x1}, 0x0) 2018/04/16 23:32:01 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x8}}, r1, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000680)={&(0x7f0000000400)=@ax25, 0x80, &(0x7f0000000480), 0x0, &(0x7f00000005c0)=""/170, 0xaa}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) 2018/04/16 23:32:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0xc, 0x5, 0x5, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000000, 0x0}, 0x2c) [ 94.730500] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2018/04/16 23:32:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000dc01)={&(0x7f0000025ff4)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000028fc4)=@mpls_newroute={0x1c, 0x18, 0x503, 0x0, 0x0, {0x1c, 0x14}}, 0x1c}, 0x1}, 0x0) 2018/04/16 23:32:01 executing program 6: perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000000200)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') open(&(0x7f0000000100)='../file0/file0\x00', 0x0, 0x0) 2018/04/16 23:32:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lseek(r0, 0x3, 0x1) 2018/04/16 23:32:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000040)=0x2, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 2018/04/16 23:32:01 executing program 7: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000040)) 2018/04/16 23:32:01 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f000032c000)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x60000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000380)={'raw\x00'}, &(0x7f0000000280)=0x54) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) r5 = dup3(r1, r3, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0xaf4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79ec, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r4) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) r7 = socket$netlink(0x10, 0x3, 0x4000000000000010) bind$netlink(0xffffffffffffffff, &(0x7f00000f1000)={0x10, 0x0, 0x0, 0xa488d180}, 0xc) preadv(r0, &(0x7f00000004c0)=[{&(0x7f00000001c0)}, {&(0x7f00000002c0)=""/128, 0x80}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/181, 0xb5}], 0x4, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x80, 0x0) pipe(&(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netlink(r8, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$netlink(r7, 0x10e, 0x9, &(0x7f0000000080)=""/4, &(0x7f0000bea000)=0x363) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) ioctl$TIOCLINUX3(r8, 0x541c, &(0x7f0000002740)=0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) syz_emit_ethernet(0x1, &(0x7f0000015e15)=ANY=[@ANYBLOB="00ff86dd6076605100303afffe8000000000000000000000000000ffff020000000000000000000000000013e5cbaa788014000860c5961e000000d0ff010000000000e40403000004000001ff020000000000000008000000000001"], 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000002ac0)={0x0, @in6={{0xa, 0x4e24, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x4}}}, &(0x7f0000002b80)=0x84) [ 94.903857] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 95.041489] IPVS: ftp: loaded support on port[0] = 21 [ 95.088566] IPVS: ftp: loaded support on port[0] = 21 2018/04/16 23:32:02 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r0, &(0x7f0000000000)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000d07000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) tkill(r1, 0x1000000000016) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) 2018/04/16 23:32:02 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x2}, 0x1c) 2018/04/16 23:32:02 executing program 7: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000040)) 2018/04/16 23:32:02 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file0//./..\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) open(&(0x7f0000002800)='./file0//./..\x00', 0x0, 0x0) 2018/04/16 23:32:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000040)=0x2, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 2018/04/16 23:32:02 executing program 5: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0/control/file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0x0, &(0x7f000001c000)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00') linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000004c0)='./file1\x00', 0x0) getdents(r0, &(0x7f0000000100)=""/93, 0x5d) unlinkat(r0, &(0x7f0000000200)='./file1\x00', 0x0) 2018/04/16 23:32:02 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f000032c000)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x60000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000380)={'raw\x00'}, &(0x7f0000000280)=0x54) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) r5 = dup3(r1, r3, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0xaf4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79ec, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r4) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) r7 = socket$netlink(0x10, 0x3, 0x4000000000000010) bind$netlink(0xffffffffffffffff, &(0x7f00000f1000)={0x10, 0x0, 0x0, 0xa488d180}, 0xc) preadv(r0, &(0x7f00000004c0)=[{&(0x7f00000001c0)}, {&(0x7f00000002c0)=""/128, 0x80}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/181, 0xb5}], 0x4, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x80, 0x0) pipe(&(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netlink(r8, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$netlink(r7, 0x10e, 0x9, &(0x7f0000000080)=""/4, &(0x7f0000bea000)=0x363) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) ioctl$TIOCLINUX3(r8, 0x541c, &(0x7f0000002740)=0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) syz_emit_ethernet(0x1, &(0x7f0000015e15)=ANY=[@ANYBLOB="00ff86dd6076605100303afffe8000000000000000000000000000ffff020000000000000000000000000013e5cbaa788014000860c5961e000000d0ff010000000000e40403000004000001ff020000000000000008000000000001"], 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000002ac0)={0x0, @in6={{0xa, 0x4e24, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x4}}}, &(0x7f0000002b80)=0x84) 2018/04/16 23:32:02 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000005c0)='./file0/file1\x00', &(0x7f0000000600)='./file0/file1\x00', &(0x7f0000000640)='omfs\x00', 0x201080, &(0x7f0000000680)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000280)='./file0/file1\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x44000, &(0x7f0000000380)) 2018/04/16 23:32:02 executing program 6: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4f}]}, &(0x7f0000f91ffc)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xa, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0x10}], {0x95}}, &(0x7f00005fc000)='GPL\x00', 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x25) 2018/04/16 23:32:02 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x1000) write$evdev(r0, &(0x7f0000037fe8)=[{{}, 0x1, 0x74, 0x2}, {{0x0, 0x2}}], 0x30) [ 95.933980] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 95.972674] IPVS: ftp: loaded support on port[0] = 21 2018/04/16 23:32:02 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mq_open(&(0x7f0000000100)='ip6tnl0\x00', 0x41, 0x0, &(0x7f0000000140)={0x0, 0x7, 0xffffffff}) 2018/04/16 23:32:02 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.clone_children\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)='5', 0x1) 2018/04/16 23:32:02 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x2) write$evdev(r0, &(0x7f0000000240)=[{{0x0, 0x2710}, 0x4, 0x4}, {}], 0x30) 2018/04/16 23:32:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000180)={@dev, @remote, 0x0}, &(0x7f00000001c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'rose0\x00', r1}) add_key(&(0x7f0000000540)="6173796d6d65747269630000f623c165dbdd5da4e516feae1218931b7f62f1989e779cb3e199015e6f224dc786b78b696462c7dec58cd05fa42773a0af0a703d63e19620fd165b5d862cf7493ca6de0e5aee6a37a51f9d03d265f6f5d246b14212db69e767764420fb11a7308eb293967dbd5a729bb8c6833a854e2036d4e9270fef4cef270638e56c144263ecf69038c96c9d38f68668c21513e19c1311eea8ee94c59609987d033ca3c8ad624dbc5c8958aaa4e9158c5850c6228a22d0adaabe8bb566c069d5baa64e30af6d878c4cf8d28146621e8bb1386372c7fe9b4a56158bd2b65d707140b6e0dc78258bb555db445885f350f136633bb71b972ec7cf6667c930694bf37cb71984a8c6c9561d49b9fe9cbea21440209f9c20a2eca5b95eda88d500000000", &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000400)="30800a2e", 0x4, 0xfffffffffffffffd) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r2 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000100)={0x0, 0x5d, &(0x7f0000000080)="0a9ed084a62dc034853f93038454edf63455b5d6e2d20ceed9b96139beebdd11568c514670fb125bee8c89389a55e60b1eae25d2599b1e15ccf7dd7a97257b9fee2e81a476fe00d57a4caea20932c89a5282b40909f8f7a31534aeb2ae"}) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000280)={0x17, 0xb, &(0x7f0000000240)="cbe7c4f3d760035e83ca12"}) io_setup(0x80000000, &(0x7f00000002c0)=0x0) io_cancel(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0xf, 0xffff, r2, &(0x7f0000000300)="92de40cd1d705c433b9f2a9a0a94b99da9ffc75c3b32adb5e6f11955087cab6cb949dd6f27cc0dafca0602fbacf391403b61598579e5600675815d183a134a6c554e8f2abad90e8fab6fe604b34c66740f16dc1f6ab231b7db35b0efc65f47cd2f8d2778d2df996f39f516aa3f79380bacdf34f6a82b84bc6025fe69bbc79649b0", 0x81, 0x3, 0x0, 0x1, r2}, &(0x7f0000000440)) 2018/04/16 23:32:02 executing program 6: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000009000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) dup2(r2, r1) io_setup(0x4, &(0x7f0000000000)=0x0) io_submit(r4, 0x1, &(0x7f0000001440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000040)='<', 0x1}]) 2018/04/16 23:32:02 executing program 4: r0 = socket$inet(0x2, 0xc000000000000005, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x7f}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x101cd, 0x0, &(0x7f0000e68000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/16 23:32:03 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x1000) write$evdev(r0, &(0x7f0000037fe8)=[{{}, 0x1, 0x74, 0x2}, {{0x0, 0x2}}], 0x30) 2018/04/16 23:32:03 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) 2018/04/16 23:32:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x143) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xa80, 0x4) sendto$inet(r0, &(0x7f0000000140)="b6", 0x1, 0x4000000, 0x0, 0x0) 2018/04/16 23:32:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)=ANY=[@ANYBLOB="f1fc"], &(0x7f0000000440)=0x1) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r3, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000300)=[@text32={0x20, &(0x7f0000000240)="0f0097fd050000c4c2fd38407cb8010000000f01d9b9800000c00f3235000800000f3066ba420066b8c00066eff326f4b9800000c00f3235004000000f30660f3881a7621c96dd66baf80cb8385d3080ef66bafc0cedb9800000c00f3235004000000f30", 0x64}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2018/04/16 23:32:03 executing program 6: syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[{@unhide='unhide', 0x2c}]}) 2018/04/16 23:32:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x16}, 0x5}, 0x1c) 2018/04/16 23:32:03 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f000032c000)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x60000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000380)={'raw\x00'}, &(0x7f0000000280)=0x54) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) r5 = dup3(r1, r3, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0xaf4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79ec, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r4) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) r7 = socket$netlink(0x10, 0x3, 0x4000000000000010) bind$netlink(0xffffffffffffffff, &(0x7f00000f1000)={0x10, 0x0, 0x0, 0xa488d180}, 0xc) preadv(r0, &(0x7f00000004c0)=[{&(0x7f00000001c0)}, {&(0x7f00000002c0)=""/128, 0x80}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/181, 0xb5}], 0x4, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x80, 0x0) pipe(&(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netlink(r8, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$netlink(r7, 0x10e, 0x9, &(0x7f0000000080)=""/4, &(0x7f0000bea000)=0x363) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) ioctl$TIOCLINUX3(r8, 0x541c, &(0x7f0000002740)=0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) syz_emit_ethernet(0x1, &(0x7f0000015e15)=ANY=[@ANYBLOB="00ff86dd6076605100303afffe8000000000000000000000000000ffff020000000000000000000000000013e5cbaa788014000860c5961e000000d0ff010000000000e40403000004000001ff020000000000000008000000000001"], 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000002ac0)={0x0, @in6={{0xa, 0x4e24, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x4}}}, &(0x7f0000002b80)=0x84) 2018/04/16 23:32:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd630108"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) 2018/04/16 23:32:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f0000791000)={0x10}, 0xc, &(0x7f0000dd0ff0)={&(0x7f0000d3dc98)={0x24, 0x13, 0xa, 0x1, 0x0, 0x0, {}, [@typed={0x8, 0x2, @pid}, @nested={0x8, 0x3, [@generic="ba"]}]}, 0x24}, 0x1}, 0x0) [ 97.300117] IPVS: ftp: loaded support on port[0] = 21 2018/04/16 23:32:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x143) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xa80, 0x4) sendto$inet(r0, &(0x7f0000000140)="b6", 0x1, 0x4000000, 0x0, 0x0) 2018/04/16 23:32:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000f7e000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/16 23:32:03 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000300)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@codepage={'codepage', 0x3d, '869'}, 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000000080)='./file0//i.e.\x00', 0x0) [ 97.359217] ISOFS: Unable to identify CD-ROM format. 2018/04/16 23:32:03 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000b4efab)="5500000018007fafb7a41cb22da280000206000000a843096c37236939000900210008004b00ca8a9848a3090000006b7b31afdc1338d54400009b84136ef75afb83de4411003ab8220000bf0cec6bab91d4000000", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 2018/04/16 23:32:03 executing program 0: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ip6tnl0\x00'}) [ 97.498317] ISOFS: Unable to identify CD-ROM format. 2018/04/16 23:32:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x143) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xa80, 0x4) sendto$inet(r0, &(0x7f0000000140)="b6", 0x1, 0x4000000, 0x0, 0x0) 2018/04/16 23:32:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000f7e000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/16 23:32:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000000000), &(0x7f0000000040)) 2018/04/16 23:32:04 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x1000) write$evdev(r0, &(0x7f0000037fe8)=[{{}, 0x1, 0x74, 0x2}, {{0x0, 0x2}}], 0x30) 2018/04/16 23:32:04 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000001000)={{0x0, 0x0, 0x0, 0x0, "a399e9c558720d8d1f6728f1c5f07531dc6150defaca6ebcaf1b8b8c36184c8f147be96ea31efbf49ca9b9d7"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "655397eb000000004bbdd330eaaa50c6a17a4cbe4cf9a27f671d171c4a2c50f288493829c1e0fe9468a5eb556554a2803b25502ef5bc450d5f58f38b16e1198d", &(0x7f0000b0bfb2)="446465762f736e642f636f6e74726f6c4323009cb55a60fb8d54423e20546bd33125000000000000fd03e22965bb699aabcb8311b779fbf5497252581e19688501001a7898bd7751951d53b93ab1", 0xf3}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000001000)={&(0x7f0000005000), 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, "8984041f02000000e10000000100000009007a7d000000000000047e000081d9"}}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)=""/250) 2018/04/16 23:32:04 executing program 0: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ip6tnl0\x00'}) 2018/04/16 23:32:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000f7e000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/16 23:32:04 executing program 6: r0 = socket$inet_sctp(0x2, 0x2000000000000001, 0x84) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180), 0xc) 2018/04/16 23:32:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x143) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xa80, 0x4) sendto$inet(r0, &(0x7f0000000140)="b6", 0x1, 0x4000000, 0x0, 0x0) 2018/04/16 23:32:04 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f000032c000)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x60000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000380)={'raw\x00'}, &(0x7f0000000280)=0x54) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) r5 = dup3(r1, r3, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0xaf4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79ec, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r4) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) r7 = socket$netlink(0x10, 0x3, 0x4000000000000010) bind$netlink(0xffffffffffffffff, &(0x7f00000f1000)={0x10, 0x0, 0x0, 0xa488d180}, 0xc) preadv(r0, &(0x7f00000004c0)=[{&(0x7f00000001c0)}, {&(0x7f00000002c0)=""/128, 0x80}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/181, 0xb5}], 0x4, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x80, 0x0) pipe(&(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netlink(r8, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$netlink(r7, 0x10e, 0x9, &(0x7f0000000080)=""/4, &(0x7f0000bea000)=0x363) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) ioctl$TIOCLINUX3(r8, 0x541c, &(0x7f0000002740)=0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) syz_emit_ethernet(0x1, &(0x7f0000015e15)=ANY=[@ANYBLOB="00ff86dd6076605100303afffe8000000000000000000000000000ffff020000000000000000000000000013e5cbaa788014000860c5961e000000d0ff010000000000e40403000004000001ff020000000000000008000000000001"], 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000002ac0)={0x0, @in6={{0xa, 0x4e24, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x4}}}, &(0x7f0000002b80)=0x84) 2018/04/16 23:32:04 executing program 6: r0 = syz_open_dev$mouse(&(0x7f0000000480)='/dev/input/mouse#\x00', 0x3, 0x10000) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f00000004c0)={0x7, [0x6, 0x9, 0xafc2, 0x36, 0x3, 0xd23, 0x2]}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000a4000)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x4000000002}, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000028fc8)={&(0x7f0000007ff4)={0x10}, 0xc, &(0x7f0000015ff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000002000ff0a00000000000000000a000000fffffe012100000051db91e9e2062017b704ebce6f8ebb0cc51abce6dde35f10d746e060eb533768e1d095f4885e25830ea3218ecf59fd9ea15658e869bb0ad8117b4f6af736fd514e9b54df7e7633ab1188edffb842693ea7ab76f3ed9438d2b34d835bc43babd7df013fdfc3b2db7d821bbe351f2317e2d1b345135bd9db1571f2e38c6d810235363e335017aa0b7110544d435647811e8bb4bdbff9b3a1a9e2515006024658b2e4e56c27f38978e7d4f734232264"], 0x1}, 0x1}, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x13, r1, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000500)) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x3c, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="066304400100000000634040030000000000000001000000000000000000000010000000000000000000000068000000000000001000000000000000"], 0x0, 0x0, &(0x7f0000000340)}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000700)={@mcast2={0xff, 0x2, [], 0x1}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x1, 0x0) 2018/04/16 23:32:04 executing program 0: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ip6tnl0\x00'}) [ 98.490904] IPVS: ftp: loaded support on port[0] = 21 2018/04/16 23:32:04 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00002ac000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000040)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)=""/142, &(0x7f00000003c0)=""/69, &(0x7f0000000140)=""/14}) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000640)=0x200000000) write$vnet(r0, &(0x7f0000000580)={0x1, {&(0x7f00000001c0)=""/219, 0x34c, &(0x7f0000000480)=""/98, 0x0, 0x2}}, 0x68) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000002c40)) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) 2018/04/16 23:32:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000003c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) 2018/04/16 23:32:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000f7e000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/16 23:32:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/16 23:32:06 executing program 0: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ip6tnl0\x00'}) 2018/04/16 23:32:06 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'ip6gretap0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x4a}}) 2018/04/16 23:32:06 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_cmd={0x23}}) 2018/04/16 23:32:06 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x1000) write$evdev(r0, &(0x7f0000037fe8)=[{{}, 0x1, 0x74, 0x2}, {{0x0, 0x2}}], 0x30) 2018/04/16 23:32:06 executing program 2: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)="2f2f66696c653002", &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000540)) [ 99.649738] overlayfs: missing 'lowerdir' [ 99.702856] overlayfs: missing 'lowerdir' 2018/04/16 23:32:07 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff600611818"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x100, 0xbb, &(0x7f0000000300)=""/187}, 0x48) 2018/04/16 23:32:07 executing program 0: r0 = socket(0x15, 0x80005, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'bcsf0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$sock_int(r0, 0x1, 0x35, &(0x7f0000000040)=0xfffffffffffffffd, 0x4) 2018/04/16 23:32:07 executing program 5: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000bd1000)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f00000a5ff0)={{0x0, r1}, {0x0, r1}}, &(0x7f000010bff0)) timerfd_gettime(r0, &(0x7f0000004c80)) 2018/04/16 23:32:07 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000014ff8)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x0, &(0x7f0000000080)) syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x38) 2018/04/16 23:32:07 executing program 2: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)="2f2f66696c653002", &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000540)) 2018/04/16 23:32:07 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(des3_ede-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079", 0x18) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000240)="52b7539a7572cde7694fb9d8e6ab4ad6136d7e", 0x13}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000d40)={&(0x7f0000000a40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/18, 0x12}], 0x1, &(0x7f0000000cc0)=""/97, 0x61}, 0x0) 2018/04/16 23:32:07 executing program 1: r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f00000000c0)="1f00000054000d00000000009059387c07ff1b0702000008000000070001ff", 0x1f) 2018/04/16 23:32:07 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f000008cff4)='/dev/rfkill\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00001b6ff4)) [ 100.663493] overlayfs: missing 'lowerdir' [ 100.665658] netlink: 7 bytes leftover after parsing attributes in process `syz-executor1'. [ 100.676218] PF_BRIDGE: br_mdb_parse() with unknown ifindex [ 100.683271] devpts: called with bogus options 2018/04/16 23:32:07 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x78}, 0x0, 0x0, r0, 0x0) dup2(r1, r0) 2018/04/16 23:32:07 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e17, 0x1, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080)="aa", &(0x7f0000000240)}, 0x20) 2018/04/16 23:32:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c09, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6df1733d7a8a242fd899e0633f5fcea8fb5a550ed80ebba4d909c7a124d8ac39add13dc93a80f22ff9fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aaba7a936009867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096bdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e6e599a5591e6c882e32e7ea6697b93d32112b2bc83d72a"}) 2018/04/16 23:32:07 executing program 2: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)="2f2f66696c653002", &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000540)) [ 100.706101] devpts: called with bogus options 2018/04/16 23:32:07 executing program 7: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) semget(0x2, 0x0, 0x8) 2018/04/16 23:32:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = eventfd(0x0) unshare(0x20000400) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) 2018/04/16 23:32:07 executing program 4: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00000d3fe8)) shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000000c0)=""/87) 2018/04/16 23:32:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0x401c5820, &(0x7f0000000080)={0x20000000000002e0, &(0x7f0000000040)}) 2018/04/16 23:32:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x6, 0x4, 0x9, 0x62}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fb4000)={r0, &(0x7f000035d000), &(0x7f0000000040), 0x3}, 0x20) 2018/04/16 23:32:07 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x78}, 0x0, 0x0, r0, 0x0) dup2(r1, r0) [ 100.840476] overlayfs: missing 'lowerdir' 2018/04/16 23:32:07 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0xc0bc5310, &(0x7f0000fbf000)={{}, 'port0\x00'}) 2018/04/16 23:32:07 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x3ff, &(0x7f0000ffd000/0x1000)=nil, 0x3) 2018/04/16 23:32:07 executing program 0: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000380)='xfs\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000080)={'nouuid,', {[{@rtdev={'rtdev', 0x3d, './file0'}, 0x2c}]}}) 2018/04/16 23:32:07 executing program 2: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)="2f2f66696c653002", &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000540)) 2018/04/16 23:32:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000340)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000280)={[{0x5e}]}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000003c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000440)={{0x0, 0x0, 0x100, 0x6a, 0x0, 0x0, 0x0, 0x8}, "", [[]]}, 0x120) 2018/04/16 23:32:07 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000340)={0x1, 0x0, [{0x20040000106}]}) 2018/04/16 23:32:07 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15, 0x0, @thr={&(0x7f0000000440), &(0x7f0000000540)}}, &(0x7f0000000200)) timer_getoverrun(0x0) 2018/04/16 23:32:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x2000000000000001, 0x84) connect$inet(r0, &(0x7f000005eff0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) listen(r0, 0x2) r1 = accept(r0, &(0x7f0000f06000)=@rc, &(0x7f00008f4000)=0xa) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), 0xfe8e) 2018/04/16 23:32:07 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x3ff, &(0x7f0000ffd000/0x1000)=nil, 0x3) 2018/04/16 23:32:07 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x78}, 0x0, 0x0, r0, 0x0) dup2(r1, r0) [ 101.108542] overlayfs: missing 'lowerdir' [ 101.156599] XFS (loop0): Invalid device [./file0], error=-6 2018/04/16 23:32:07 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x3ff, &(0x7f0000ffd000/0x1000)=nil, 0x3) 2018/04/16 23:32:07 executing program 0: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000380)='xfs\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000080)={'nouuid,', {[{@rtdev={'rtdev', 0x3d, './file0'}, 0x2c}]}}) 2018/04/16 23:32:07 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{}, 'port1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/16 23:32:07 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x78}, 0x0, 0x0, r0, 0x0) dup2(r1, r0) 2018/04/16 23:32:07 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 2018/04/16 23:32:07 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000811000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000000)) 2018/04/16 23:32:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000000240)={[{@check_strict='check=strict', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000200)='./file0//ile0\x00', 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) 2018/04/16 23:32:07 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x3ff, &(0x7f0000ffd000/0x1000)=nil, 0x3) 2018/04/16 23:32:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="400000000002000019000000dc0100002c000000010000000000000000000000002000000020000040000000000000003d5cbe5a0000ffff53ef7eae45e5bd0cfc0c22e9755b8992f4e158ac397bb7bce385353ee17a9e8e408d23e332ff6bb2c1ce2b136eb9", 0x66, 0x400}], 0x0, &(0x7f0000000080)={[{@norecovery='norecovery', 0x2c}, {@data_writeback='data=writeback', 0x2c}, {@prjquota='prjquota', 0x2c}, {@norecovery='norecovery', 0x2c}]}) 2018/04/16 23:32:07 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) [ 101.532471] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (132a0801) [ 101.596258] device bridge_slave_1 left promiscuous mode [ 101.596718] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (132a0801) [ 101.601854] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.654416] device bridge_slave_0 left promiscuous mode [ 101.660129] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.715554] team0 (unregistering): Port device team_slave_1 removed [ 101.727367] team0 (unregistering): Port device team_slave_0 removed [ 101.737553] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 101.756478] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 101.783756] bond0 (unregistering): Released all slaves 2018/04/16 23:32:08 executing program 0: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000380)='xfs\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000080)={'nouuid,', {[{@rtdev={'rtdev', 0x3d, './file0'}, 0x2c}]}}) 2018/04/16 23:32:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x2000000000000001, 0x84) connect$inet(r0, &(0x7f000005eff0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) listen(r0, 0x2) r1 = accept(r0, &(0x7f0000f06000)=@rc, &(0x7f00008f4000)=0xa) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), 0xfe8e) 2018/04/16 23:32:08 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000002280)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000080)={[0x38, 0x2c]}, 0x2) 2018/04/16 23:32:08 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open$dir(&(0x7f0000000880)='./file0/file1\x00', 0x10241, 0x0) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) renameat(r0, &(0x7f00000000c0)='./file1\x00', r0, &(0x7f0000000140)='./file0/file0\x00') renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', r0, &(0x7f00000001c0)='./file0/file1\x00', 0x4) 2018/04/16 23:32:08 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x12, &(0x7f0000000180), 0x0) 2018/04/16 23:32:08 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 2018/04/16 23:32:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x31, &(0x7f0000000000), 0x4) 2018/04/16 23:32:08 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{}, 'port1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/16 23:32:08 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{}, 'port1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/16 23:32:08 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="636bb2237ebf", [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x3, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x29, 0x0, @loopback={0x0, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, [], "802a08000000006b"}}}}}}}, 0x0) 2018/04/16 23:32:08 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open$dir(&(0x7f0000000880)='./file0/file1\x00', 0x10241, 0x0) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) renameat(r0, &(0x7f00000000c0)='./file1\x00', r0, &(0x7f0000000140)='./file0/file0\x00') renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', r0, &(0x7f00000001c0)='./file0/file1\x00', 0x4) 2018/04/16 23:32:08 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 2018/04/16 23:32:08 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0xefa000)=nil, 0xefa000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000080)=0x1e) 2018/04/16 23:32:08 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x1bd) 2018/04/16 23:32:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x101902) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x127f, 0x0) 2018/04/16 23:32:08 executing program 2: r0 = socket$inet(0x10, 0x40000000000003, 0x2000000000000c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000540)="24000000100007031dfffd946fa2830020200a0027000300001d85687f2000000400ff7e28000000020af598fbd6661d47aac4206eccef116f08c5815e72430006000000ffdfffff00000000", 0x4c}], 0x1}, 0x0) [ 102.570505] netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. [ 102.607300] IPVS: ftp: loaded support on port[0] = 21 [ 102.656860] netlink: 20 bytes leftover after parsing attributes in process `syz-executor2'. [ 103.288422] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.294869] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.301978] device bridge_slave_0 entered promiscuous mode [ 103.327915] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.334292] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.341526] device bridge_slave_1 entered promiscuous mode [ 103.364831] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 103.388499] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 103.465284] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 103.489834] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 103.582786] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 103.589922] team0: Port device team_slave_0 added [ 103.612077] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 103.619257] team0: Port device team_slave_1 added [ 103.640596] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 103.663940] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.687067] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 103.694142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.702126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 103.726545] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 103.733587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.741593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 103.934808] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.941183] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.947806] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.954152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.961422] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 104.416157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 104.679433] 8021q: adding VLAN 0 to HW filter on device bond0 [ 104.750616] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 104.820107] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 104.826249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 104.833808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 104.900568] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:32:11 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{}, 'port1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/16 23:32:11 executing program 0: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000380)='xfs\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000080)={'nouuid,', {[{@rtdev={'rtdev', 0x3d, './file0'}, 0x2c}]}}) 2018/04/16 23:32:11 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{}, 'port1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/16 23:32:11 executing program 5: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) readv(r2, &(0x7f0000001180)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) sendmmsg$unix(r2, &(0x7f00000bd000), 0x492, 0x0) close(r1) 2018/04/16 23:32:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x101902) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x127f, 0x0) 2018/04/16 23:32:11 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg(r0, &(0x7f00000055c0)=[{{0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=[{0x10, 0x84}], 0x10}}], 0x1, 0x0) 2018/04/16 23:32:11 executing program 1: r0 = socket$inet_sctp(0x2, 0x2000000000000001, 0x84) connect$inet(r0, &(0x7f000005eff0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) listen(r0, 0x2) r1 = accept(r0, &(0x7f0000f06000)=@rc, &(0x7f00008f4000)=0xa) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), 0xfe8e) 2018/04/16 23:32:11 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open$dir(&(0x7f0000000880)='./file0/file1\x00', 0x10241, 0x0) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) renameat(r0, &(0x7f00000000c0)='./file1\x00', r0, &(0x7f0000000140)='./file0/file0\x00') renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', r0, &(0x7f00000001c0)='./file0/file1\x00', 0x4) [ 105.313210] XFS (loop0): Invalid device [./file0], error=-6 2018/04/16 23:32:11 executing program 2: r0 = userfaultfd(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000072f000)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x800000}, 0x200000}) 2018/04/16 23:32:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x101902) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x127f, 0x0) 2018/04/16 23:32:11 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open$dir(&(0x7f0000000880)='./file0/file1\x00', 0x10241, 0x0) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) renameat(r0, &(0x7f00000000c0)='./file1\x00', r0, &(0x7f0000000140)='./file0/file0\x00') renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', r0, &(0x7f00000001c0)='./file0/file1\x00', 0x4) 2018/04/16 23:32:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x101902) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x127f, 0x0) 2018/04/16 23:32:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00005f5ffd)='io\x00') bind$alg(r0, &(0x7f0000466000)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000980000)={0x0, 0x0, &(0x7f000038f000)=[{&(0x7f0000c90f9a)="94", 0x1}], 0x1, &(0x7f00005f6000)}, 0x8081) sendfile(r2, r1, &(0x7f0000807000), 0x13f) 2018/04/16 23:32:12 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000237fee)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000a16000)=[{{}, 0x1, 0x47, 0x2}, {}], 0x30) 2018/04/16 23:32:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="de", 0x1}], 0x1, &(0x7f0000000380)}, 0x0) 2018/04/16 23:32:12 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000340)=@can={0x1d}, 0x80, &(0x7f00000004c0)}, 0x20000005) [ 105.639428] device bridge_slave_1 left promiscuous mode [ 105.645109] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.696530] device bridge_slave_0 left promiscuous mode [ 105.702242] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.801013] team0 (unregistering): Port device team_slave_1 removed [ 105.814766] team0 (unregistering): Port device team_slave_0 removed [ 105.827566] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 105.841520] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 105.872920] bond0 (unregistering): Released all slaves 2018/04/16 23:32:12 executing program 1: r0 = socket$inet_sctp(0x2, 0x2000000000000001, 0x84) connect$inet(r0, &(0x7f000005eff0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) listen(r0, 0x2) r1 = accept(r0, &(0x7f0000f06000)=@rc, &(0x7f00008f4000)=0xa) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), 0xfe8e) 2018/04/16 23:32:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4000000000084) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0), 0x0, &(0x7f000000ae80)}, 0x0) 2018/04/16 23:32:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000a98000)={0x80000000000edf2}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10004, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00000b1000/0x18000)=nil, &(0x7f000052c000)=[@text64={0x40, &(0x7f0000159000)="c4e379150e00470fc71b0f23d9b9360900000f32b9530b0000b80f000000ba000000000f30f20f35c421f81748f9460f2395c42251afeb4fdbf4", 0x3a}], 0x1, 0x0, &(0x7f00006edfe0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000280)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:32:12 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{}, 'port1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/16 23:32:12 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.depth\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0x9) 2018/04/16 23:32:12 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{}, 'port1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/16 23:32:12 executing program 6: clone(0x200, &(0x7f0000000040), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000280)) r0 = syz_open_procfs(0x0, &(0x7f000042cff4)='io\x00') pread64(r0, &(0x7f00009f3000), 0x352, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x27e, 0x0) 2018/04/16 23:32:12 executing program 3: mkdir(&(0x7f0000109282)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000216000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000ffb000)) creat(&(0x7f00000ec000)='./file0/bus\x00', 0xbc9cc8fbd81cb4b1) ftruncate(0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) r1 = dup(r0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2011, r1, 0x0) 2018/04/16 23:32:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f000013b000)=[{&(0x7f0000559f24)="580000001400192340834b80040d8c560206f8ff000400000000000000005800004824ca944f64009400050028825a003b7dbe907902008000f0fffefffffe03ed03fff5dd00000010000100000c0900fcff4d00040e05a5", 0x58}], 0x1) clock_gettime(0x5, &(0x7f0000000080)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) bind$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710, @hyper}, 0x10) recvmmsg(r0, &(0x7f0000005680)=[{{&(0x7f0000005240)=@pppol2tpv3in6, 0x80, &(0x7f0000005580), 0x0, &(0x7f00000055c0)=""/140, 0x8c}, 0x10001}], 0x1, 0x0, &(0x7f00000057c0)={0x0, 0x989680}) [ 106.649872] IPVS: ftp: loaded support on port[0] = 21 [ 107.255796] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.262192] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.269401] device bridge_slave_0 entered promiscuous mode [ 107.298593] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.305080] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.312332] device bridge_slave_1 entered promiscuous mode [ 107.338691] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 107.368283] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 107.493517] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 107.526771] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 107.550082] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 107.556893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.580006] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 107.586860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.646810] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 107.653861] team0: Port device team_slave_0 added [ 107.675448] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 107.682762] team0: Port device team_slave_1 added [ 107.704355] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.728399] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.752237] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 107.759270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.767584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.785503] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 107.792527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.800787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.994767] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.001136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.007765] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.014111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.021394] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 108.513881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 108.739698] 8021q: adding VLAN 0 to HW filter on device bond0 [ 108.809458] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 108.880099] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 108.886248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 108.893282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.966129] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:32:15 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f00000000c0)=0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000100)=""/139, 0x8b) r2 = syz_open_dev$dspn(&(0x7f0000af6ff6)='/dev/dsp#\x00', 0x1, 0x0) readv(r2, &(0x7f0000003fd0)=[{&(0x7f0000006f07)=""/249, 0xf9}], 0x1) ioctl$int_in(r2, 0x80000000005001, &(0x7f0000003ff8)) 2018/04/16 23:32:15 executing program 2: syz_emit_ethernet(0x368, &(0x7f0000000000)={@random="87f6fede71bd", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x11, 0xffffff80, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:32:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000001fc4)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) 2018/04/16 23:32:15 executing program 6: clone(0x200, &(0x7f0000000040), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000280)) r0 = syz_open_procfs(0x0, &(0x7f000042cff4)='io\x00') pread64(r0, &(0x7f00009f3000), 0x352, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x27e, 0x0) 2018/04/16 23:32:15 executing program 7: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000240)={[{@showexec='showexec', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f00000000c0)='./file0//ile0\x00', 0x0) 2018/04/16 23:32:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_xfrm(r0, &(0x7f0000000c40)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000800)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in=@multicast1=0xe0000001}, {@in6=@local={0xfe, 0x80, [], 0xaa}}, @in6=@loopback={0x0, 0x1}}}, 0xf0}, 0x1}, 0x0) 2018/04/16 23:32:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000140)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1c, 0x25}, [], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x431, &(0x7f0000000180)=""/195}, 0x48) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40c00, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vlan0\x00', 0x0}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6, @in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x4e20, 0x0, 0x4e24, 0x0, 0xa, 0x20, 0x80, 0x4, r1, r2}, {0x2, 0x205, 0x6, 0x1200000000000000, 0x4922e24a, 0x6, 0x2ac}, {0x1, 0x7, 0x1, 0x80}, 0x100000001}, {{@in=@loopback=0x7f000001, 0x4d3, 0xff}, 0x2, @in=@loopback=0x7f000001, 0x3507, 0x4, 0x1, 0x7fffffff, 0x3, 0x7, 0x1}}, 0xe8) 2018/04/16 23:32:15 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000000c0)={0x1ff, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x108) 2018/04/16 23:32:15 executing program 2: syz_emit_ethernet(0x368, &(0x7f0000000000)={@random="87f6fede71bd", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x11, 0xffffff80, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:32:15 executing program 4: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/16 23:32:15 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl$sock_ipx_SIOCAIPXPRISLT(r0, 0x89e1, &(0x7f0000000040)=0x5) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000340)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, &(0x7f00000003c0)=0x80) setrlimit(0xa, &(0x7f0000000180)={0x3d040cb, 0x5}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000240)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4e24, 0xec3, 0x4e21, 0x2, 0x2, 0x20, 0x80, 0x21, 0x0, r2}, {0x7fff, 0x5, 0x101, 0x6, 0x7fffffff, 0x6, 0x9, 0xffffffff7fffffff}, {0x5, 0x9, 0x1, 0xa7}, 0x100000000, 0x0, 0x1, 0x0, 0x2, 0x3}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4d3}, 0xa, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x3507, 0x7, 0x1, 0x0, 0x7, 0x3, 0x6}}, 0xe8) faccessat(r3, &(0x7f0000000100)='./file0\x00', 0x20, 0xa00) setreuid(r1, r2) keyctl$session_to_parent(0x12) 2018/04/16 23:32:15 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt(r0, 0x800000010f, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0xfffffffffffffe78) 2018/04/16 23:32:15 executing program 0: prctl$intptr(0x2a, 0x6) 2018/04/16 23:32:15 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes-fixed-time)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmsg$alg(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000180)="573259c0ffbe037b977da5109af1318a895cbf58f990ed8d26d85c8f74fb5cbb632baf6d637fee370f9c4d3d60e2520da3", 0x31}], 0x1, &(0x7f00000002c0), 0x0, 0x10}, 0x4008) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4}}}, 0x180, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/92, 0x23}, {&(0x7f0000001700)=""/4096, 0x1000}], 0x2, &(0x7f0000000400)=""/80, 0x50}, 0x0) 2018/04/16 23:32:16 executing program 2: syz_emit_ethernet(0x368, &(0x7f0000000000)={@random="87f6fede71bd", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x11, 0xffffff80, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:32:16 executing program 4: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000b000/0x3000)=nil, 0x3000, 0x5000, 0x3, &(0x7f0000004000/0x5000)=nil) remap_file_pages(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) [ 109.680539] mmap: syz-executor4 (9149) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/16 23:32:16 executing program 2: syz_emit_ethernet(0x368, &(0x7f0000000000)={@random="87f6fede71bd", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x11, 0xffffff80, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:32:16 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 2018/04/16 23:32:16 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f00000002c0)) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000240)="0f23af0f23760f01c90f01b50000bad00466b861fa561866ef0f22e066b8080000000f23d00f21f86635000000000f23f867f30f7040f430ba4200edb89d028ee8", 0x41}], 0x1, 0x0, &(0x7f0000000100), 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000200)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000400)="baf80c66b8f5e29b8266efbafc0cb04cee0f21a90f22570fe2a2880b230f0f009678002e0f01cbba4300ec0f01cf66b8c63554fa0f23c00f21f86635030006000f23f8", 0x43}], 0x1, 0x0, &(0x7f0000000480), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:32:16 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000002ef88)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0x0, 0x51, r0, 0x0) mincore(&(0x7f000002a000/0x6000)=nil, 0x6000, &(0x7f0000000100)=""/4) 2018/04/16 23:32:16 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x2, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000002ffc)=0xa0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1000006, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/04/16 23:32:16 executing program 6: clone(0x200, &(0x7f0000000040), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000280)) r0 = syz_open_procfs(0x0, &(0x7f000042cff4)='io\x00') pread64(r0, &(0x7f00009f3000), 0x352, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x27e, 0x0) 2018/04/16 23:32:16 executing program 5: r0 = socket(0x2, 0x1, 0x0) listen(r0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000)={0x77359400}, 0x10) accept4(r0, &(0x7f00002c0fec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00003bd000)=0x14, 0x0) shutdown(r0, 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, &(0x7f00000001c0)) tkill(r1, 0x1000000000013) 2018/04/16 23:32:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x14, 0x2000000000000027, 0x331, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 2018/04/16 23:32:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f0000000000)='v', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xc, &(0x7f0000000140)="c0", 0x1) 2018/04/16 23:32:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='oom_score\x00') sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 2018/04/16 23:32:17 executing program 4: sched_setattr(0x0, &(0x7f0000000080), 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)) lseek(r2, 0xfffffffffffffffc, 0x4) fcntl$addseals(r2, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000040)=0x8) r3 = dup2(r0, r1) write$sndseq(r3, &(0x7f0000000100), 0x0) 2018/04/16 23:32:17 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x217}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffca, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x4c, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x1c, 0x6f2000, 0x1, &(0x7f0000000000)) 2018/04/16 23:32:17 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) munmap(&(0x7f0000003000/0x1000)=nil, 0x1000) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000003000)=""/174) 2018/04/16 23:32:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21d}, 0xffffffffffffffeb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x29, 0x2d, &(0x7f0000000400)) 2018/04/16 23:32:17 executing program 3: getpid() r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@delsa={0x3c, 0x11, 0x1, 0x0, 0x0, {@in=@broadcast=0xffffffff, 0x0, 0x2}, [@srcaddr={0x14, 0xd, @in=@local={0xac, 0x14, 0x14, 0xaa}}]}, 0x3c}, 0x1}, 0x0) 2018/04/16 23:32:17 executing program 3: syz_emit_ethernet(0x140, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/16 23:32:17 executing program 4: sched_setattr(0x0, &(0x7f0000000080), 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)) lseek(r2, 0xfffffffffffffffc, 0x4) fcntl$addseals(r2, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000040)=0x8) r3 = dup2(r0, r1) write$sndseq(r3, &(0x7f0000000100), 0x0) 2018/04/16 23:32:17 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3}) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/1, 0x1}], 0x2000000000000021, 0x0) 2018/04/16 23:32:17 executing program 2: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)={0xaa}) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) pkey_mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000be4000/0x4000)=nil) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000dc1ff8)) mprotect(&(0x7f00002b1000/0xc00000)=nil, 0xc00000, 0x7) 2018/04/16 23:32:17 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000219ff0), &(0x7f0000048000), 0x0) 2018/04/16 23:32:17 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) munmap(&(0x7f0000003000/0x1000)=nil, 0x1000) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000003000)=""/174) 2018/04/16 23:32:17 executing program 0: r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x2) 2018/04/16 23:32:17 executing program 6: clone(0x200, &(0x7f0000000040), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000280)) r0 = syz_open_procfs(0x0, &(0x7f000042cff4)='io\x00') pread64(r0, &(0x7f00009f3000), 0x352, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x27e, 0x0) 2018/04/16 23:32:18 executing program 3: r0 = syz_open_dev$tun(&(0x7f000081fff3)='/dev/net/tun\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$setstatus(r1, 0x4, 0x2400) 2018/04/16 23:32:18 executing program 0: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000002) write$evdev(r0, &(0x7f000023cfd0)=[{{}, 0x200002, 0x100000001, 0x403}, {}], 0x30) 2018/04/16 23:32:18 executing program 7: mq_open(&(0x7f0000000100)='ip6tnl0\x00', 0x41, 0x0, &(0x7f0000000140)={0x0, 0x7, 0xffffffff}) 2018/04/16 23:32:18 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) munmap(&(0x7f0000003000/0x1000)=nil, 0x1000) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000003000)=""/174) 2018/04/16 23:32:18 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000005faa)={@random="ff3997ffcd00", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "c8fba2", 0x18, 0x40000000003a, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@mld={0xffffff8c, 0xd, 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}}}, 0x0) 2018/04/16 23:32:18 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000180)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14}, @remote={0xac, 0x14, 0x14, 0xbb}, {[@timestamp={0x44, 0x10, 0x7, 0x1, 0x0, [{}, {}, {}]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) 2018/04/16 23:32:18 executing program 7: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [0xff, 0xff], @rand_addr}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x20, 0x0, 0xfffffffffffffffd}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback=0x7f000001, 0x0, 0x1000000000002b}}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/16 23:32:18 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f7468726573686f6c6400bf7956050224b756c63bfc477378350232509b7b38b3adffa319e718e9db27a59ed4e8720bc4cdfb78", 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x6, 0x58800) write(r0, &(0x7f00000000c0)='\t8\t', 0x3) ioctl$TTUNGETFILTER(r1, 0x801054db, &(0x7f0000000140)=""/4096) 2018/04/16 23:32:18 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newroute={0x1c, 0x18, 0x721, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x4}}, 0x1c}, 0x1}, 0x0) 2018/04/16 23:32:18 executing program 6: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'teql0\x00'}) 2018/04/16 23:32:18 executing program 4: sched_setattr(0x0, &(0x7f0000000080), 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)) lseek(r2, 0xfffffffffffffffc, 0x4) fcntl$addseals(r2, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000040)=0x8) r3 = dup2(r0, r1) write$sndseq(r3, &(0x7f0000000100), 0x0) 2018/04/16 23:32:18 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) close(r1) syz_open_dev$tun(&(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=""/254, &(0x7f0000000140)=""/119, &(0x7f00000001c0)=""/150}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'dummy0\x00', 0x1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) 2018/04/16 23:32:18 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000651000)=""/240, &(0x7f0000ca5ffc)=0xf0) 2018/04/16 23:32:18 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000001000)={{0x0, 0x0, 0x0, 0x0, "a399e9c558720d8d1f6728f1c5f07531dc6150defaca6ebcaf1b8b8c36184c8f147be96ea31efbf49ca9b9d7"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "655397eb000000004bbdd330eaaa50c6a17a4cbe4cf9a27f671d171c4a2c50f288493829c1e0fe9468a5eb556554a2803b25502ef5bc450d5f58f38b16e1198d", &(0x7f0000b0bfb2)="446465762f736e642f636f6e74726f6c4323009cb55a60fb8d54423e20546bd33125000000000000fd03e22965bb699aabcb8311b779fbf5497252581e19688501001a7898bd7751951d53b93ab1", 0xfffffffffffffdb6}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000001000)={&(0x7f0000005000), 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, "8984041f02000000e10000000100000009007a7d000000000000047e000081d9"}}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)=""/250) 2018/04/16 23:32:18 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) munmap(&(0x7f0000003000/0x1000)=nil, 0x1000) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000003000)=""/174) 2018/04/16 23:32:18 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@nat={'nat\x00', 0x19, 0x4, 0x5d8, [0x20000040, 0x0, 0x0, 0x20000210, 0x20000448], 0x0, &(0x7f0000000000), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, [{{{0x13, 0x0, 0x0, 'ipddp0\x00', 'ip_vti0\x00', 'lo\x00', 'dummy0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:udev_rules_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0x0, 0x2, [{{{0x5, 0x0, 0x0, 'sit0\x00', 'bcsh0\x00', 'sit0\x00', 'ipddp0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x3, 0x0, 0x0, 'ip6tnl0\x00', 'ip_vti0\x00', 'ipddp0\x00', 'syzkaller0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0xf8, 0x130, 0x168, [@devgroup={'devgroup\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}]}, @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}}}}}]}, {0x0, '\x00', 0x3, 0x0, 0x1, [{{{0x5, 0x0, 0x0, 'nr0\x00', 'ifb0\x00', 'syz_tun\x00', 'ip_vti0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x138, 0x168, 0x1a0, [@ip6={'ip6\x00', 0x50, {{@dev={0xfe, 0x80}, @mcast2={0xff, 0x2, [], 0x1}}}}, @ipvs={'ipvs\x00', 0x28, {{@ipv6=@loopback={0x0, 0x1}}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @arpreply={'arpreply\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}}}}]}]}, 0x650) [ 112.542287] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain 2018/04/16 23:32:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f757000361a6f74a1b774b8642f3dfdd313d92946ff0167415d8dc22791dcd496520c1c99f4b07d3b2a11090000000229210b73abdcd2986fc290ac9b6ace278586d39949a54fb276eb1fd3964b0cad27e417b33abb8d3b00e64e75e4dff47de27536dccdde5fc746b04faafcec347560a31b3a35a5f20bc949d75cbb763987", 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000040), 0x1) 2018/04/16 23:32:19 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendmsg(r0, &(0x7f00000008c0)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000340)="a22c", 0x2}], 0x1, &(0x7f0000000700)}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/16 23:32:19 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x308, 0x6f2000, &(0x7f00000003c0)) 2018/04/16 23:32:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x0) r1 = dup(r0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$sock_bt(r1, 0x541b, &(0x7f0000000140)) 2018/04/16 23:32:19 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000651000)=""/240, &(0x7f0000ca5ffc)=0xf0) 2018/04/16 23:32:19 executing program 7: r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x200, 0x143101) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f0000000100), 0x8) write$rdma_cm(r0, &(0x7f0000000140)=@disconnect={0xa, 0x4, 0xfa00}, 0xc) 2018/04/16 23:32:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000180)="6e65742f6d6366696c74657236007711b65f48c17fa031e2c95938d0cc3a1c07ddf89a745b105a6b96ef285e898491b8") preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000100)=""/28, 0x1c}], 0x1, 0x10000054) 2018/04/16 23:32:19 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000017000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x40045436, 0x2) 2018/04/16 23:32:19 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendmsg(r0, &(0x7f00000008c0)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000340)="a22c", 0x2}], 0x1, &(0x7f0000000700)}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/16 23:32:19 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000651000)=""/240, &(0x7f0000ca5ffc)=0xf0) 2018/04/16 23:32:20 executing program 0: mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000044ff6)='./control\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x69, 0x21, r0, &(0x7f0000000080)='./control\x00') fanotify_mark(r1, 0x80, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)='./control\x00') 2018/04/16 23:32:20 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendmsg(r0, &(0x7f00000008c0)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000340)="a22c", 0x2}], 0x1, &(0x7f0000000700)}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/16 23:32:20 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000651000)=""/240, &(0x7f0000ca5ffc)=0xf0) 2018/04/16 23:32:20 executing program 7: io_setup(0x200, &(0x7f00000000c0)=0x0) r1 = creat(&(0x7f00001c0000)='./file0\x00', 0x0) io_submit(r0, 0x1, &(0x7f0000000100)=[&(0x7f0000928fc0)={0x0, 0x0, 0x8, 0x1, 0x0, r1, &(0x7f0000ddc000)}]) 2018/04/16 23:32:20 executing program 4: sched_setattr(0x0, &(0x7f0000000080), 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)) lseek(r2, 0xfffffffffffffffc, 0x4) fcntl$addseals(r2, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000040)=0x8) r3 = dup2(r0, r1) write$sndseq(r3, &(0x7f0000000100), 0x0) 2018/04/16 23:32:20 executing program 1: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={"62726f7574650500", 0x20, 0x2, 0x2f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'nr0\x00', 'teql0\x00', 'bcsf0\x00', 'rose0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xc0, 0xf0}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x1d, 0x0, 0x0, 'ip6gretap0\x00', 'gretap0\x00', 'eql\x00', 'bpq0\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x140}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x368) 2018/04/16 23:32:20 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x800) 2018/04/16 23:32:20 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'eql\x00', @ifru_settings={0x400000, 0x0, @sync}}) 2018/04/16 23:32:20 executing program 1: epoll_create1(0x0) socket$vsock_stream(0x28, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000080)="e4d3e1c298acb377f5cfa9226fcfa8b1ff3b905bbf514cfe8bc6fd4a3ac736677a3fcca9f3415b51fec8fb8cbd7af3835e614eced5f7b1356d25ebd4a1ebd9f5fee2e01aac532443a672621f6db21df6659e3f9906f99cc5a1cf6fb2df8a48fd0620ae908afb3ab55bd753396af97a90680240bbe7a6378116275684bae73d0aad5f01121903eb09ca6a7cfacf4b3dc4178d09bc39774569e07b5b97d90078d7d323a33f6d512a910b797da87da927f515c7d01f4a96155da206a9b0") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000002c0)) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x30}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r1}, 0x8) unshare(0x8000400) getpeername$ax25(r0, &(0x7f0000000140), &(0x7f0000000180)=0x10) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000280)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) 2018/04/16 23:32:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9d, 0xffff, 0x0, 0x0, 0x7, 0x5, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000100), 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r2, &(0x7f0000000200), &(0x7f0000000280)=""/250}, 0x18) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000013c0)=@ioapic={0x1, 0xfffffffffffffffb}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/16 23:32:20 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f000008cff4)='/dev/rfkill\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0xa000, r0, &(0x7f0000d56ff4)={0x30000001}) 2018/04/16 23:32:20 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendmsg(r0, &(0x7f00000008c0)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000340)="a22c", 0x2}], 0x1, &(0x7f0000000700)}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/16 23:32:20 executing program 7: r0 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x1000000000d1, &(0x7f00000000c0)=0x3, 0x4) setsockopt$inet_int(r0, 0x0, 0xcf, &(0x7f0000000000), 0x4) 2018/04/16 23:32:20 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff00ffe90009144a000ae9", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d4f000)=0x1000, 0x4) sendmsg$nl_xfrm(r0, &(0x7f0000a93000)={&(0x7f000035eff4)={0x10}, 0xc, &(0x7f0000265ff0)={&(0x7f0000ae7e18)=@delpolicy={0x50, 0x35, 0x323, 0x0, 0x0, {{@in6, @in6=@mcast2={0xff, 0x2, [], 0x1}}}}, 0x50}, 0x1}, 0x0) 2018/04/16 23:32:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 2018/04/16 23:32:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) pread64(r0, &(0x7f00000003c0)=""/8, 0xfdb4, 0x63) 2018/04/16 23:32:20 executing program 0: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)={[{@locktable={'locktable', 0x3d, "8a707070302b656d317365637572697479657468307365637572697479253176626f786e65743176626f786e6574317b73797374656d766d6e6574306264657673797374656d"}, 0x2c}]}) 2018/04/16 23:32:20 executing program 6: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000949fe8)={0xaa}) r1 = memfd_create(&(0x7f000003affa)="706f73fb00000000000000566f6573737b0000", 0x0) pwrite64(r1, &(0x7f0000000200)="ab", 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000000ff5)={&(0x7f0000011000/0x3000)=nil, 0x3000}) 2018/04/16 23:32:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) [ 114.226135] gfs2: not a GFS2 filesystem [ 114.264516] gfs2: not a GFS2 filesystem 2018/04/16 23:32:21 executing program 5: prctl$seccomp(0x2f, 0x0, &(0x7f0000000000)={0x1ffffffffffffe67, &(0x7f0000000080)}) 2018/04/16 23:32:21 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000040)={{0x3}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) 2018/04/16 23:32:21 executing program 7: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) bpf$MAP_CREATE(0x0, &(0x7f000027efd4)={0xf}, 0x2c) 2018/04/16 23:32:21 executing program 6: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) io_setup(0x469, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f00000016c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000080)}]) 2018/04/16 23:32:21 executing program 0: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)={[{@locktable={'locktable', 0x3d, "8a707070302b656d317365637572697479657468307365637572697479253176626f786e65743176626f786e6574317b73797374656d766d6e6574306264657673797374656d"}, 0x2c}]}) 2018/04/16 23:32:21 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0), 0x80000) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000180), 0x10) r1 = socket$inet(0x15, 0x5, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r1, &(0x7f0000000140)='M', 0x1, 0x0, &(0x7f0000000080)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 2018/04/16 23:32:21 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000cd8ff4)) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000007000)={0xffffffffc0000001}) epoll_wait(r4, &(0x7f0000000000)=[{}], 0x37, 0x0) epoll_wait(r4, &(0x7f0000cd8ff4)=[{}], 0x1, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2018/04/16 23:32:21 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl(r0, 0x800000080004539, &(0x7f0000a8d000)) [ 114.802655] gfs2: not a GFS2 filesystem 2018/04/16 23:32:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xe, 0x8000000000004, 0x4, 0x3}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x13, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) 2018/04/16 23:32:21 executing program 0: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)={[{@locktable={'locktable', 0x3d, "8a707070302b656d317365637572697479657468307365637572697479253176626f786e65743176626f786e6574317b73797374656d766d6e6574306264657673797374656d"}, 0x2c}]}) 2018/04/16 23:32:21 executing program 5: fcntl$getown(0xffffffffffffff9c, 0x9) r0 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040), 0x0) r3 = accept(r2, 0x0, &(0x7f0000000140)) sendmmsg$alg(r3, &(0x7f0000004040)=[{0x0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000001840)}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000100), &(0x7f0000000140)=0x4) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r4 = userfaultfd(0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x6, 0x0, 0x10, "1bc61cdb18444a543905bdd88d2b087d8667894e0b6c81e666fdbbd4ed2ac3ec0d2e63ca82c6f2d6971dce70abc37b56a74d5c7abd96a3c6440bb6a20316ff98", "d3ea1e65eda2991837defc8e3ed45791dfc945340b45f6581df75b9b196ecf205be0e2c0c61799cf76ed5fc5c4b6116ae769a1a05d36265cc7ec70c3fe352513", "e8d7750d0c22030119e9b433e2d1aa34eaac5742967447428fe0112c28a814bc", [0x2, 0x5]}) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000480)={0xaa}) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') rmdir(&(0x7f000015dff6)='./control\x00') mount(&(0x7f00000003c0)='./control\x00', &(0x7f0000000400)='./control\x00', &(0x7f0000000440)='tmpfs\x00', 0x0, 0x0) close(r4) getsockname$packet(r3, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000009c0)=0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000a00)={@local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001, r6}, 0xc) ioctl$KVM_SET_VAPIC_ADDR(r5, 0x4008ae93, &(0x7f00000004c0)=0x3000) syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x20000) rename(&(0x7f0000000340)='./control\x00', &(0x7f0000000380)='./control/file0\x00') 2018/04/16 23:32:21 executing program 6: syz_emit_ethernet(0x3a, &(0x7f00000a8fa2)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast=0xffffffff, {[@timestamp={0x44, 0x4, 0x9, 0x0, 0x88ffffff}]}}, @icmp=@timestamp={0xd}}}}}, &(0x7f0000387000)) 2018/04/16 23:32:21 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x16}, 'bridge0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}) 2018/04/16 23:32:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000002ff0)=@ioapic) [ 114.950153] gfs2: not a GFS2 filesystem 2018/04/16 23:32:21 executing program 7: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={[{@integrity='integrity', 0x2c}]}) 2018/04/16 23:32:21 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009f}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x6f2000, 0x1, &(0x7f0000000080)) 2018/04/16 23:32:21 executing program 0: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)={[{@locktable={'locktable', 0x3d, "8a707070302b656d317365637572697479657468307365637572697479253176626f786e65743176626f786e6574317b73797374656d766d6e6574306264657673797374656d"}, 0x2c}]}) 2018/04/16 23:32:21 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f7468726573686f6c6400bf7956050224b756c63bfc477378350232509b7b38b3adffa319e718e9db27a59ed4e8720bc4cdfb78", 0x2, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r2) write(r0, &(0x7f00000000c0), 0x0) 2018/04/16 23:32:21 executing program 2: mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000044ff6)='./control\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x11, 0x40000002, r0, &(0x7f0000000000)='./control\x00') readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/236, 0x17}], 0x1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x1, 0x0, 0x4000003) [ 115.140132] gfs2: not a GFS2 filesystem 2018/04/16 23:32:21 executing program 7: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={[{@integrity='integrity', 0x2c}]}) 2018/04/16 23:32:21 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000400), &(0x7f00000042c0)=0x3) 2018/04/16 23:32:22 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(r0, 0x401c5820, &(0x7f0000000300)={0x0, &(0x7f0000000340)}) 2018/04/16 23:32:22 executing program 0: r0 = socket$inet(0x2, 0x801, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000001240)={'syz_tun\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 2018/04/16 23:32:22 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) sendto$ipx(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, &(0x7f0000000140)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x2}, 0x20) 2018/04/16 23:32:22 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x11}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d5affc), 0x4) write(r0, &(0x7f00000002c0)="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", 0x5f5) write(r0, &(0x7f000069efac)="e26d4afed4d3467b7ee66e9ebb4039955b1d97a427cc701c5e5e6447b6510bff58c6313283eae8186bf1c22f39347ebb869277e809a7002f38611d02a6e3d4e4f6b8923c59ff9438d8c3d353b76131b90e044f80", 0x54) r1 = dup(r0) write$eventfd(r1, &(0x7f0000000280), 0xff93) recvfrom(r0, &(0x7f0000000180)=""/226, 0xfffffffffffffc82, 0x0, 0x0, 0xfffffffffffffcd1) write$eventfd(r1, &(0x7f0000000bc0), 0x8) 2018/04/16 23:32:22 executing program 1: r0 = memfd_create(&(0x7f0000000000), 0x2) pwrite64(r0, &(0x7f0000000000)="b924", 0x2, 0x0) fcntl$addseals(r0, 0x409, 0x4) fallocate(r0, 0x0, 0x0, 0x2) 2018/04/16 23:32:22 executing program 7: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={[{@integrity='integrity', 0x2c}]}) 2018/04/16 23:32:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4106(gcm_base(ctr(aes-aesni),ghash-generic)))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 2018/04/16 23:32:22 executing program 3: syz_emit_ethernet(0x12f, &(0x7f0000000200)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv6={0x86dd, {0x0, 0x6, "6fde7c", 0xf9, 0x88, 0x0, @empty, @local={0xfe, 0x80, [], 0xaa}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [], "ff51b8722398bb5ac8b770e89544654b1c298dca33d4eaa86a1cee809def3f9cea1d13cf4d6b2012eaf4"}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558, 0x0, "353dba4f4731368ba0272042448db0c183f52a1dc086e6906b5e0cf483fe6aa8e3dee2a128ec3154161dec2b5a5cc874918691fcc6be13814a11a17af9ccd70741437b953eb807b9845bd3de4cfe0159854fd1e227ab12da4596a436a35e8b171101b6d2c76569801968eedc8420f5fb00c5a00cc7329d65ba05e025605f5f0919b9ca493e3de4178cf630"}}}}}}}, 0x0) 2018/04/16 23:32:22 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, &(0x7f0000000400), 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000440)='pkcs7_test\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffe) 2018/04/16 23:32:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2, 0x25}, [], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/16 23:32:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae8c861b"], 0x5) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000010000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f0000000100)="0f09c744240000380000c74424028f000000c7442406000000000f0114240f9a9f00800000670f209a642e3e0f01f7670f080fc7aeb2440000660f388153940f30ad", 0x42}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000240)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/16 23:32:22 executing program 7: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={[{@integrity='integrity', 0x2c}]}) 2018/04/16 23:32:22 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(r0, 0x401c5820, &(0x7f0000000300)={0x0, &(0x7f0000000340)}) 2018/04/16 23:32:22 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3e, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/16 23:32:22 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f00000008c0)) 2018/04/16 23:32:22 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x11}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d5affc), 0x4) write(r0, &(0x7f00000002c0)="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", 0x5f5) write(r0, &(0x7f000069efac)="e26d4afed4d3467b7ee66e9ebb4039955b1d97a427cc701c5e5e6447b6510bff58c6313283eae8186bf1c22f39347ebb869277e809a7002f38611d02a6e3d4e4f6b8923c59ff9438d8c3d353b76131b90e044f80", 0x54) r1 = dup(r0) write$eventfd(r1, &(0x7f0000000280), 0xff93) recvfrom(r0, &(0x7f0000000180)=""/226, 0xfffffffffffffc82, 0x0, 0x0, 0xfffffffffffffcd1) write$eventfd(r1, &(0x7f0000000bc0), 0x8) 2018/04/16 23:32:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xe, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x41, 0xc3, &(0x7f0000000300)=""/195}, 0x316) 2018/04/16 23:32:22 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000012000)=0x6, 0x4) sendto$inet6(r0, &(0x7f0000003fd9), 0x2ab, 0x0, &(0x7f0000008000)={0xa, 0x0, 0xf, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/16 23:32:22 executing program 2: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)="4ec8c7d7", 0x4) lseek(r0, 0xfffffffffffffffe, 0x4) 2018/04/16 23:32:22 executing program 7: clone(0x0, &(0x7f0000000000), &(0x7f0000000ffc), &(0x7f0000000ffc), &(0x7f0000000000)) 2018/04/16 23:32:22 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000002000)}) 2018/04/16 23:32:22 executing program 0: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000180)="16f91220a8c7a61a85492a000000000000000000", 0x14) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000040)) 2018/04/16 23:32:22 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f00000008c0)) 2018/04/16 23:32:22 executing program 3: perf_event_open(&(0x7f0000220000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dc0000)=[{&(0x7f000094a000)=""/4096, 0x1224}], 0x1) dup2(r0, r1) 2018/04/16 23:32:22 executing program 4: clock_gettime(0x0, &(0x7f0000949ff0)={0x0, 0x0}) setitimer(0x2, &(0x7f0000dc3fe0)={{0x77359400}, {0x0, r0/1000+30000}}, &(0x7f0000b1bfe0)) setitimer(0x2, &(0x7f00000e9000), &(0x7f0000281000)) 2018/04/16 23:32:22 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(r0, 0x401c5820, &(0x7f0000000300)={0x0, &(0x7f0000000340)}) [ 116.530103] binder_alloc: 9615: binder_alloc_buf, no vma [ 116.535747] binder: 9615:9617 transaction failed 29189/-3, size 0-0 line 2963 2018/04/16 23:32:23 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x11}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d5affc), 0x4) write(r0, &(0x7f00000002c0)="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", 0x5f5) write(r0, &(0x7f000069efac)="e26d4afed4d3467b7ee66e9ebb4039955b1d97a427cc701c5e5e6447b6510bff58c6313283eae8186bf1c22f39347ebb869277e809a7002f38611d02a6e3d4e4f6b8923c59ff9438d8c3d353b76131b90e044f80", 0x54) r1 = dup(r0) write$eventfd(r1, &(0x7f0000000280), 0xff93) recvfrom(r0, &(0x7f0000000180)=""/226, 0xfffffffffffffc82, 0x0, 0x0, 0xfffffffffffffcd1) write$eventfd(r1, &(0x7f0000000bc0), 0x8) 2018/04/16 23:32:23 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f00000008c0)) [ 116.619385] binder: BINDER_SET_CONTEXT_MGR already set 2018/04/16 23:32:23 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, &(0x7f0000003d80)=[{&(0x7f0000006000)="8266747247c1a4743aea29f4fde3df0295827c6a4966f9858d0233beaad9d397", 0x20}], 0x1, &(0x7f0000009000)}}], 0x1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) mmap$binder(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000260000)}) 2018/04/16 23:32:23 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(r0, 0x401c5820, &(0x7f0000000300)={0x0, &(0x7f0000000340)}) [ 116.676751] binder: 9615:9632 ioctl 40046207 0 returned -16 2018/04/16 23:32:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=@mpls_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0x1c, 0x14, 0x20}}, 0x1c}, 0x1}, 0x0) [ 116.753784] binder: BINDER_SET_CONTEXT_MGR already set [ 116.765275] binder: undelivered TRANSACTION_ERROR: 29189 2018/04/16 23:32:23 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)='j', 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00007daff4)={0x0, 0x0, 0x80000000020}, 0xc) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000580)="ff", 0x1}], 0x1) getsockname(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80) writev(r0, &(0x7f0000000200)=[{&(0x7f0000002c00)="f8", 0x1}], 0x1) shutdown(r0, 0x1) dup2(r1, r0) 2018/04/16 23:32:23 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f00000008c0)) [ 116.801125] binder: 9643:9645 ioctl 40046207 0 returned -16 2018/04/16 23:32:23 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)="6265740e268c425fe2efc7d4") ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)=0x801) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000000c0)={{0xffffffffffffffff}}) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="2f65786500000000000409004bddd9de91be10eebf000ee9a9d50f1e8600000854fa07424adee93707da75af1f0200f5cd26d7a0d2ef6ae0d178621cffc0a87164000000e39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, &(0x7f0000000040)}) 2018/04/16 23:32:23 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x11}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d5affc), 0x4) write(r0, &(0x7f00000002c0)="a5c0d294e10af640a5d4c3ab7a67bd9724e29156f75ddd6bfe53bc50ba3ef9085c6c52cd0e2a6fddd326ec364494acc24ad3e8bf9c690e919681896f4c09a387a36b8c063ef78ddb4306eae01ed10e740d68aa5c7a92939c1fd5a19c5dd3860f7d4de1fd24088df73b72b416a7450caff19dd2779519577c9cf87149c3258dcd9dd2d0bc7e05ea8fa2a678851e021578e71db2b3ab4a0ad6f194332242cec9673d388ec0501720f92b15c3267bd4e3fc700a7a8028a9b7f1969d5aa719debb8b16df77b2cbee45dd90bef410563ce182e355495154e9585d087bda16a9dd02a231354df99325dc3f051dc3dc77efe569211d22fe39faed990263c5db984e1232afe53c71e30146f358cb4c0a202a1964f5387a5d8e6233b0038e30d376a1e80e12137be7733c716144faa53085c731e21009be9339dbb69c4c97580b753db5e6a9af646e3f2bf08cbe13b7a79f44f96a708134207c6b0e5085de94a0c73f29a4352e1b588e6bbc5eaa4a9c4f6fff95bf721972fd36a75d2b91456c192874a98ce1393d19f917b59e7d976549fd1fc7f10b379edbea0aff66de013e9dd762e2f04d7697f49415c1e6ddcdb8ffe3d2fbf064757275e19174f039158edd14a13938af8a908c31d18766373b4f30ac5758494a6a178b5cdead94563120ba65a0a6cef66caeaf7c2681a9c374f1e280b513669559774994ce05832994762465ca5fc39d71b8a0bc8495fc7898f6f80ee4e3850ece618007b5b548f5ea69e2ce4fb27055f1248b100ac1f45dc475963e1e7aff05e49795ed973a27d91aa4703066c6503a216e5d7b5401d5757ba639cf811b4b48b1504457e2db669dc3e51b567a5b9f2b4315162a72abb324488a0f0784d74d86c68413b56bd7bab1679a578d6907f12cc4e68027a68430517d7bb1add436f45fcaf8d98208a84b200606b153a0a76a5d98fc9e4caea6c01bb13ddcd378e6426cc9e15c6fe6d7f058f7d2128728b2e1bc7f6a16d36ae1793d4672977e6e88af63ee2c352221512bd5810225a5884e235fa88512563a25f51b1a269590466d503acfb63fbc7a188eeba92059fa86fc733ef69633b0491d509f2319c760b5c83099ecbbf2f949c7d0ce17f2e14a73752b9ad23f0fd7ca70f96485812d6f4c924507eafbc01eafd295c69f4379746967c97038db1f7440c0ab3553de2bbbcad63f459df71b5f16cfe86e5d20a75769ee04383b573e88e1b4cb30842234469ed63331e9cd05466fdf51d8a5a1a4785e23af42541c01b1f092e96102adf74f27cd1cb457981f1ebe4b18faea58205cde42d0c8aa89f0ef62bae0a3a6f64d0b17ec92b8b948e1c86b21006aa99c988a0c1e744f607d43865c2c58ceda1568295392af43a93edc9a19f4cf5f9b0a84b60e8dd15f0754aaccad00010000fc3c5b27cbbbc4f182321d2c312cbaf611a08fad4c51786c8ea19f6b6504829eb56fbc6cd940f6f67a06ac3982c51199fb58d4a5014628cad0943382765b5ea323b2d1daac67e903ec672f13ba637c11dd0b1ce0e97627a46060c47ec802754ebf9ff6122a3d611a5bd587a65604ac9c73f9c04dffd4bcc25de6bfd96c5a27fddc2bed65669c2f3466236b67c29a920529e9fbe6cc1e9acb9c55f9e03442fd30b1af3a528074b8eb5a1f2bef98cef8989a8f894fa63658c8c886e50f863a6847d3755db4b84c6fe358720aae0291f407901be0d9312a44f4032052ec365a02a8e32cf395ecb4ab10712e73e611d2a28805cc55fe38c3c6af5b431d59551879306b4fc30deb977081b529e1c00cfd5dec1e04e5a748d1c1754523d98889c96997c98987d2191533d5db74798fc45cd79525dd219d2858ab0cc9e4e72576c938a8176ae08408f0725eedf2e55e57f85d8449ac00f53954ecfb5a268d242ed58a11a224786d1bb82d6661db0104000023ce49459c6a5021d394cba4f2d846791e74fd28c1f1e7ec90aebca7ae8fa8844c084850a018ff39db3f0b309364cc481bbf74767c40edb61a5ae94c278ea6d38676a51a1703c2b94fd75f9ae0d725ecad24536565c994442e7428df55cd7de35a109f3c6361edf4a3ae6c3a26d5de87b4284d2ef2140b1bf84a3a73ffa3c5dcfba621414fa2d741d0acc261c05d47138099d82d9971b38f5be6ce1a8f", 0x5f5) write(r0, &(0x7f000069efac)="e26d4afed4d3467b7ee66e9ebb4039955b1d97a427cc701c5e5e6447b6510bff58c6313283eae8186bf1c22f39347ebb869277e809a7002f38611d02a6e3d4e4f6b8923c59ff9438d8c3d353b76131b90e044f80", 0x54) r1 = dup(r0) write$eventfd(r1, &(0x7f0000000280), 0xff93) recvfrom(r0, &(0x7f0000000180)=""/226, 0xfffffffffffffc82, 0x0, 0x0, 0xfffffffffffffcd1) write$eventfd(r1, &(0x7f0000000bc0), 0x8) [ 116.848728] binder: 9643:9645 transaction failed 29189/-22, size 0-8405055317187257986 line 2848 2018/04/16 23:32:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000791000)={0x10}, 0xc, &(0x7f0000dd0ff0)={&(0x7f0000d3dc98)={0x1c, 0x15, 0xa, 0x1, 0x0, 0x0, {}, [@typed={0x8, 0x2, @pid}]}, 0x1c}, 0x1}, 0x0) [ 116.937924] binder_alloc: 9643: binder_alloc_buf, no vma [ 116.943502] binder: 9643:9659 transaction failed 29189/-3, size 0-8405055317187257986 line 2963 2018/04/16 23:32:23 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x14, 0x2000000000000027, 0x331, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) [ 117.090321] binder: undelivered TRANSACTION_ERROR: 29189 [ 117.096893] binder: undelivered TRANSACTION_ERROR: 29189 2018/04/16 23:32:23 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000480)={0x28, 0x0, 0x0, @host=0x2}, 0x10) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000480)=ANY=[]) fallocate(r0, 0x3, 0x0, 0x6) 2018/04/16 23:32:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000939f01)='net/ip_vs\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/179, 0xb3}], 0x1, 0x0) 2018/04/16 23:32:23 executing program 2: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00002c3000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) poll(&(0x7f0000000040)=[{r1, 0x41}], 0x1, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 2018/04/16 23:32:23 executing program 7: seccomp(0x200000001, 0x2, &(0x7f0000016000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffff7ff00000}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) 2018/04/16 23:32:23 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) write(r0, &(0x7f00000001c0)='0x2', 0x3) 2018/04/16 23:32:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000aac000)={0xa, 0x2}, 0x1c) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f0000000000)=0x58, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0xc000) shutdown(r0, 0x1) 2018/04/16 23:32:23 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='personality\x00') exit(0x0) pread64(r0, &(0x7f0000000040)=""/114, 0x72, 0x4) 2018/04/16 23:32:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000080)=""/140}, 0x336) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000300)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) [ 117.406113] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 117.436784] audit: type=1326 audit(1523921543.852:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9685 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x7ff00000 2018/04/16 23:32:23 executing program 4: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000540)=0x3, 0x4) sendto$inet(r0, &(0x7f0000000000)="ea", 0x1, 0x0, &(0x7f0000e68000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/16 23:32:23 executing program 1: unshare(0x40600) pipe(&(0x7f0000e2aff8)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r0, 0x2) 2018/04/16 23:32:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000939f01)='net/ip_vs\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/179, 0xb3}], 0x1, 0x0) [ 117.472791] audit: type=1326 audit(1523921543.882:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9685 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=72 compat=0 ip=0x455329 code=0x7ff00000 [ 117.492898] audit: type=1326 audit(1523921543.882:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9685 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x7ff00000 2018/04/16 23:32:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000939f01)='net/ip_vs\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/179, 0xb3}], 0x1, 0x0) 2018/04/16 23:32:23 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000900)={[{@type={'type', 0x3d, "d7a02cac"}, 0x2c}]}) [ 117.512809] audit: type=1326 audit(1523921543.882:6): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9685 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x7ff00000 [ 117.532646] audit: type=1326 audit(1523921543.882:7): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9685 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x7ff00000 [ 117.552456] audit: type=1326 audit(1523921543.882:8): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9685 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x7ff00000 2018/04/16 23:32:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000939f01)='net/ip_vs\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/179, 0xb3}], 0x1, 0x0) [ 117.572267] audit: type=1326 audit(1523921543.883:9): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9685 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x7ff00000 [ 117.592084] audit: type=1326 audit(1523921543.883:10): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9685 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x7ff00000 2018/04/16 23:32:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x396, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) read(r0, &(0x7f0000000080)=""/218, 0xda) recvfrom$inet(r0, &(0x7f0000000200)=""/160, 0xa0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0xff8e) writev(r0, &(0x7f0000df9000)=[{&(0x7f0000354ff8)='\'', 0x1}], 0x1) [ 117.611991] audit: type=1326 audit(1523921543.883:11): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9685 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x7ff00000 [ 117.632074] audit: type=1326 audit(1523921543.883:12): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9685 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x7ff00000 [ 117.674908] hfsplus: type requires a 4 character value [ 117.680364] hfsplus: unable to parse mount options [ 117.747549] hfsplus: type requires a 4 character value [ 117.752953] hfsplus: unable to parse mount options [ 117.881315] device bridge_slave_1 left promiscuous mode [ 117.886906] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.898743] device bridge_slave_0 left promiscuous mode [ 117.904318] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.939340] team0 (unregistering): Port device team_slave_1 removed [ 117.949911] team0 (unregistering): Port device team_slave_0 removed [ 117.962114] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 117.978735] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 118.004359] bond0 (unregistering): Released all slaves 2018/04/16 23:32:24 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f000090cfed)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)=""/250) 2018/04/16 23:32:24 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r0) keyctl$set_timeout(0x17, r0, 0x0) 2018/04/16 23:32:24 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f0000006fc8)={&(0x7f000000dff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000010000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000009000)=""/171, 0xab}, &(0x7f000000d000)=[{&(0x7f0000010000)=""/3, 0x3}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f000000eff8)=""/8, 0x8}, &(0x7f0000005000)=[{&(0x7f000000c000)=""/162, 0xa2}], 0x1}}], 0x90}, 0x0) 2018/04/16 23:32:24 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x3a, 0x800000001}, &(0x7f0000000080)=0xfffffffffffffec1) bind$alg(r0, &(0x7f000001f000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x2a4) 2018/04/16 23:32:24 executing program 6: r0 = socket$inet(0x15, 0x400000080005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000001480), 0x0, 0x4000000, &(0x7f0000001500)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/16 23:32:24 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000900)={[{@type={'type', 0x3d, "d7a02cac"}, 0x2c}]}) 2018/04/16 23:32:24 executing program 2: r0 = socket(0x10000000000010, 0x3, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=@upd={0xe0, 0x12, 0x256aba9199da7c4b, 0x0, 0x0, {{'rfc4106(pcrypt(authencesn(vmac(twofish),chacha20-simd)))\x00'}}}, 0xe0}, 0x1}, 0x0) 2018/04/16 23:32:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@codepage={'codepage', 0x3d, '866'}, 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f00000000c0)='./file0//ile0\x00', 0x0) creat(&(0x7f0000000080)="2e2f66696c65302f2f696c6530f0", 0x0) 2018/04/16 23:32:25 executing program 6: r0 = add_key$keyring(&(0x7f00000bfff8)='keyring\x00', &(0x7f0000ba9ffb)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x4210004) keyctl$revoke(0x3, r0) [ 118.557719] netlink: 192 bytes leftover after parsing attributes in process `syz-executor2'. [ 118.575443] hfsplus: type requires a 4 character value [ 118.580800] hfsplus: unable to parse mount options 2018/04/16 23:32:25 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000900)={[{@type={'type', 0x3d, "d7a02cac"}, 0x2c}]}) 2018/04/16 23:32:25 executing program 2: ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x7) [ 118.759714] hfsplus: type requires a 4 character value [ 118.765108] hfsplus: unable to parse mount options [ 120.152714] IPVS: ftp: loaded support on port[0] = 21 [ 120.461976] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.468380] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.475467] device bridge_slave_0 entered promiscuous mode [ 120.497776] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.504127] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.511133] device bridge_slave_1 entered promiscuous mode [ 120.532703] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 120.554810] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 120.615709] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 120.640420] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 120.733208] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 120.740656] team0: Port device team_slave_0 added [ 120.762280] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 120.769573] team0: Port device team_slave_1 added [ 120.790867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 120.814858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 120.838639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 120.861726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 121.059073] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.065437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.072098] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.078453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.789105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.858913] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 121.929197] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 121.935325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 121.942480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.017440] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/16 23:32:28 executing program 5: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000b9c000)) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) 2018/04/16 23:32:28 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x10000000000003e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x22002) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/raw6\x00') ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000180), &(0x7f00000001c0), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x100) 2018/04/16 23:32:28 executing program 1: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) quotactl(0xb5b, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f0000000200)) 2018/04/16 23:32:28 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000340)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffff}, 0x13f}}, 0x314) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r2, &(0x7f00000000c0)=@migrate_id={0x12, 0x0, 0xfa00, {&(0x7f0000000080), r1, r0}}, 0xfdba) 2018/04/16 23:32:28 executing program 7: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0xffffffffffffffe8) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x6, 0x4) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/143, &(0x7f00000000c0)=0x1c7) sendto$inet6(r0, &(0x7f00000000c0), 0xfead, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/16 23:32:28 executing program 6: r0 = socket(0x1e, 0x2000000000000005, 0x0) listen$netrom(r0, 0x0) connect$ax25(r0, &(0x7f00001c1ff0)={0x1e, {"03491f0800"}}, 0x10) 2018/04/16 23:32:28 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000900)={[{@type={'type', 0x3d, "d7a02cac"}, 0x2c}]}) 2018/04/16 23:32:28 executing program 2: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) 2018/04/16 23:32:28 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b3fdc)) rt_sigtimedwait(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x77359400}, 0x8) write(r0, &(0x7f0000000080), 0xfffffe99) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5412, &(0x7f0000000100)) 2018/04/16 23:32:28 executing program 1: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) quotactl(0xb5b, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f0000000200)) 2018/04/16 23:32:28 executing program 2: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) quotactl(0xb5b, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f0000000200)) [ 122.487435] hfsplus: type requires a 4 character value [ 122.492811] hfsplus: unable to parse mount options 2018/04/16 23:32:28 executing program 0: r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='./control\x00', 0x22000000) inotify_rm_watch(r0, r1) mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) inotify_add_watch(r0, &(0x7f000003a000)='./control\x00', 0x80000d50) r2 = open(&(0x7f0000000580)='./control\x00', 0x420000, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004880)={0x0, @loopback}, &(0x7f00000048c0)=0xc) sendto$packet(r2, &(0x7f00000005c0)="6b1bdc46f761236cec0d49fa2c8efe1a56336df31ee4cb2075b51fa5e71c0de11779e87ddfaddd9db2ade6ce4f36842c1915a5e507f4aa498b2347fd843bc2c3530ad57be55daa0c20f3b7c355d6e53560e677f7bf4e25bfa6a2c3d444c0cb9d99ed67131dffd1d9b9d23ba71f2bbe8de66145d32670ed87eb36d71a9bf3b134f71f461cbee0459486fb198341f7ff096359a1e821586e0a7736dd725054eaea655affbaba3c0fdcffa35d885b70b05d2579805ad2e3e57ab49994ea176cc44b25d4da4e1b", 0xc5, 0x4c854, &(0x7f0000004900)={0x11, 0xfd, r3, 0x1, 0x6, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./control\x00', 0x0) r4 = inotify_init() r5 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r5, &(0x7f0000018000)={&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x0, @loopback={0x0, 0x7}}, 0x4c, &(0x7f0000000580), 0x0, &(0x7f00000004c0)}, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000b3a000)='./control\x00', 0x4000800) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000100)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000003004000000000000180100000000000048030000480300004803000004000000", @ANYBLOB="e00000020000000000000000ff000000000000000000000000000000000000000000000000000000ff0000ff000000000000000000000000000000000000000000000000000000000000000000000000ffffff00ffff000000000000000000000000000500dd000000020000697036746e6c300000000000000000006970366772657461703000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000260100000000000000000000f000180100000000000000000000000000000000000000000000000000002800434f4e4e5345434d41524b000000000000000000000000000000000000000100000000000000ac1414bbffffffffffffffff0000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffff0000ff0000000000000000000002000001004000000000fff97465716c300000000000000000000000626f6e6430000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f000180100000000000000000000000000000000000000000000000000002800434f4e4e5345434d41524b0000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x2) unshare(0x800) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000006c0)={"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"}) dup3(r4, r0, 0x0) 2018/04/16 23:32:28 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000900)="2e2f6367726f75702e6370750086298d", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.mem_exclusive\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)='5', 0x1) 2018/04/16 23:32:29 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB='9:4\r'], 0x4) [ 122.850638] device bridge_slave_1 left promiscuous mode [ 122.856241] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.866507] device bridge_slave_0 left promiscuous mode [ 122.871989] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.903362] team0 (unregistering): Port device team_slave_1 removed [ 122.915498] team0 (unregistering): Port device team_slave_0 removed [ 122.924936] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 122.942676] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 122.972093] bond0 (unregistering): Released all slaves [ 246.757176] BUG: workqueue lockup - pool cpus=1 node=0 flags=0x0 nice=0 stuck for 123s! [ 246.765543] Showing busy workqueues and worker pools: [ 246.770925] workqueue events_unbound: flags=0x2 [ 246.775657] pwq 4: cpus=0-1 flags=0x4 nice=0 active=2/512 [ 246.781631] in-flight: 22:flush_to_ldisc flush_to_ldisc [ 246.787484] workqueue events_power_efficient: flags=0x80 [ 246.793048] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=1/256 [ 246.799624] pending: gc_worker [ 246.803244] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 [ 246.809396] pending: check_lifetime [ 246.813397] workqueue netns: flags=0xe000a [ 246.817629] pwq 4: cpus=0-1 flags=0x4 nice=0 active=1/1 [ 246.823170] in-flight: 6921:cleanup_net [ 246.827511] delayed: cleanup_net [ 246.831284] workqueue ipv6_addrconf: flags=0x40008 [ 246.836210] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=1/1 [ 246.842190] pending: addrconf_dad_work [ 246.846473] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/1 [ 246.852452] pending: addrconf_verify_work [ 246.856990] pool 4: cpus=0-1 flags=0x4 nice=0 hung=0s workers=6 idle: 1850 6 40 83 [ 246.864834] INFO: task kworker/u4:1:22 blocked for more than 120 seconds. [ 246.871769] Not tainted 4.17.0-rc1+ #6 [ 246.876177] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 246.884157] kworker/u4:1 D15624 22 2 0x80000000 [ 246.889814] Workqueue: events_unbound flush_to_ldisc [ 246.894957] Call Trace: [ 246.897598] __schedule+0x801/0x1e30 [ 246.901330] ? __sched_text_start+0x8/0x8 [ 246.905524] ? mark_held_locks+0xc9/0x160 [ 246.909684] ? graph_lock+0x170/0x170 [ 246.913495] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 246.918549] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 246.923331] ? find_held_lock+0x36/0x1c0 [ 246.927406] schedule+0xef/0x430 [ 246.930788] ? __schedule+0x1e30/0x1e30 [ 246.934832] ? kasan_check_read+0x11/0x20 [ 246.938996] ? do_raw_spin_unlock+0x9e/0x2e0 [ 246.943419] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 246.948035] ? debug_mutex_free_waiter+0x1b0/0x1b0 [ 246.952978] ? mutex_destroy+0x1f0/0x1f0 [ 246.957058] ? do_raw_spin_lock+0xc1/0x200 [ 246.961306] schedule_preempt_disabled+0x10/0x20 [ 246.966072] __mutex_lock+0xe38/0x17f0 [ 246.970024] ? flush_rcu_work+0x90/0x90 [ 246.974044] ? n_tty_receive_buf_common+0x119d/0x2c50 [ 246.979250] ? mutex_trylock+0x2a0/0x2a0 [ 246.983322] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 246.988353] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 246.993119] ? find_held_lock+0x36/0x1c0 [ 246.997194] ? flush_to_ldisc+0x560/0x560 [ 247.001355] ? lock_downgrade+0x8e0/0x8e0 [ 247.005516] ? trace_hardirqs_on+0xd/0x10 [ 247.009673] ? queue_work_on+0x12c/0x1e0 [ 247.013750] ? tty_schedule_flip+0x145/0x1c0 [ 247.018167] ? tty_buffer_lock_exclusive+0x40/0x40 [ 247.023107] ? tty_insert_flip_string_fixed_flag+0x19f/0x1f0 [ 247.028915] ? kasan_check_write+0x14/0x20 [ 247.033157] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 247.038360] ? wait_for_completion+0x870/0x870 [ 247.042991] ? tty_put_char+0xc7/0x150 [ 247.047299] ? dev_match_devt+0x90/0x90 [ 247.051298] ? pty_write_room+0xc9/0xf0 [ 247.055335] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 247.060370] mutex_lock_nested+0x16/0x20 [ 247.064440] ? mutex_lock_nested+0x16/0x20 [ 247.068685] n_tty_receive_buf_common+0x119d/0x2c50 [ 247.073717] ? save_stack+0x43/0xd0 [ 247.077357] ? __kasan_slab_free+0x11a/0x170 [ 247.081788] ? n_tty_receive_char_lnext+0x710/0x710 [ 247.086812] ? lock_release+0xa10/0xa10 [ 247.090796] ? trace_hardirqs_off+0xd/0x10 [ 247.095067] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 247.100232] ? debug_check_no_obj_freed+0x2ff/0x584 [ 247.105263] n_tty_receive_buf2+0x33/0x40 [ 247.109422] tty_ldisc_receive_buf+0xb0/0x190 [ 247.113926] ? n_tty_receive_buf_common+0x2c50/0x2c50 [ 247.119129] tty_port_default_receive_buf+0x110/0x170 [ 247.124333] ? tty_port_lower_dtr_rts+0x90/0x90 [ 247.129034] ? trace_hardirqs_on+0xd/0x10 [ 247.133194] ? tty_buffer_free+0x123/0x160 [ 247.137440] flush_to_ldisc+0x3e9/0x560 [ 247.141433] ? tty_buffer_free+0x160/0x160 [ 247.145680] ? __lock_is_held+0xb5/0x140 [ 247.149760] process_one_work+0xc1e/0x1b50 [ 247.154045] ? finish_task_switch+0x28b/0x810 [ 247.158574] ? pwq_dec_nr_in_flight+0x490/0x490 [ 247.163262] ? __schedule+0x809/0x1e30 [ 247.167174] ? graph_lock+0x170/0x170 [ 247.170992] ? lock_downgrade+0x8e0/0x8e0 [ 247.175164] ? find_held_lock+0x36/0x1c0 [ 247.179240] ? lock_acquire+0x1dc/0x520 [ 247.183225] ? worker_thread+0x41f/0x1440 [ 247.187384] ? lock_downgrade+0x8e0/0x8e0 [ 247.191544] ? lock_release+0xa10/0xa10 [ 247.195533] ? kasan_check_read+0x11/0x20 [ 247.199693] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 247.204300] worker_thread+0x1cc/0x1440 [ 247.208294] ? process_one_work+0x1b50/0x1b50 [ 247.212805] ? graph_lock+0x170/0x170 [ 247.216614] ? find_held_lock+0x36/0x1c0 [ 247.220698] ? find_held_lock+0x36/0x1c0 [ 247.224776] ? schedule+0xef/0x430 [ 247.228327] ? __schedule+0x1e30/0x1e30 [ 247.232311] ? do_raw_spin_unlock+0x9e/0x2e0 [ 247.236729] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 247.241325] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 247.246441] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 247.251475] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 247.257042] ? __kthread_parkme+0x1b7/0x280 [ 247.261379] kthread+0x345/0x410 [ 247.264757] ? process_one_work+0x1b50/0x1b50 [ 247.269261] ? kthread_bind+0x40/0x40 [ 247.273109] ret_from_fork+0x3a/0x50 [ 247.276872] [ 247.276872] Showing all locks held in the system: [ 247.283218] 6 locks held by kworker/u4:1/22: [ 247.287978] #0: 00000000b2946af5 ((wq_completion)"events_unbound"){+.+.}, at: process_one_work+0xaef/0x1b50 [ 247.298023] #1: 000000009edbb089 ((work_completion)(&buf->work)){+.+.}, at: process_one_work+0xb46/0x1b50 [ 247.307850] #2: 0000000051af9561 (&port->buf.lock/1){+.+.}, at: flush_to_ldisc+0xb7/0x560 [ 247.316299] #3: 000000005f0b699f (&tty->ldisc_sem){++++}, at: tty_ldisc_ref+0x22/0x90 [ 247.324388] #4: 0000000039f69211 (&o_tty->termios_rwsem/1){++++}, at: n_tty_receive_buf_common+0xe3/0x2c50 [ 247.334305] #5: 00000000f599725c (&ldata->output_lock){+.+.}, at: n_tty_receive_buf_common+0x119d/0x2c50 [ 247.344050] 2 locks held by khungtaskd/889: [ 247.348370] #0: 00000000d325c06e (rcu_read_lock){....}, at: watchdog+0x1ff/0xf60 [ 247.356032] #1: 000000000671d8ca (tasklist_lock){.+.+}, at: debug_show_all_locks+0xde/0x34a [ 247.364672] 2 locks held by getty/4460: [ 247.368645] #0: 00000000d0c5f925 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 247.376907] #1: 0000000098377495 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 247.385786] 2 locks held by getty/4461: [ 247.389764] #0: 00000000e473f5ee (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 247.398034] #1: 00000000d9676037 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 247.406908] 2 locks held by getty/4462: [ 247.410890] #0: 00000000d57d9175 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 247.419157] #1: 000000007ffd8d06 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 247.428035] 2 locks held by getty/4463: [ 247.432024] #0: 00000000d0617aab (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 247.440291] #1: 00000000d5f13f42 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 247.449166] 2 locks held by getty/4464: [ 247.453140] #0: 000000005f9dfe2e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 247.461411] #1: 000000000ecef0ca (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 247.470289] 2 locks held by getty/4465: [ 247.474265] #0: 000000005cf45367 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 247.482527] #1: 0000000040c03fb0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 247.491403] 2 locks held by getty/4466: [ 247.495376] #0: 0000000023e94c22 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 247.503642] #1: 000000004780d9f7 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 247.512529] 3 locks held by kworker/u4:5/6921: [ 247.517110] #0: 0000000025bc7c2d ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0xaef/0x1b50 [ 247.526674] #1: 000000008f3a96b4 (net_cleanup_work){+.+.}, at: process_one_work+0xb46/0x1b50 [ 247.535368] #2: 00000000c534d071 (pernet_ops_rwsem){++++}, at: cleanup_net+0x11a/0xb20 [ 247.543551] [ 247.545183] ============================================= [ 247.545183] [ 247.552203] NMI backtrace for cpu 0 [ 247.555844] CPU: 0 PID: 889 Comm: khungtaskd Not tainted 4.17.0-rc1+ #6 [ 247.562584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.571929] Call Trace: [ 247.574583] dump_stack+0x1b9/0x294 [ 247.578205] ? dump_stack_print_info.cold.2+0x52/0x52 [ 247.583396] nmi_cpu_backtrace.cold.4+0x19/0xce [ 247.588089] ? lapic_can_unplug_cpu.cold.26+0x3f/0x3f [ 247.593272] nmi_trigger_cpumask_backtrace+0x151/0x192 [ 247.598542] arch_trigger_cpumask_backtrace+0x14/0x20 [ 247.603724] watchdog+0xc10/0xf60 [ 247.607177] ? reset_hung_task_detector+0xb0/0xb0 [ 247.612018] ? __schedule+0x1e30/0x1e30 [ 247.615986] ? do_raw_spin_unlock+0x9e/0x2e0 [ 247.620387] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 247.624967] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 247.630065] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 247.635074] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 247.640606] ? __kthread_parkme+0x1b7/0x280 [ 247.644928] kthread+0x345/0x410 [ 247.648291] ? reset_hung_task_detector+0xb0/0xb0 [ 247.653122] ? kthread_bind+0x40/0x40 [ 247.656916] ret_from_fork+0x3a/0x50 [ 247.660653] Sending NMI from CPU 0 to CPUs 1: [ 247.665156] NMI backtrace for cpu 1 [ 247.665166] CPU: 1 PID: 10109 Comm: syz-executor7 Not tainted 4.17.0-rc1+ #6 [ 247.665170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.665181] RIP: 0010:__sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 247.665185] RSP: 0018:ffff8801b431f7d0 EFLAGS: 00000297 [ 247.665192] RAX: 0000000000000002 RBX: 00000002a9ca875f RCX: ffffffff837fd34c [ 247.665196] RDX: 00000000000000ff RSI: 00000000000000ff RDI: 0000000000000001 [ 247.665201] RBP: ffff8801b431f7d0 R08: ffff8801b329c000 R09: 0000000000000006 [ 247.665206] R10: ffff8801b329c000 R11: 0000000000000000 R12: ffffc900019aa000 [ 247.665210] R13: 00000000000031d6 R14: 00000002a9ca8760 R15: 00000000000000ff [ 247.665217] FS: 00007feabc44f700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 247.665222] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 247.665227] CR2: 00000000004d9204 CR3: 00000001b0482000 CR4: 00000000001406e0 [ 247.665234] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 247.665238] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 247.665240] Call Trace: [ 247.665252] __process_echoes+0x2dc/0x8d0 [ 247.665262] n_tty_receive_buf_common+0x11d5/0x2c50 [ 247.665274] ? n_tty_receive_char_lnext+0x710/0x710 [ 247.665335] ? rcu_note_context_switch+0x710/0x710 [ 247.665345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 247.665353] n_tty_receive_buf+0x30/0x40 [ 247.665362] tty_ioctl+0x7e7/0x1870 [ 247.665370] ? tty_vhangup+0x30/0x30 [ 247.665378] ? rcu_is_watching+0x85/0x140 [ 247.665386] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 247.665427] ? __fget+0x40c/0x650 [ 247.665437] ? expand_files.part.8+0x9a0/0x9a0 [ 247.665445] ? trace_hardirqs_off+0xd/0x10 [ 247.665454] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 247.665465] ? debug_check_no_obj_freed+0x2ff/0x584 [ 247.665473] ? tty_vhangup+0x30/0x30 [ 247.665483] do_vfs_ioctl+0x1cf/0x16a0 [ 247.665490] ? rcu_pm_notify+0xc0/0xc0 [ 247.665500] ? ioctl_preallocate+0x2e0/0x2e0 [ 247.665508] ? fget_raw+0x20/0x20 [ 247.665516] ? putname+0xf2/0x130 [ 247.665523] ? rcu_read_lock_sched_held+0x108/0x120 [ 247.665533] ? kmem_cache_free+0x25c/0x2d0 [ 247.665555] ? __x64_sys_futex+0x477/0x680 [ 247.665563] ? do_futex+0x27d0/0x27d0 [ 247.665607] ? security_file_ioctl+0x94/0xc0 [ 247.665616] ksys_ioctl+0xa9/0xd0 [ 247.665626] __x64_sys_ioctl+0x73/0xb0 [ 247.665635] do_syscall_64+0x1b1/0x800 [ 247.665644] ? syscall_return_slowpath+0x5c0/0x5c0 [ 247.665653] ? syscall_return_slowpath+0x30f/0x5c0 [ 247.665663] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 247.665672] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.665682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.665687] RIP: 0033:0x455329 [ 247.665692] RSP: 002b:00007feabc44ec68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 247.665699] RAX: ffffffffffffffda RBX: 00007feabc44f6d4 RCX: 0000000000455329 [ 247.665704] RDX: 0000000020000100 RSI: 0000000000005412 RDI: 0000000000000014 [ 247.665709] RBP: 000000000072c010 R08: 0000000000000000 R09: 0000000000000000 [ 247.665713] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 247.665718] R13: 00000000000002f9 R14: 00000000006f77f8 R15: 0000000000000002 [ 247.665722] Code: 48 8b 4d 08 e8 c8 fe ff ff 5d c3 66 0f 1f 44 00 00 55 40 0f b6 d6 40 0f b6 f7 bf 01 00 00 00 48 89 e5 48 8b 4d 08 e8 a6 fe ff ff <5d> c3 0f 1f 40 00 55 0f b7 d6 0f b7 f7 bf 03 00 00 00 48 89 e5 [ 247.666160] Kernel panic - not syncing: hung_task: blocked tasks [ 247.992383] CPU: 0 PID: 889 Comm: khungtaskd Not tainted 4.17.0-rc1+ #6 [ 247.999120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.008461] Call Trace: [ 248.011049] dump_stack+0x1b9/0x294 [ 248.014686] ? dump_stack_print_info.cold.2+0x52/0x52 [ 248.019906] ? printk_safe_log_store+0x260/0x260 [ 248.024682] panic+0x22f/0x4de [ 248.027871] ? add_taint.cold.5+0x16/0x16 [ 248.032018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 248.037552] ? nmi_trigger_cpumask_backtrace+0x13a/0x192 [ 248.042997] ? printk_safe_flush+0xd7/0x130 [ 248.047317] watchdog+0xc21/0xf60 [ 248.050773] ? reset_hung_task_detector+0xb0/0xb0 [ 248.055615] ? __schedule+0x1e30/0x1e30 [ 248.059582] ? do_raw_spin_unlock+0x9e/0x2e0 [ 248.063984] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 248.068559] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 248.073655] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 248.078667] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 248.084198] ? __kthread_parkme+0x1b7/0x280 [ 248.088512] kthread+0x345/0x410 [ 248.091875] ? reset_hung_task_detector+0xb0/0xb0 [ 248.096714] ? kthread_bind+0x40/0x40 [ 248.100512] ret_from_fork+0x3a/0x50 [ 248.104880] Dumping ftrace buffer: [ 248.108479] (ftrace buffer empty) [ 248.112165] Kernel Offset: disabled [ 248.115770] Rebooting in 86400 seconds..