INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.61' (ECDSA) to the list of known hosts. 2018/04/21 01:38:57 fuzzer started 2018/04/21 01:38:58 dialing manager at 10.128.0.26:39431 syzkaller login: [ 52.288442] can: request_module (can-proto-0) failed. [ 52.298129] can: request_module (can-proto-0) failed. 2018/04/21 01:39:23 kcov=true, comps=true 2018/04/21 01:39:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x28, 0x80000000000027, 0x1ff307543bf68163, 0x0, 0x0, {0x9}, [@typed={0x14, 0x4, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}]}, 0x28}, 0x1}, 0x0) 2018/04/21 01:39:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000fe4000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(khazad)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000286ff0)="1e336500ff4ad5e700000022000000ec", 0x10) sendmsg$alg(r1, &(0x7f000098ffc8)={0x0, 0x0, &(0x7f000019f000), 0x0, &(0x7f0000282fb8)}, 0x0) 2018/04/21 01:39:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="79ff600000c000806c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/21 01:39:24 executing program 7: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$nl_xfrm(0x11, 0x3, 0x6) getsockopt$bt_hci(r1, 0x107, 0x14, &(0x7f0000000200)=""/25, &(0x7f0000000240)=0x19) 2018/04/21 01:39:24 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f00009ec000)="1f0000000112ff00fdde45c807110000f305f0f00800018001fd00dcffdf00", 0x1f) 2018/04/21 01:39:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000c9bec8)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffc, 0x0, 0x0, 0x400060, 0x0, 0xfffffffffffffffe}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:39:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000001380)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0xd5, 0x1c, &(0x7f00000000c0)=""/127}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x7}], {0x95}}, &(0x7f0000002ff6)="00647a72616c8c657200", 0x7e0, 0xff28, &(0x7f000000df19)=""/231}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x2f, &(0x7f0000000140)="a51167f8795887d8ed50e53f6eb6", &(0x7f0000000040)=""/47}, 0x28) 2018/04/21 01:39:24 executing program 6: getpid() mknod(&(0x7f0000000840)='./file0\x00', 0x0, 0x0) r0 = syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) preadv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/55, 0x37}], 0x1, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 55.793429] IPVS: ftp: loaded support on port[0] = 21 [ 55.802611] IPVS: ftp: loaded support on port[0] = 21 [ 55.821539] IPVS: ftp: loaded support on port[0] = 21 [ 55.828420] IPVS: ftp: loaded support on port[0] = 21 [ 55.850729] IPVS: ftp: loaded support on port[0] = 21 [ 55.893828] IPVS: ftp: loaded support on port[0] = 21 [ 55.900845] IPVS: ftp: loaded support on port[0] = 21 [ 55.910928] IPVS: ftp: loaded support on port[0] = 21 [ 57.953254] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.959851] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.975240] device bridge_slave_0 entered promiscuous mode [ 58.088662] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.095114] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.116272] device bridge_slave_0 entered promiscuous mode [ 58.125688] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.132117] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.149997] device bridge_slave_1 entered promiscuous mode [ 58.159841] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.166238] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.174822] device bridge_slave_0 entered promiscuous mode [ 58.204525] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.210962] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.236960] device bridge_slave_0 entered promiscuous mode [ 58.244723] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.251209] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.260178] device bridge_slave_0 entered promiscuous mode [ 58.268293] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.274730] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.282694] device bridge_slave_0 entered promiscuous mode [ 58.291549] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.297977] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.311559] device bridge_slave_1 entered promiscuous mode [ 58.320859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.329936] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.336361] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.368946] device bridge_slave_0 entered promiscuous mode [ 58.379061] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.385455] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.394141] device bridge_slave_1 entered promiscuous mode [ 58.403326] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.409754] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.418788] device bridge_slave_1 entered promiscuous mode [ 58.425503] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.431899] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.440790] device bridge_slave_1 entered promiscuous mode [ 58.449354] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.455766] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.467117] device bridge_slave_0 entered promiscuous mode [ 58.475400] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.486592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.506153] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.514431] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.520923] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.561877] device bridge_slave_1 entered promiscuous mode [ 58.584945] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.591391] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.599366] device bridge_slave_1 entered promiscuous mode [ 58.607627] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.639174] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.647963] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.655482] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.661919] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.697994] device bridge_slave_1 entered promiscuous mode [ 58.714160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.723285] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.760986] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.780227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.811551] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.820726] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.828555] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.902952] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.931993] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.939486] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.010825] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.053990] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.110160] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.140332] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.163508] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.208715] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.239450] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.296542] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.330445] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.390255] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.401569] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.421134] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.465289] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.510202] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.517329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.556979] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.566635] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.573613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.614266] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.623010] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.630517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.641639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.670909] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.686332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.693235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.744740] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.753390] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.760320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.772771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.815104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.822095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.855352] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.869769] team0: Port device team_slave_0 added [ 59.892956] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.905489] team0: Port device team_slave_0 added [ 59.923207] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.942449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.990481] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.997450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.016401] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.032813] team0: Port device team_slave_0 added [ 60.045681] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.056726] team0: Port device team_slave_1 added [ 60.071005] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.085824] team0: Port device team_slave_0 added [ 60.108330] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.133410] team0: Port device team_slave_1 added [ 60.148336] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.162678] team0: Port device team_slave_0 added [ 60.190421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.225199] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.235012] team0: Port device team_slave_0 added [ 60.244591] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.262692] team0: Port device team_slave_1 added [ 60.271451] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.281943] team0: Port device team_slave_1 added [ 60.291154] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.308216] team0: Port device team_slave_1 added [ 60.329296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.349818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.378403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.397747] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.411363] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.421905] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.429910] team0: Port device team_slave_0 added [ 60.436185] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.445761] team0: Port device team_slave_1 added [ 60.458559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.471786] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.481463] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.495506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.506981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.534159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.551418] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.569969] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.581788] team0: Port device team_slave_1 added [ 60.587422] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.595991] team0: Port device team_slave_0 added [ 60.603526] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.617683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.629724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.648737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.662757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.677368] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.684852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.695409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.712295] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.726535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.735144] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.750629] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.759437] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.766655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.797773] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.825161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.833510] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.841260] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.849158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.856922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.864727] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.872297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.880151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.888149] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.895727] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.903514] team0: Port device team_slave_1 added [ 60.910869] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.928289] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.938747] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.946124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.958697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.987871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.014742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.038302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.046514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.054480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.062382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.071209] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.078201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.086807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.097604] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.106714] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.115560] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.128158] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.143971] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.152750] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.168797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.202810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.223159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.231817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.244774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.252620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.260558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.268464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.276365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.286430] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.296656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.312301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.325648] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.360287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.401676] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.505231] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.519104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.540451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.690398] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.697892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.712709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.393965] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.400553] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.407660] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.414092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.460900] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.534547] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.540985] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.547687] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.554091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.587245] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.597871] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.604311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.611035] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.617443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.639575] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.662125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.678491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.702265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.722919] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.729355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.736041] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.742438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.763226] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.789720] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.796159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.802869] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.809250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.854777] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.880953] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.887390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.894095] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.900494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.938327] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.949672] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.956101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.962765] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.969158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.979948] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.084815] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.091250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.097956] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.104356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.120110] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.711186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.719579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.737403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.749596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.756854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.884173] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.942458] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.082127] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.109391] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.120757] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.134320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.286168] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.336184] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.367975] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.426475] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.597276] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.614436] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.623703] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.637480] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.796873] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.827437] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.860447] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 68.866703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.877768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.916945] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 68.924918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.938473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.077579] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.083906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.099216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.119544] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.128376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.154773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.179111] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.185675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.195677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.208808] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.215539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.228491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.373518] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.380171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.392615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.414652] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.421230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.431721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.462138] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.476653] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.623451] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.663387] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.692200] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.756338] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.861302] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.992299] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/21 01:39:41 executing program 7: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$nl_xfrm(0x11, 0x3, 0x6) getsockopt$bt_hci(r1, 0x107, 0x14, &(0x7f0000000200)=""/25, &(0x7f0000000240)=0x19) [ 72.599703] *** Guest State *** [ 72.603273] CR0: actual=0xffffffff9ffffffc, shadow=0xfffffffffffffffc, gh_mask=fffffffffffffff7 [ 72.612382] CR4: actual=0x0000000000402060, shadow=0x0000000000400060, gh_mask=ffffffffffffe871 [ 72.621308] CR3 = 0x0000000000000000 [ 72.625094] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 72.631134] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 72.637158] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 72.643881] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 72.651912] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 72.659949] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 72.667987] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 72.676053] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 72.684090] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 72.692126] GDTR: limit=0x00000000, base=0x0000000000000000 [ 72.700155] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 72.708177] IDTR: limit=0x00000000, base=0x0000000000000000 [ 72.716214] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 72.724247] EFER = 0xfffffffffffffffe PAT = 0x0007040600070406 [ 72.730709] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 72.738210] Interruptibility = 00000000 ActivityState = 00000000 [ 72.744485] *** Host State *** [ 72.747743] RIP = 0xffffffff811f6429 RSP = 0xffff8801b374f390 [ 72.753781] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 72.760259] FSBase=00007fdc552ca700 GSBase=ffff8801daf00000 TRBase=fffffe0000034000 [ 72.768115] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 72.774073] CR0=0000000080050033 CR3=00000001af278000 CR4=00000000001426e0 [ 72.781144] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff87801380 [ 72.787903] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 72.794031] *** Control State *** 2018/04/21 01:39:41 executing program 7: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$nl_xfrm(0x11, 0x3, 0x6) getsockopt$bt_hci(r1, 0x107, 0x14, &(0x7f0000000200)=""/25, &(0x7f0000000240)=0x19) [ 72.797552] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 72.804269] EntryControls=0000d3ff ExitControls=0023efff [ 72.809795] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 72.816779] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 72.823507] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 72.830165] reason=80000021 qualification=0000000000000000 [ 72.836554] IDTVectoring: info=00000000 errcode=00000000 [ 72.842058] TSC Offset = 0xffffffd5e1da9c66 [ 72.846708] EPT pointer = 0x00000001d483801e 2018/04/21 01:39:41 executing program 7: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$nl_xfrm(0x11, 0x3, 0x6) getsockopt$bt_hci(r1, 0x107, 0x14, &(0x7f0000000200)=""/25, &(0x7f0000000240)=0x19) 2018/04/21 01:39:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000001380)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0xd5, 0x1c, &(0x7f00000000c0)=""/127}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x7}], {0x95}}, &(0x7f0000002ff6)="00647a72616c8c657200", 0x7e0, 0xff28, &(0x7f000000df19)=""/231}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x2f, &(0x7f0000000140)="a51167f8795887d8ed50e53f6eb6", &(0x7f0000000040)=""/47}, 0x28) [ 73.000368] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/21 01:39:42 executing program 7: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$nl_xfrm(0x11, 0x3, 0x6) getsockopt$bt_hci(r1, 0x107, 0x14, &(0x7f0000000200)=""/25, &(0x7f0000000240)=0x19) 2018/04/21 01:39:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000fe4000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(khazad)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000286ff0)="1e336500ff4ad5e700000022000000ec", 0x10) sendmsg$alg(r1, &(0x7f000098ffc8)={0x0, 0x0, &(0x7f000019f000), 0x0, &(0x7f0000282fb8)}, 0x0) 2018/04/21 01:39:42 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f00009ec000)="1f0000000112ff00fdde45c807110000f305f0f00800018001fd00dcffdf00", 0x1f) 2018/04/21 01:39:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000001380)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0xd5, 0x1c, &(0x7f00000000c0)=""/127}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x7}], {0x95}}, &(0x7f0000002ff6)="00647a72616c8c657200", 0x7e0, 0xff28, &(0x7f000000df19)=""/231}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x2f, &(0x7f0000000140)="a51167f8795887d8ed50e53f6eb6", &(0x7f0000000040)=""/47}, 0x28) 2018/04/21 01:39:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x28, 0x80000000000027, 0x1ff307543bf68163, 0x0, 0x0, {0x9}, [@typed={0x14, 0x4, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}]}, 0x28}, 0x1}, 0x0) 2018/04/21 01:39:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000c9bec8)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffc, 0x0, 0x0, 0x400060, 0x0, 0xfffffffffffffffe}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:39:42 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f00009ec000)="1f0000000112ff00fdde45c807110000f305f0f00800018001fd00dcffdf00", 0x1f) 2018/04/21 01:39:42 executing program 7: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$nl_xfrm(0x11, 0x3, 0x6) getsockopt$bt_hci(r1, 0x107, 0x14, &(0x7f0000000200)=""/25, &(0x7f0000000240)=0x19) 2018/04/21 01:39:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000fe4000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(khazad)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000286ff0)="1e336500ff4ad5e700000022000000ec", 0x10) sendmsg$alg(r1, &(0x7f000098ffc8)={0x0, 0x0, &(0x7f000019f000), 0x0, &(0x7f0000282fb8)}, 0x0) 2018/04/21 01:39:42 executing program 6: getpid() mknod(&(0x7f0000000840)='./file0\x00', 0x0, 0x0) r0 = syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) preadv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/55, 0x37}], 0x1, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 2018/04/21 01:39:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000001380)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0xd5, 0x1c, &(0x7f00000000c0)=""/127}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x7}], {0x95}}, &(0x7f0000002ff6)="00647a72616c8c657200", 0x7e0, 0xff28, &(0x7f000000df19)=""/231}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x2f, &(0x7f0000000140)="a51167f8795887d8ed50e53f6eb6", &(0x7f0000000040)=""/47}, 0x28) 2018/04/21 01:39:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="79ff600000c000806c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/21 01:39:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="79ff600000c000806c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) [ 73.475825] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/21 01:39:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000c9bec8)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffc, 0x0, 0x0, 0x400060, 0x0, 0xfffffffffffffffe}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:39:42 executing program 7: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$nl_xfrm(0x11, 0x3, 0x6) getsockopt$bt_hci(r1, 0x107, 0x14, &(0x7f0000000200)=""/25, &(0x7f0000000240)=0x19) 2018/04/21 01:39:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000fe4000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(khazad)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000286ff0)="1e336500ff4ad5e700000022000000ec", 0x10) sendmsg$alg(r1, &(0x7f000098ffc8)={0x0, 0x0, &(0x7f000019f000), 0x0, &(0x7f0000282fb8)}, 0x0) 2018/04/21 01:39:42 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f00009ec000)="1f0000000112ff00fdde45c807110000f305f0f00800018001fd00dcffdf00", 0x1f) [ 73.724711] *** Guest State *** [ 73.728360] CR0: actual=0xffffffff9ffffffc, shadow=0xfffffffffffffffc, gh_mask=fffffffffffffff7 [ 73.737283] CR4: actual=0x0000000000402060, shadow=0x0000000000400060, gh_mask=ffffffffffffe871 [ 73.746148] CR3 = 0x0000000000000000 [ 73.749908] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 73.755939] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 73.762082] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 73.768842] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.776875] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.784909] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.792943] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.800977] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.805844] *** Guest State *** [ 73.809047] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.809061] GDTR: limit=0x00000000, base=0x0000000000000000 [ 73.809079] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.812368] CR0: actual=0xffffffff9ffffffc, shadow=0xfffffffffffffffc, gh_mask=fffffffffffffff7 [ 73.812384] CR4: actual=0x0000000000402060, shadow=0x0000000000400060, gh_mask=ffffffffffffe871 [ 73.820373] IDTR: limit=0x00000000, base=0x0000000000000000 [ 73.820390] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.828405] CR3 = 0x0000000000000000 [ 73.836372] EFER = 0xfffffffffffffffe PAT = 0x0007040600070406 [ 73.836384] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 73.836392] Interruptibility = 00000000 ActivityState = 00000000 [ 73.836401] *** Host State *** [ 73.845279] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 73.854104] RIP = 0xffffffff811f6429 RSP = 0xffff8801b119f390 [ 73.854124] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 73.862088] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 73.870058] FSBase=00007f0f2996d700 GSBase=ffff8801dae00000 TRBase=fffffe0000003000 [ 73.870069] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 73.873789] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 73.880198] CR0=0000000080050033 CR3=00000001d7ab1000 CR4=00000000001426f0 [ 73.887689] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.893877] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87801380 [ 73.897085] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.903054] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 73.909049] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.915444] *** Control State *** [ 73.915456] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 73.921434] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.929218] EntryControls=0000d3ff ExitControls=0023efff [ 73.929231] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 73.935124] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.941788] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 73.941800] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 73.948826] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 73.956785] reason=80000021 qualification=0000000000000000 [ 73.956792] IDTVectoring: info=00000000 errcode=00000000 [ 73.956799] TSC Offset = 0xffffffd54afbb259 [ 73.956805] EPT pointer = 0x00000001c24e001e [ 74.066136] GDTR: limit=0x00000000, base=0x0000000000000000 [ 74.074144] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.082144] IDTR: limit=0x00000000, base=0x0000000000000000 [ 74.090174] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.098177] EFER = 0xfffffffffffffffe PAT = 0x0007040600070406 [ 74.104625] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 74.112114] Interruptibility = 00000000 ActivityState = 00000000 [ 74.118370] *** Host State *** [ 74.121595] RIP = 0xffffffff811f6429 RSP = 0xffff8801b2807390 [ 74.127607] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 74.134050] FSBase=00007fdc552ca700 GSBase=ffff8801daf00000 TRBase=fffffe0000034000 [ 74.141881] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 74.147801] CR0=0000000080050033 CR3=00000001c26b4000 CR4=00000000001426e0 [ 74.154846] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff87801380 [ 74.161552] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 74.167631] *** Control State *** [ 74.171103] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 74.177794] EntryControls=0000d3ff ExitControls=0023efff [ 74.183311] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 74.190290] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 74.196981] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 74.203592] reason=80000021 qualification=0000000000000000 [ 74.209944] IDTVectoring: info=00000000 errcode=00000000 [ 74.215439] TSC Offset = 0xffffffd539cab983 [ 74.219778] EPT pointer = 0x000000019b0cc01e 2018/04/21 01:39:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x28, 0x80000000000027, 0x1ff307543bf68163, 0x0, 0x0, {0x9}, [@typed={0x14, 0x4, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}]}, 0x28}, 0x1}, 0x0) 2018/04/21 01:39:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="79ff600000c000806c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/21 01:39:43 executing program 6: getpid() mknod(&(0x7f0000000840)='./file0\x00', 0x0, 0x0) r0 = syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) preadv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/55, 0x37}], 0x1, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 2018/04/21 01:39:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000fe4000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(khazad)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000286ff0)="1e336500ff4ad5e700000022000000ec", 0x10) sendmsg$alg(r1, &(0x7f000098ffc8)={0x0, 0x0, &(0x7f000019f000), 0x0, &(0x7f0000282fb8)}, 0x0) 2018/04/21 01:39:43 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f00009ec000)="1f0000000112ff00fdde45c807110000f305f0f00800018001fd00dcffdf00", 0x1f) 2018/04/21 01:39:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000c9bec8)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffc, 0x0, 0x0, 0x400060, 0x0, 0xfffffffffffffffe}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:39:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000c9bec8)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffc, 0x0, 0x0, 0x400060, 0x0, 0xfffffffffffffffe}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:39:43 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000c6eff6)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$vnet(r0, &(0x7f00000001c0)={0x1, {&(0x7f0000000040)=""/108, 0x6c, &(0x7f0000000140)=""/92}}, 0x68) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3d8000}) read(r1, &(0x7f00000000c0)=""/111, 0x13) [ 74.313352] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. [ 74.366018] device bridge_slave_1 left promiscuous mode [ 74.372390] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.396769] *** Guest State *** [ 74.400191] CR0: actual=0xffffffff9ffffffc, shadow=0xfffffffffffffffc, gh_mask=fffffffffffffff7 [ 74.403168] *** Guest State *** [ 74.409097] CR4: actual=0x0000000000402060, shadow=0x0000000000400060, gh_mask=ffffffffffffe871 [ 74.409113] CR3 = 0x0000000000000000 [ 74.412420] CR0: actual=0xffffffff9ffffffc, shadow=0xfffffffffffffffc, gh_mask=fffffffffffffff7 [ 74.421303] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 74.421319] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 74.425057] CR4: actual=0x0000000000402060, shadow=0x0000000000400060, gh_mask=ffffffffffffe871 [ 74.425063] CR3 = 0x0000000000000000 [ 74.425075] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 74.433944] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 74.439935] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 74.439953] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 74.445942] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.445962] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.454808] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.458534] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.464514] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.464528] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.464542] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.464557] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.464572] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.464582] GDTR: limit=0x00000000, base=0x0000000000000000 2018/04/21 01:39:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x28, 0x80000000000027, 0x1ff307543bf68163, 0x0, 0x0, {0x9}, [@typed={0x14, 0x4, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}]}, 0x28}, 0x1}, 0x0) [ 74.464597] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.464607] IDTR: limit=0x00000000, base=0x0000000000000000 [ 74.464620] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.464630] EFER = 0xfffffffffffffffe PAT = 0x0007040600070406 [ 74.464638] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 74.464646] Interruptibility = 00000000 ActivityState = 00000000 [ 74.464650] *** Host State *** [ 74.464659] RIP = 0xffffffff811f6429 RSP = 0xffff8801d04b7390 [ 74.464676] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 74.464687] FSBase=00007f0f2996d700 GSBase=ffff8801daf00000 TRBase=fffffe0000034000 [ 74.464696] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 74.464708] CR0=0000000080050033 CR3=00000001b27d0000 CR4=00000000001426e0 [ 74.464722] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff87801380 [ 74.471391] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.471407] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.477384] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 74.484050] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.484063] GDTR: limit=0x00000000, base=0x0000000000000000 [ 74.492030] *** Control State *** [ 74.500005] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.507991] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 74.515971] IDTR: limit=0x00000000, base=0x0000000000000000 [ 74.515986] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 74.523957] EntryControls=0000d3ff ExitControls=0023efff [ 74.531930] EFER = 0xfffffffffffffffe PAT = 0x0007040600070406 [ 74.531939] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 74.531947] Interruptibility = 00000000 ActivityState = 00000000 [ 74.531950] *** Host State *** [ 74.531960] RIP = 0xffffffff811f6429 RSP = 0xffff8801ca23f390 [ 74.531979] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 74.531990] FSBase=00007fdc552ca700 GSBase=ffff8801dae00000 TRBase=fffffe0000003000 [ 74.531999] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 74.532036] CR0=0000000080050033 CR3=00000001c07af000 CR4=00000000001426f0 [ 74.532048] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87801380 [ 74.532057] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 74.532060] *** Control State *** [ 74.532068] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 74.532075] EntryControls=0000d3ff ExitControls=0023efff [ 74.532085] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 74.532093] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 74.532100] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 74.532106] reason=80000021 qualification=0000000000000000 [ 74.532113] IDTVectoring: info=00000000 errcode=00000000 [ 74.532118] TSC Offset = 0xffffffd4ea29e0c4 [ 74.532126] EPT pointer = 0x00000001c53a001e [ 74.763861] IPVS: ftp: loaded support on port[0] = 21 [ 74.767447] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 74.767463] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 74.795443] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. [ 74.801092] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 74.801101] reason=80000021 qualification=0000000000000000 [ 74.801107] IDTVectoring: info=00000000 errcode=00000000 [ 74.801113] TSC Offset = 0xffffffd4e9ec22b9 [ 74.801124] EPT pointer = 0x00000001cb24e01e [ 74.923270] device bridge_slave_0 left promiscuous mode [ 74.929007] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.989704] team0 (unregistering): Port device team_slave_1 removed [ 75.001130] team0 (unregistering): Port device team_slave_0 removed [ 75.011727] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 75.025792] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 75.054389] bond0 (unregistering): Released all slaves [ 75.645376] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.651821] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.659712] device bridge_slave_0 entered promiscuous mode [ 75.699438] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.706014] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.715941] device bridge_slave_1 entered promiscuous mode [ 75.755192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 75.794007] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 75.906205] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 75.946167] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 76.125164] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 76.133093] team0: Port device team_slave_0 added [ 76.162079] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 76.169546] team0: Port device team_slave_1 added [ 76.205499] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 76.212435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.228872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.262127] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.269117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.277830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.305447] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.312691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.328662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.359854] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.367151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.375332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.613179] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.619570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.626393] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.632776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.640171] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.151141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.487445] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.572153] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.661550] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.667890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.675745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.761687] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/21 01:39:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000fe4000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(khazad)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000286ff0)="1e336500ff4ad5e700000022000000ec", 0x10) sendmsg$alg(r1, &(0x7f000098ffc8)={0x0, 0x0, &(0x7f000019f000), 0x0, &(0x7f0000282fb8)}, 0x0) 2018/04/21 01:39:48 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000c6eff6)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$vnet(r0, &(0x7f00000001c0)={0x1, {&(0x7f0000000040)=""/108, 0x6c, &(0x7f0000000140)=""/92}}, 0x68) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3d8000}) read(r1, &(0x7f00000000c0)=""/111, 0x13) 2018/04/21 01:39:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000c9bec8)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffc, 0x0, 0x0, 0x400060, 0x0, 0xfffffffffffffffe}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:39:48 executing program 1: r0 = socket$inet6_sctp(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x0, 0x3}, 0xc) sendto$inet6(r0, &(0x7f0000000080)="97", 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) write$evdev(r1, &(0x7f0000001740)=[{}], 0x18) 2018/04/21 01:39:48 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5101, &(0x7f0000000040)) 2018/04/21 01:39:48 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f00009ec000)="1f0000000112ff00fdde45c807110000f305f0f00800018001fd00dcffdf00", 0x1f) 2018/04/21 01:39:48 executing program 6: getpid() mknod(&(0x7f0000000840)='./file0\x00', 0x0, 0x0) r0 = syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) preadv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/55, 0x37}], 0x1, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 2018/04/21 01:39:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000c9bec8)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffc, 0x0, 0x0, 0x400060, 0x0, 0xfffffffffffffffe}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 79.232672] *** Guest State *** [ 79.236081] CR0: actual=0xffffffff9ffffffc, shadow=0xfffffffffffffffc, gh_mask=fffffffffffffff7 [ 79.237404] *** Guest State *** [ 79.244990] CR4: actual=0x0000000000402060, shadow=0x0000000000400060, gh_mask=ffffffffffffe871 [ 79.245005] CR3 = 0x0000000000000000 [ 79.248320] CR0: actual=0xffffffff9ffffffc, shadow=0xfffffffffffffffc, gh_mask=fffffffffffffff7 [ 79.257202] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 79.260958] CR4: actual=0x0000000000402060, shadow=0x0000000000400060, gh_mask=ffffffffffffe871 [ 79.269813] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 79.275802] CR3 = 0x0000000000000000 [ 79.275811] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 79.284683] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 79.284696] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.284713] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.284729] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.284746] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.290737] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 79.294469] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.300451] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 79.307135] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.315115] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.323095] GDTR: limit=0x00000000, base=0x0000000000000000 [ 79.331292] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.331309] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.331322] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.331339] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.331353] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.331364] GDTR: limit=0x00000000, base=0x0000000000000000 [ 79.331380] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.331392] IDTR: limit=0x00000000, base=0x0000000000000000 [ 79.331408] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.331419] EFER = 0xfffffffffffffffe PAT = 0x0007040600070406 [ 79.331429] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 79.331439] Interruptibility = 00000000 ActivityState = 00000000 [ 79.331443] *** Host State *** [ 79.331452] RIP = 0xffffffff811f6429 RSP = 0xffff8801caa9f390 [ 79.331472] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 79.331484] FSBase=00007f0f2996d700 GSBase=ffff8801daf00000 TRBase=fffffe0000034000 [ 79.331495] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 79.331506] CR0=0000000080050033 CR3=00000001c4101000 CR4=00000000001426e0 [ 79.331520] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff87801380 [ 79.331531] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 79.331535] *** Control State *** [ 79.331544] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 79.331550] EntryControls=0000d3ff ExitControls=0023efff [ 79.331562] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 79.331570] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 79.331579] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 79.331587] reason=80000021 qualification=0000000000000000 [ 79.331594] IDTVectoring: info=00000000 errcode=00000000 [ 79.331600] TSC Offset = 0xffffffd254645517 [ 79.331608] EPT pointer = 0x00000001abd5e01e 2018/04/21 01:39:48 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000c6eff6)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$vnet(r0, &(0x7f00000001c0)={0x1, {&(0x7f0000000040)=""/108, 0x6c, &(0x7f0000000140)=""/92}}, 0x68) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3d8000}) read(r1, &(0x7f00000000c0)=""/111, 0x13) 2018/04/21 01:39:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000fe4000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(khazad)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000286ff0)="1e336500ff4ad5e700000022000000ec", 0x10) sendmsg$alg(r1, &(0x7f000098ffc8)={0x0, 0x0, &(0x7f000019f000), 0x0, &(0x7f0000282fb8)}, 0x0) 2018/04/21 01:39:48 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5101, &(0x7f0000000040)) 2018/04/21 01:39:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@check_strict='check=strict', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) lstat(&(0x7f0000001c40)='./file0//ile0\x00', &(0x7f0000001c80)) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0//ile0\x00', 0x0, 0x0) 2018/04/21 01:39:48 executing program 1: r0 = socket$inet6_sctp(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x0, 0x3}, 0xc) sendto$inet6(r0, &(0x7f0000000080)="97", 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) write$evdev(r1, &(0x7f0000001740)=[{}], 0x18) [ 79.582564] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.590596] IDTR: limit=0x00000000, base=0x0000000000000000 [ 79.598624] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 79.606753] EFER = 0xfffffffffffffffe PAT = 0x0007040600070406 [ 79.613223] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 79.620720] Interruptibility = 00000000 ActivityState = 00000000 [ 79.626988] *** Host State *** [ 79.630224] RIP = 0xffffffff811f6429 RSP = 0xffff8801b04cf390 [ 79.636247] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 79.642700] FSBase=00007fdc552ca700 GSBase=ffff8801dae00000 TRBase=fffffe0000003000 [ 79.650537] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 79.656471] CR0=0000000080050033 CR3=00000001d7376000 CR4=00000000001426f0 [ 79.663536] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87801380 [ 79.670249] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 79.676374] *** Control State *** [ 79.679891] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 79.686629] EntryControls=0000d3ff ExitControls=0023efff [ 79.692139] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 79.699127] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 79.705841] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 79.713384] reason=80000021 qualification=0000000000000000 [ 79.719744] IDTVectoring: info=00000000 errcode=00000000 [ 79.725246] TSC Offset = 0xffffffd2543c2501 [ 79.729612] EPT pointer = 0x00000001a97b801e 2018/04/21 01:39:49 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5101, &(0x7f0000000040)) 2018/04/21 01:39:49 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000c6eff6)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$vnet(r0, &(0x7f00000001c0)={0x1, {&(0x7f0000000040)=""/108, 0x6c, &(0x7f0000000140)=""/92}}, 0x68) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3d8000}) read(r1, &(0x7f00000000c0)=""/111, 0x13) 2018/04/21 01:39:49 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f00009ec000)="1f0000000112ff00fdde45c807110000f305f0f00800018001fd00dcffdf00", 0x1f) 2018/04/21 01:39:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f00000feffc)=0x58, 0x0) shutdown(r0, 0x2) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x6, {0x2, 0x9, 0x80000000, 0x0, 0x57d58717}, 0x7, 0x7fff}, 0xe) dup2(r0, r2) chroot(&(0x7f0000000000)='./file0\x00') 2018/04/21 01:39:49 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/126, 0x7e}], 0x1, &(0x7f0000000180)=""/182, 0xb6}}], 0x1, 0x140, &(0x7f0000000280)={0x0, 0x1c9c380}) 2018/04/21 01:39:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x0, 0x3}, 0xc) sendto$inet6(r0, &(0x7f0000000080)="97", 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) write$evdev(r1, &(0x7f0000001740)=[{}], 0x18) 2018/04/21 01:39:49 executing program 6: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@check_strict='check=strict', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) lstat(&(0x7f0000001c40)='./file0//ile0\x00', &(0x7f0000001c80)) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0//ile0\x00', 0x0, 0x0) 2018/04/21 01:39:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@check_strict='check=strict', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) lstat(&(0x7f0000001c40)='./file0//ile0\x00', &(0x7f0000001c80)) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0//ile0\x00', 0x0, 0x0) [ 80.415596] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/21 01:39:49 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5101, &(0x7f0000000040)) 2018/04/21 01:39:49 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x76) 2018/04/21 01:39:49 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/126, 0x7e}], 0x1, &(0x7f0000000180)=""/182, 0xb6}}], 0x1, 0x140, &(0x7f0000000280)={0x0, 0x1c9c380}) 2018/04/21 01:39:49 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/126, 0x7e}], 0x1, &(0x7f0000000180)=""/182, 0xb6}}], 0x1, 0x140, &(0x7f0000000280)={0x0, 0x1c9c380}) 2018/04/21 01:39:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@check_strict='check=strict', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) lstat(&(0x7f0000001c40)='./file0//ile0\x00', &(0x7f0000001c80)) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0//ile0\x00', 0x0, 0x0) 2018/04/21 01:39:49 executing program 6: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@check_strict='check=strict', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) lstat(&(0x7f0000001c40)='./file0//ile0\x00', &(0x7f0000001c80)) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0//ile0\x00', 0x0, 0x0) 2018/04/21 01:39:49 executing program 0: r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)="7882c058b260effb", 0x8}], 0x1) ioctl$fiemap(r0, 0x40086602, &(0x7f00000002c0)={0x4000}) ftruncate(r0, 0x8) 2018/04/21 01:39:49 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/126, 0x7e}], 0x1, &(0x7f0000000180)=""/182, 0xb6}}], 0x1, 0x140, &(0x7f0000000280)={0x0, 0x1c9c380}) 2018/04/21 01:39:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f00000feffc)=0x58, 0x0) shutdown(r0, 0x2) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x6, {0x2, 0x9, 0x80000000, 0x0, 0x57d58717}, 0x7, 0x7fff}, 0xe) dup2(r0, r2) chroot(&(0x7f0000000000)='./file0\x00') 2018/04/21 01:39:49 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x76) 2018/04/21 01:39:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x0, 0x3}, 0xc) sendto$inet6(r0, &(0x7f0000000080)="97", 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) write$evdev(r1, &(0x7f0000001740)=[{}], 0x18) 2018/04/21 01:39:49 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/126, 0x7e}], 0x1, &(0x7f0000000180)=""/182, 0xb6}}], 0x1, 0x140, &(0x7f0000000280)={0x0, 0x1c9c380}) [ 80.813296] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/21 01:39:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@check_strict='check=strict', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) lstat(&(0x7f0000001c40)='./file0//ile0\x00', &(0x7f0000001c80)) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0//ile0\x00', 0x0, 0x0) 2018/04/21 01:39:50 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/126, 0x7e}], 0x1, &(0x7f0000000180)=""/182, 0xb6}}], 0x1, 0x140, &(0x7f0000000280)={0x0, 0x1c9c380}) 2018/04/21 01:39:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@check_strict='check=strict', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) lstat(&(0x7f0000001c40)='./file0//ile0\x00', &(0x7f0000001c80)) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0//ile0\x00', 0x0, 0x0) 2018/04/21 01:39:50 executing program 0: r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)="7882c058b260effb", 0x8}], 0x1) ioctl$fiemap(r0, 0x40086602, &(0x7f00000002c0)={0x4000}) ftruncate(r0, 0x8) 2018/04/21 01:39:50 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/126, 0x7e}], 0x1, &(0x7f0000000180)=""/182, 0xb6}}], 0x1, 0x140, &(0x7f0000000280)={0x0, 0x1c9c380}) 2018/04/21 01:39:50 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x76) 2018/04/21 01:39:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f00000feffc)=0x58, 0x0) shutdown(r0, 0x2) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x6, {0x2, 0x9, 0x80000000, 0x0, 0x57d58717}, 0x7, 0x7fff}, 0xe) dup2(r0, r2) chroot(&(0x7f0000000000)='./file0\x00') 2018/04/21 01:39:50 executing program 1: r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)="7882c058b260effb", 0x8}], 0x1) ioctl$fiemap(r0, 0x40086602, &(0x7f00000002c0)={0x4000}) ftruncate(r0, 0x8) 2018/04/21 01:39:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f00000feffc)=0x58, 0x0) shutdown(r0, 0x2) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x6, {0x2, 0x9, 0x80000000, 0x0, 0x57d58717}, 0x7, 0x7fff}, 0xe) dup2(r0, r2) chroot(&(0x7f0000000000)='./file0\x00') [ 81.124955] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/21 01:39:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f00000feffc)=0x58, 0x0) shutdown(r0, 0x2) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x6, {0x2, 0x9, 0x80000000, 0x0, 0x57d58717}, 0x7, 0x7fff}, 0xe) dup2(r0, r2) chroot(&(0x7f0000000000)='./file0\x00') 2018/04/21 01:39:50 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x76) 2018/04/21 01:39:50 executing program 1: r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)="7882c058b260effb", 0x8}], 0x1) ioctl$fiemap(r0, 0x40086602, &(0x7f00000002c0)={0x4000}) ftruncate(r0, 0x8) 2018/04/21 01:39:50 executing program 0: r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)="7882c058b260effb", 0x8}], 0x1) ioctl$fiemap(r0, 0x40086602, &(0x7f00000002c0)={0x4000}) ftruncate(r0, 0x8) 2018/04/21 01:39:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000100)=0x14, 0x4) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0f7f9918ffb8d1008ec066b9a50a000066b8bcf2000066ba000000000f3066b9ad02000066b86a4cbe0766ba000000000f308fe958028e267a0f16fedf5400baf80c66b8967c7c8966efbafc0cb80000ef9a0018230066f080650408", 0x5c}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000280)) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x6}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000240)={r5, 0x4}, 0x8) 2018/04/21 01:39:50 executing program 6: r0 = syz_open_dev$dspn(&(0x7f0000af6ff6)='/dev/dsp#\x00', 0x1, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x0, 0x100000001}], 0x0, &(0x7f00000003c0)={'nouuid,', {[{@nobarrier='nobarrier', 0x2c}, {@barrier='barrier', 0x2c}, {@sysvgroups='sysvgroups', 0x2c}, {@inode64='inode64', 0x2c}]}}) readv(r0, &(0x7f00000013c0)=[{&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000001780)=""/199, 0xc7}, {&(0x7f0000002900)=""/146, 0x92}], 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x800) ioctl$int_in(r0, 0x80000000005001, &(0x7f0000003ff8)) [ 81.284524] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 81.312666] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/21 01:39:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f00000feffc)=0x58, 0x0) shutdown(r0, 0x2) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x6, {0x2, 0x9, 0x80000000, 0x0, 0x57d58717}, 0x7, 0x7fff}, 0xe) dup2(r0, r2) chroot(&(0x7f0000000000)='./file0\x00') 2018/04/21 01:39:50 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4202, r1, 0x0, &(0x7f0000000000)={&(0x7f00000033c0)=""/4096, 0xfffffffffffffd2c}) 2018/04/21 01:39:50 executing program 0: r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)="7882c058b260effb", 0x8}], 0x1) ioctl$fiemap(r0, 0x40086602, &(0x7f00000002c0)={0x4000}) ftruncate(r0, 0x8) 2018/04/21 01:39:50 executing program 1: r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)="7882c058b260effb", 0x8}], 0x1) ioctl$fiemap(r0, 0x40086602, &(0x7f00000002c0)={0x4000}) ftruncate(r0, 0x8) [ 81.399778] XFS (loop6): nobarrier option is deprecated, ignoring. [ 81.406378] XFS (loop6): barrier option is deprecated, ignoring. [ 81.449259] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/21 01:39:50 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4202, r1, 0x0, &(0x7f0000000000)={&(0x7f00000033c0)=""/4096, 0xfffffffffffffd2c}) [ 81.507624] XFS (loop6): Invalid superblock magic number 2018/04/21 01:39:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000100)=0x14, 0x4) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0f7f9918ffb8d1008ec066b9a50a000066b8bcf2000066ba000000000f3066b9ad02000066b86a4cbe0766ba000000000f308fe958028e267a0f16fedf5400baf80c66b8967c7c8966efbafc0cb80000ef9a0018230066f080650408", 0x5c}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000280)) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x6}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000240)={r5, 0x4}, 0x8) 2018/04/21 01:39:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f00000feffc)=0x58, 0x0) shutdown(r0, 0x2) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x6, {0x2, 0x9, 0x80000000, 0x0, 0x57d58717}, 0x7, 0x7fff}, 0xe) dup2(r0, r2) chroot(&(0x7f0000000000)='./file0\x00') [ 82.299513] XFS (loop6): nobarrier option is deprecated, ignoring. [ 82.305952] XFS (loop6): barrier option is deprecated, ignoring. [ 82.316137] XFS (loop6): Invalid superblock magic number 2018/04/21 01:39:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000100)=0x14, 0x4) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0f7f9918ffb8d1008ec066b9a50a000066b8bcf2000066ba000000000f3066b9ad02000066b86a4cbe0766ba000000000f308fe958028e267a0f16fedf5400baf80c66b8967c7c8966efbafc0cb80000ef9a0018230066f080650408", 0x5c}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000280)) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x6}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000240)={r5, 0x4}, 0x8) 2018/04/21 01:39:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f00000feffc)=0x58, 0x0) shutdown(r0, 0x2) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x6, {0x2, 0x9, 0x80000000, 0x0, 0x57d58717}, 0x7, 0x7fff}, 0xe) dup2(r0, r2) chroot(&(0x7f0000000000)='./file0\x00') 2018/04/21 01:39:51 executing program 0: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000d1000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x200000000000000) 2018/04/21 01:39:51 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x110) 2018/04/21 01:39:51 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000001340)=""/60, &(0x7f0000001380)=0x3c) 2018/04/21 01:39:51 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4202, r1, 0x0, &(0x7f0000000000)={&(0x7f00000033c0)=""/4096, 0xfffffffffffffd2c}) 2018/04/21 01:39:51 executing program 6: r0 = syz_open_dev$dspn(&(0x7f0000af6ff6)='/dev/dsp#\x00', 0x1, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x0, 0x100000001}], 0x0, &(0x7f00000003c0)={'nouuid,', {[{@nobarrier='nobarrier', 0x2c}, {@barrier='barrier', 0x2c}, {@sysvgroups='sysvgroups', 0x2c}, {@inode64='inode64', 0x2c}]}}) readv(r0, &(0x7f00000013c0)=[{&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000001780)=""/199, 0xc7}, {&(0x7f0000002900)=""/146, 0x92}], 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x800) ioctl$int_in(r0, 0x80000000005001, &(0x7f0000003ff8)) 2018/04/21 01:39:51 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4202, r1, 0x0, &(0x7f0000000000)={&(0x7f00000033c0)=""/4096, 0xfffffffffffffd2c}) [ 82.391989] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 82.396268] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/21 01:39:51 executing program 0: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000d1000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x200000000000000) 2018/04/21 01:39:51 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x110) [ 82.448533] XFS (loop6): nobarrier option is deprecated, ignoring. [ 82.455048] XFS (loop6): barrier option is deprecated, ignoring. [ 82.628359] XFS (loop6): Invalid superblock magic number 2018/04/21 01:39:52 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000001340)=""/60, &(0x7f0000001380)=0x3c) 2018/04/21 01:39:52 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000012f70), 0x0, &(0x7f0000000000)=[{0x28, 0x29, 0x3b, "270202010000007efe8000000000000052"}], 0x28}, 0x0) 2018/04/21 01:39:52 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x110) 2018/04/21 01:39:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000100)=0x14, 0x4) r4 = dup3(r3, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0f7f9918ffb8d1008ec066b9a50a000066b8bcf2000066ba000000000f3066b9ad02000066b86a4cbe0766ba000000000f308fe958028e267a0f16fedf5400baf80c66b8967c7c8966efbafc0cb80000ef9a0018230066f080650408", 0x5c}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000280)) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x6}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000240)={r5, 0x4}, 0x8) 2018/04/21 01:39:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f00000feffc)=0x58, 0x0) shutdown(r0, 0x2) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x6, {0x2, 0x9, 0x80000000, 0x0, 0x57d58717}, 0x7, 0x7fff}, 0xe) dup2(r0, r2) chroot(&(0x7f0000000000)='./file0\x00') 2018/04/21 01:39:52 executing program 0: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000d1000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x200000000000000) 2018/04/21 01:39:52 executing program 6: r0 = syz_open_dev$dspn(&(0x7f0000af6ff6)='/dev/dsp#\x00', 0x1, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x0, 0x100000001}], 0x0, &(0x7f00000003c0)={'nouuid,', {[{@nobarrier='nobarrier', 0x2c}, {@barrier='barrier', 0x2c}, {@sysvgroups='sysvgroups', 0x2c}, {@inode64='inode64', 0x2c}]}}) readv(r0, &(0x7f00000013c0)=[{&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000001780)=""/199, 0xc7}, {&(0x7f0000002900)=""/146, 0x92}], 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x800) ioctl$int_in(r0, 0x80000000005001, &(0x7f0000003ff8)) 2018/04/21 01:39:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f00000feffc)=0x58, 0x0) shutdown(r0, 0x2) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x6, {0x2, 0x9, 0x80000000, 0x0, 0x57d58717}, 0x7, 0x7fff}, 0xe) dup2(r0, r2) chroot(&(0x7f0000000000)='./file0\x00') [ 83.291650] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 83.307214] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/21 01:39:52 executing program 0: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000d1000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x200000000000000) 2018/04/21 01:39:52 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000012f70), 0x0, &(0x7f0000000000)=[{0x28, 0x29, 0x3b, "270202010000007efe8000000000000052"}], 0x28}, 0x0) 2018/04/21 01:39:52 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x110) 2018/04/21 01:39:52 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000001340)=""/60, &(0x7f0000001380)=0x3c) [ 83.339556] XFS (loop6): nobarrier option is deprecated, ignoring. [ 83.346015] XFS (loop6): barrier option is deprecated, ignoring. [ 83.484641] XFS (loop6): Invalid superblock magic number 2018/04/21 01:39:53 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000012f70), 0x0, &(0x7f0000000000)=[{0x28, 0x29, 0x3b, "270202010000007efe8000000000000052"}], 0x28}, 0x0) 2018/04/21 01:39:53 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vhan0\x00', 0x400}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'gretap0\x00', 0x600}) 2018/04/21 01:39:53 executing program 6: r0 = syz_open_dev$dspn(&(0x7f0000af6ff6)='/dev/dsp#\x00', 0x1, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x0, 0x100000001}], 0x0, &(0x7f00000003c0)={'nouuid,', {[{@nobarrier='nobarrier', 0x2c}, {@barrier='barrier', 0x2c}, {@sysvgroups='sysvgroups', 0x2c}, {@inode64='inode64', 0x2c}]}}) readv(r0, &(0x7f00000013c0)=[{&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000001780)=""/199, 0xc7}, {&(0x7f0000002900)=""/146, 0x92}], 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x800) ioctl$int_in(r0, 0x80000000005001, &(0x7f0000003ff8)) 2018/04/21 01:39:53 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000001340)=""/60, &(0x7f0000001380)=0x3c) 2018/04/21 01:39:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) accept4(r0, &(0x7f00000001c0)=@can, &(0x7f0000000080)=0x3, 0x0) 2018/04/21 01:39:53 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x4, 0x0) pkey_mprotect(&(0x7f000050d000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) clone(0x0, &(0x7f0000000140), &(0x7f0000006000), &(0x7f0000000100), &(0x7f0000001f9d)) 2018/04/21 01:39:53 executing program 5: r0 = socket(0x1d, 0x0, 0x1) socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x54, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r3, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0xfffffe84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140), &(0x7f0000000180)) write$rdma_cm(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a0000000000"], 0x16) write$rdma_cm(r3, &(0x7f0000000000)=@listen={0x7, 0x8, 0xfa00, {r4}}, 0x10) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000002280)=[{{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000740)="964616d1dafb11d6d905ea33bd4eaea0dd04eb847bc0a1210ca9456143e31b8ce14caf4a0646bc639707d10aba3e652495977a7a6d3fc41ef6364c47c2266aa410a490f920f407161207ec5352e1ce6c3822d3a2ae063583609298790a58b73fccaac3665dd78ab4a15d4c12a996799f41dc79b9f3d57a627a7517cb0b51c0cecf43519f19db25073246fa0d8e29d209ee94372325d56aa5ae8d45", 0x9b}], 0x1, &(0x7f0000000f40), 0x0, 0x4045}, 0x610}], 0x1, 0x4001) setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000400)=""/221, 0xdd}, &(0x7f0000000200), 0x10}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24}}, 0x2, 0x5, 0x1ff, 0x5fc, 0x3a}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000600)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x13860b96, 0xa0000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000800)={'ifb0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) 2018/04/21 01:39:53 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@sco={0x1f}, 0x80, &(0x7f0000000180)}, 0x0) [ 84.180203] mmap: syz-executor4 (7340) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. [ 84.219803] XFS (loop6): nobarrier option is deprecated, ignoring. 2018/04/21 01:39:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKMODE={0x8, 0x11}]}, 0x28}, 0x1}, 0x0) 2018/04/21 01:39:53 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000012f70), 0x0, &(0x7f0000000000)=[{0x28, 0x29, 0x3b, "270202010000007efe8000000000000052"}], 0x28}, 0x0) [ 84.226310] XFS (loop6): barrier option is deprecated, ignoring. 2018/04/21 01:39:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) accept4(r0, &(0x7f00000001c0)=@can, &(0x7f0000000080)=0x3, 0x0) 2018/04/21 01:39:53 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@sco={0x1f}, 0x80, &(0x7f0000000180)}, 0x0) 2018/04/21 01:39:53 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vhan0\x00', 0x400}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'gretap0\x00', 0x600}) 2018/04/21 01:39:53 executing program 5: r0 = socket(0x1d, 0x0, 0x1) socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x54, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r3, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0xfffffe84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140), &(0x7f0000000180)) write$rdma_cm(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a0000000000"], 0x16) write$rdma_cm(r3, &(0x7f0000000000)=@listen={0x7, 0x8, 0xfa00, {r4}}, 0x10) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000002280)=[{{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000740)="964616d1dafb11d6d905ea33bd4eaea0dd04eb847bc0a1210ca9456143e31b8ce14caf4a0646bc639707d10aba3e652495977a7a6d3fc41ef6364c47c2266aa410a490f920f407161207ec5352e1ce6c3822d3a2ae063583609298790a58b73fccaac3665dd78ab4a15d4c12a996799f41dc79b9f3d57a627a7517cb0b51c0cecf43519f19db25073246fa0d8e29d209ee94372325d56aa5ae8d45", 0x9b}], 0x1, &(0x7f0000000f40), 0x0, 0x4045}, 0x610}], 0x1, 0x4001) setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000400)=""/221, 0xdd}, &(0x7f0000000200), 0x10}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24}}, 0x2, 0x5, 0x1ff, 0x5fc, 0x3a}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000600)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x13860b96, 0xa0000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000800)={'ifb0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) [ 84.338605] XFS (loop6): Invalid superblock magic number [ 84.351918] netlink: 'syz-executor3': attribute type 17 has an invalid length. 2018/04/21 01:39:53 executing program 7: r0 = socket(0x1d, 0x0, 0x1) socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x54, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r3, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0xfffffe84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140), &(0x7f0000000180)) write$rdma_cm(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a0000000000"], 0x16) write$rdma_cm(r3, &(0x7f0000000000)=@listen={0x7, 0x8, 0xfa00, {r4}}, 0x10) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000002280)=[{{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000740)="964616d1dafb11d6d905ea33bd4eaea0dd04eb847bc0a1210ca9456143e31b8ce14caf4a0646bc639707d10aba3e652495977a7a6d3fc41ef6364c47c2266aa410a490f920f407161207ec5352e1ce6c3822d3a2ae063583609298790a58b73fccaac3665dd78ab4a15d4c12a996799f41dc79b9f3d57a627a7517cb0b51c0cecf43519f19db25073246fa0d8e29d209ee94372325d56aa5ae8d45", 0x9b}], 0x1, &(0x7f0000000f40), 0x0, 0x4045}, 0x610}], 0x1, 0x4001) setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000400)=""/221, 0xdd}, &(0x7f0000000200), 0x10}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24}}, 0x2, 0x5, 0x1ff, 0x5fc, 0x3a}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000600)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x13860b96, 0xa0000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000800)={'ifb0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) 2018/04/21 01:39:53 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x4, 0x0) pkey_mprotect(&(0x7f000050d000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) clone(0x0, &(0x7f0000000140), &(0x7f0000006000), &(0x7f0000000100), &(0x7f0000001f9d)) 2018/04/21 01:39:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKMODE={0x8, 0x11}]}, 0x28}, 0x1}, 0x0) 2018/04/21 01:39:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) accept4(r0, &(0x7f00000001c0)=@can, &(0x7f0000000080)=0x3, 0x0) [ 84.556128] netlink: 'syz-executor3': attribute type 17 has an invalid length. 2018/04/21 01:39:54 executing program 5: r0 = socket(0x1d, 0x0, 0x1) socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x54, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r3, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0xfffffe84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140), &(0x7f0000000180)) write$rdma_cm(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a0000000000"], 0x16) write$rdma_cm(r3, &(0x7f0000000000)=@listen={0x7, 0x8, 0xfa00, {r4}}, 0x10) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000002280)=[{{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000740)="964616d1dafb11d6d905ea33bd4eaea0dd04eb847bc0a1210ca9456143e31b8ce14caf4a0646bc639707d10aba3e652495977a7a6d3fc41ef6364c47c2266aa410a490f920f407161207ec5352e1ce6c3822d3a2ae063583609298790a58b73fccaac3665dd78ab4a15d4c12a996799f41dc79b9f3d57a627a7517cb0b51c0cecf43519f19db25073246fa0d8e29d209ee94372325d56aa5ae8d45", 0x9b}], 0x1, &(0x7f0000000f40), 0x0, 0x4045}, 0x610}], 0x1, 0x4001) setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000400)=""/221, 0xdd}, &(0x7f0000000200), 0x10}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24}}, 0x2, 0x5, 0x1ff, 0x5fc, 0x3a}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000600)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x13860b96, 0xa0000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000800)={'ifb0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) 2018/04/21 01:39:54 executing program 6: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x4, 0x0) pkey_mprotect(&(0x7f000050d000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) clone(0x0, &(0x7f0000000140), &(0x7f0000006000), &(0x7f0000000100), &(0x7f0000001f9d)) 2018/04/21 01:39:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) accept4(r0, &(0x7f00000001c0)=@can, &(0x7f0000000080)=0x3, 0x0) 2018/04/21 01:39:54 executing program 7: r0 = socket(0x1d, 0x0, 0x1) socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x54, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r3, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0xfffffe84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140), &(0x7f0000000180)) write$rdma_cm(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a0000000000"], 0x16) write$rdma_cm(r3, &(0x7f0000000000)=@listen={0x7, 0x8, 0xfa00, {r4}}, 0x10) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000002280)=[{{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000740)="964616d1dafb11d6d905ea33bd4eaea0dd04eb847bc0a1210ca9456143e31b8ce14caf4a0646bc639707d10aba3e652495977a7a6d3fc41ef6364c47c2266aa410a490f920f407161207ec5352e1ce6c3822d3a2ae063583609298790a58b73fccaac3665dd78ab4a15d4c12a996799f41dc79b9f3d57a627a7517cb0b51c0cecf43519f19db25073246fa0d8e29d209ee94372325d56aa5ae8d45", 0x9b}], 0x1, &(0x7f0000000f40), 0x0, 0x4045}, 0x610}], 0x1, 0x4001) setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000400)=""/221, 0xdd}, &(0x7f0000000200), 0x10}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24}}, 0x2, 0x5, 0x1ff, 0x5fc, 0x3a}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000600)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x13860b96, 0xa0000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000800)={'ifb0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) 2018/04/21 01:39:54 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vhan0\x00', 0x400}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'gretap0\x00', 0x600}) 2018/04/21 01:39:54 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x4, 0x0) pkey_mprotect(&(0x7f000050d000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) clone(0x0, &(0x7f0000000140), &(0x7f0000006000), &(0x7f0000000100), &(0x7f0000001f9d)) 2018/04/21 01:39:54 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@sco={0x1f}, 0x80, &(0x7f0000000180)}, 0x0) 2018/04/21 01:39:54 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKMODE={0x8, 0x11}]}, 0x28}, 0x1}, 0x0) 2018/04/21 01:39:54 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@sco={0x1f}, 0x80, &(0x7f0000000180)}, 0x0) [ 85.199644] netlink: 'syz-executor3': attribute type 17 has an invalid length. 2018/04/21 01:39:54 executing program 0: r0 = socket(0x1d, 0x0, 0x1) socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x54, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r3, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0xfffffe84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140), &(0x7f0000000180)) write$rdma_cm(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a0000000000"], 0x16) write$rdma_cm(r3, &(0x7f0000000000)=@listen={0x7, 0x8, 0xfa00, {r4}}, 0x10) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000002280)=[{{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000740)="964616d1dafb11d6d905ea33bd4eaea0dd04eb847bc0a1210ca9456143e31b8ce14caf4a0646bc639707d10aba3e652495977a7a6d3fc41ef6364c47c2266aa410a490f920f407161207ec5352e1ce6c3822d3a2ae063583609298790a58b73fccaac3665dd78ab4a15d4c12a996799f41dc79b9f3d57a627a7517cb0b51c0cecf43519f19db25073246fa0d8e29d209ee94372325d56aa5ae8d45", 0x9b}], 0x1, &(0x7f0000000f40), 0x0, 0x4045}, 0x610}], 0x1, 0x4001) setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000400)=""/221, 0xdd}, &(0x7f0000000200), 0x10}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24}}, 0x2, 0x5, 0x1ff, 0x5fc, 0x3a}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="9c000000a4bdcca904a354eb47b5f727318dc70cc08d4bd8f83c3c8f226cfc95050004c46d892163297d177c972efe1335734e4fd578e7321befb9b9d44fd4d124ddd92cc0a16d7383c877fc98f263a5363f57afb8dc9dc85172853f1114c2fa816d776b2a95cc40bf2dcc5a4f9fdb937356c2ad7f0825ff7a7ad518edaed43529c309432a9e45c6ef3fcb8df96a00b0394b9e4d1acb7f4df52837d4c6d2d7598313010dddbf1bb0a07ea1e17e8a8fea68e43c1511eeaa74647bbbed301a18cb0d01b97b156e69c0c6c7a1321fc782f175ea2a816db35d349777ec8c1020aac8a53a1d7dd2999ecb03a2eccda7a0d9b25a46aa7ab4718520489bf5398c286633e0ff8b9491c45c769181929eabcad00b9d3453644f32d436376cec8200c91b1318c2cfaabe35d4f087888e3272c9ba8dea9d538c472c2957870aa3c1df0b4b34b976a50b97d409cff065569031142c1f"], &(0x7f0000000600)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x13860b96, 0xa0000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000800)={'ifb0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) 2018/04/21 01:39:54 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKMODE={0x8, 0x11}]}, 0x28}, 0x1}, 0x0) 2018/04/21 01:39:54 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vhan0\x00', 0x400}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'gretap0\x00', 0x600}) 2018/04/21 01:39:54 executing program 7: r0 = socket(0x1d, 0x0, 0x1) socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x54, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r3, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0xfffffe84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140), &(0x7f0000000180)) write$rdma_cm(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a0000000000"], 0x16) write$rdma_cm(r3, &(0x7f0000000000)=@listen={0x7, 0x8, 0xfa00, {r4}}, 0x10) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000002280)=[{{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000740)="964616d1dafb11d6d905ea33bd4eaea0dd04eb847bc0a1210ca9456143e31b8ce14caf4a0646bc639707d10aba3e652495977a7a6d3fc41ef6364c47c2266aa410a490f920f407161207ec5352e1ce6c3822d3a2ae063583609298790a58b73fccaac3665dd78ab4a15d4c12a996799f41dc79b9f3d57a627a7517cb0b51c0cecf43519f19db25073246fa0d8e29d209ee94372325d56aa5ae8d45", 0x9b}], 0x1, &(0x7f0000000f40), 0x0, 0x4045}, 0x610}], 0x1, 0x4001) setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000400)=""/221, 0xdd}, &(0x7f0000000200), 0x10}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24}}, 0x2, 0x5, 0x1ff, 0x5fc, 0x3a}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000600)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x13860b96, 0xa0000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000800)={'ifb0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) 2018/04/21 01:39:54 executing program 2: r0 = socket(0x1d, 0x0, 0x1) socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x54, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r3, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0xfffffe84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140), &(0x7f0000000180)) write$rdma_cm(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a0000000000"], 0x16) write$rdma_cm(r3, &(0x7f0000000000)=@listen={0x7, 0x8, 0xfa00, {r4}}, 0x10) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000002280)=[{{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000740)="964616d1dafb11d6d905ea33bd4eaea0dd04eb847bc0a1210ca9456143e31b8ce14caf4a0646bc639707d10aba3e652495977a7a6d3fc41ef6364c47c2266aa410a490f920f407161207ec5352e1ce6c3822d3a2ae063583609298790a58b73fccaac3665dd78ab4a15d4c12a996799f41dc79b9f3d57a627a7517cb0b51c0cecf43519f19db25073246fa0d8e29d209ee94372325d56aa5ae8d45", 0x9b}], 0x1, &(0x7f0000000f40), 0x0, 0x4045}, 0x610}], 0x1, 0x4001) setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000400)=""/221, 0xdd}, &(0x7f0000000200), 0x10}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24}}, 0x2, 0x5, 0x1ff, 0x5fc, 0x3a}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000600)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x13860b96, 0xa0000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000800)={'ifb0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) 2018/04/21 01:39:54 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x4, 0x0) pkey_mprotect(&(0x7f000050d000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) clone(0x0, &(0x7f0000000140), &(0x7f0000006000), &(0x7f0000000100), &(0x7f0000001f9d)) 2018/04/21 01:39:54 executing program 5: r0 = socket(0x1d, 0x0, 0x1) socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x54, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r3, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0xfffffe84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140), &(0x7f0000000180)) write$rdma_cm(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a0000000000"], 0x16) write$rdma_cm(r3, &(0x7f0000000000)=@listen={0x7, 0x8, 0xfa00, {r4}}, 0x10) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000002280)=[{{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000740)="964616d1dafb11d6d905ea33bd4eaea0dd04eb847bc0a1210ca9456143e31b8ce14caf4a0646bc639707d10aba3e652495977a7a6d3fc41ef6364c47c2266aa410a490f920f407161207ec5352e1ce6c3822d3a2ae063583609298790a58b73fccaac3665dd78ab4a15d4c12a996799f41dc79b9f3d57a627a7517cb0b51c0cecf43519f19db25073246fa0d8e29d209ee94372325d56aa5ae8d45", 0x9b}], 0x1, &(0x7f0000000f40), 0x0, 0x4045}, 0x610}], 0x1, 0x4001) setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000400)=""/221, 0xdd}, &(0x7f0000000200), 0x10}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24}}, 0x2, 0x5, 0x1ff, 0x5fc, 0x3a}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000600)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x13860b96, 0xa0000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000800)={'ifb0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) 2018/04/21 01:39:54 executing program 6: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x4, 0x0) pkey_mprotect(&(0x7f000050d000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) clone(0x0, &(0x7f0000000140), &(0x7f0000006000), &(0x7f0000000100), &(0x7f0000001f9d)) [ 85.413808] netlink: 'syz-executor3': attribute type 17 has an invalid length. 2018/04/21 01:39:54 executing program 0: r0 = socket(0x1d, 0x0, 0x1) socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x54, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r3, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0xfffffe84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140), &(0x7f0000000180)) write$rdma_cm(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a0000000000"], 0x16) write$rdma_cm(r3, &(0x7f0000000000)=@listen={0x7, 0x8, 0xfa00, {r4}}, 0x10) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000002280)=[{{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000740)="964616d1dafb11d6d905ea33bd4eaea0dd04eb847bc0a1210ca9456143e31b8ce14caf4a0646bc639707d10aba3e652495977a7a6d3fc41ef6364c47c2266aa410a490f920f407161207ec5352e1ce6c3822d3a2ae063583609298790a58b73fccaac3665dd78ab4a15d4c12a996799f41dc79b9f3d57a627a7517cb0b51c0cecf43519f19db25073246fa0d8e29d209ee94372325d56aa5ae8d45", 0x9b}], 0x1, &(0x7f0000000f40), 0x0, 0x4045}, 0x610}], 0x1, 0x4001) setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000400)=""/221, 0xdd}, &(0x7f0000000200), 0x10}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24}}, 0x2, 0x5, 0x1ff, 0x5fc, 0x3a}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000600)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x13860b96, 0xa0000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000800)={'ifb0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) 2018/04/21 01:39:54 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@sco={0x1f}, 0x80, &(0x7f0000000180)}, 0x0) 2018/04/21 01:39:54 executing program 6: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x4, 0x0) pkey_mprotect(&(0x7f000050d000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) clone(0x0, &(0x7f0000000140), &(0x7f0000006000), &(0x7f0000000100), &(0x7f0000001f9d)) 2018/04/21 01:39:54 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@sco={0x1f}, 0x80, &(0x7f0000000180)}, 0x0) 2018/04/21 01:39:54 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000001ac0)=[{&(0x7f0000000000)="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", 0x200}]) 2018/04/21 01:39:54 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) accept4(r0, &(0x7f00000001c0)=@can, &(0x7f0000000080)=0x3, 0x0) 2018/04/21 01:39:54 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 2018/04/21 01:39:54 executing program 0: r0 = socket(0x1d, 0x0, 0x1) socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x54, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r3, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0xfffffe84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140), &(0x7f0000000180)) write$rdma_cm(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a0000000000"], 0x16) write$rdma_cm(r3, &(0x7f0000000000)=@listen={0x7, 0x8, 0xfa00, {r4}}, 0x10) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000002280)=[{{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000740)="964616d1dafb11d6d905ea33bd4eaea0dd04eb847bc0a1210ca9456143e31b8ce14caf4a0646bc639707d10aba3e652495977a7a6d3fc41ef6364c47c2266aa410a490f920f407161207ec5352e1ce6c3822d3a2ae063583609298790a58b73fccaac3665dd78ab4a15d4c12a996799f41dc79b9f3d57a627a7517cb0b51c0cecf43519f19db25073246fa0d8e29d209ee94372325d56aa5ae8d45", 0x9b}], 0x1, &(0x7f0000000f40), 0x0, 0x4045}, 0x610}], 0x1, 0x4001) setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000400)=""/221, 0xdd}, &(0x7f0000000200), 0x10}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24}}, 0x2, 0x5, 0x1ff, 0x5fc, 0x3a}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000600)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x13860b96, 0xa0000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000800)={'ifb0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) 2018/04/21 01:39:54 executing program 2: r0 = socket(0x1d, 0x0, 0x1) socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x54, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r3, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0xfffffe84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140), &(0x7f0000000180)) write$rdma_cm(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a0000000000"], 0x16) write$rdma_cm(r3, &(0x7f0000000000)=@listen={0x7, 0x8, 0xfa00, {r4}}, 0x10) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000002280)=[{{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000740)="964616d1dafb11d6d905ea33bd4eaea0dd04eb847bc0a1210ca9456143e31b8ce14caf4a0646bc639707d10aba3e652495977a7a6d3fc41ef6364c47c2266aa410a490f920f407161207ec5352e1ce6c3822d3a2ae063583609298790a58b73fccaac3665dd78ab4a15d4c12a996799f41dc79b9f3d57a627a7517cb0b51c0cecf43519f19db25073246fa0d8e29d209ee94372325d56aa5ae8d45", 0x9b}], 0x1, &(0x7f0000000f40), 0x0, 0x4045}, 0x610}], 0x1, 0x4001) setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000400)=""/221, 0xdd}, &(0x7f0000000200), 0x10}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24}}, 0x2, 0x5, 0x1ff, 0x5fc, 0x3a}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000600)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x13860b96, 0xa0000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000800)={'ifb0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) 2018/04/21 01:39:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) [ 85.791198] Dev loop4: unable to read RDB block 1 [ 85.796301] loop4: unable to read partition table [ 85.803219] device lo entered promiscuous mode 2018/04/21 01:39:54 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@sco={0x1f}, 0x80, &(0x7f0000000180)}, 0x0) 2018/04/21 01:39:54 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) accept4(r0, &(0x7f00000001c0)=@can, &(0x7f0000000080)=0x3, 0x0) 2018/04/21 01:39:54 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) [ 85.854398] loop4: partition table beyond EOD, truncated [ 85.860100] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 85.873944] device lo left promiscuous mode [ 85.924844] device lo entered promiscuous mode 2018/04/21 01:39:54 executing program 2: r0 = socket(0x1d, 0x0, 0x1) socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x54, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r3, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0xfffffe84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140), &(0x7f0000000180)) write$rdma_cm(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a0000000000"], 0x16) write$rdma_cm(r3, &(0x7f0000000000)=@listen={0x7, 0x8, 0xfa00, {r4}}, 0x10) close(r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000002280)=[{{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000740)="964616d1dafb11d6d905ea33bd4eaea0dd04eb847bc0a1210ca9456143e31b8ce14caf4a0646bc639707d10aba3e652495977a7a6d3fc41ef6364c47c2266aa410a490f920f407161207ec5352e1ce6c3822d3a2ae063583609298790a58b73fccaac3665dd78ab4a15d4c12a996799f41dc79b9f3d57a627a7517cb0b51c0cecf43519f19db25073246fa0d8e29d209ee94372325d56aa5ae8d45", 0x9b}], 0x1, &(0x7f0000000f40), 0x0, 0x4045}, 0x610}], 0x1, 0x4001) setsockopt$inet6_group_source_req(r5, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000400)=""/221, 0xdd}, &(0x7f0000000200), 0x10}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24}}, 0x2, 0x5, 0x1ff, 0x5fc, 0x3a}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000600)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x13860b96, 0xa0000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000800)={'ifb0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) [ 85.953249] Dev loop4: unable to read RDB block 1 [ 85.958241] loop4: unable to read partition table [ 86.015794] loop4: partition table beyond EOD, truncated [ 86.021406] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 2018/04/21 01:39:55 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000001ac0)=[{&(0x7f0000000000)="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", 0x200}]) 2018/04/21 01:39:55 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 2018/04/21 01:39:55 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) accept4(r0, &(0x7f00000001c0)=@can, &(0x7f0000000080)=0x3, 0x0) 2018/04/21 01:39:55 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x14, 0x1, 0x206, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/21 01:39:55 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xe800, 0x1, &(0x7f0000000600)=[{&(0x7f0000000640)="eb3c906d6b66732e666174000200010a0200027400f8", 0x16}], 0x0, &(0x7f0000000440)) 2018/04/21 01:39:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="800000000000000002004e22ac14141400000000000000000000000000000000000000cd2c6596d844d4490000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000004000000d9004e200000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000102000000000000000000000718200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20e00000025af164c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fd812a7d6cdbc30000000000000000000000000000000000000000000000000000000000000012000000000000000000000000f102060736a9c471b25468779ffffb1357f632e3d1101843640267f885d74f8c5485d48ef24c11f43d620116eb41b71e30045dffbbff7d2ce5229b4c17d7e98fb2a1bd106df20004ea759f953420934b432fb7f0dc8a0f4736ea7b803443fb85e3fa7297616907d74197be286ba68dd3a7359f5cf046893a10b452e21071107625a251a6c6d510dc14e74c5b51b06829b9f962d9011dffbc3743d97fe092e4587f69bd4d48926917d2824697ba7d3b4b6276e38ccd77c0c4f06ed82af4bd3a4a812e11020d1c8a1b5d493e50403f717ae85600ec70352187b6fc7dd542e44a2702a269469fac6dda4a29798f29251e5e9ca8d534319914352bc02d82356b83786dc99a109afc2288e1c5c4efdcca309ec1b3f8024f8c197c86861d8ab11e079b729b3589245c20"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:55 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) [ 86.204980] device lo left promiscuous mode [ 86.213604] Dev loop4: unable to read RDB block 1 [ 86.218644] loop4: unable to read partition table [ 86.228995] FAT-fs (loop0): bogus sectors per cluster 0 [ 86.234697] FAT-fs (loop0): Can't find a valid FAT filesystem [ 86.252851] loop4: partition table beyond EOD, truncated [ 86.258551] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 86.290938] FAT-fs (loop0): bogus sectors per cluster 0 [ 86.296420] FAT-fs (loop0): Can't find a valid FAT filesystem 2018/04/21 01:39:55 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:55 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x14, 0x1, 0x206, 0x1}, 0x14}, 0x1}, 0x0) [ 86.303935] device lo entered promiscuous mode [ 86.321408] device lo entered promiscuous mode [ 86.331952] device lo entered promiscuous mode 2018/04/21 01:39:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:55 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000001ac0)=[{&(0x7f0000000000)="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", 0x200}]) 2018/04/21 01:39:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="800000000000000002004e22ac14141400000000000000000000000000000000000000cd2c6596d844d4490000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000004000000d9004e200000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000102000000000000000000000718200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20e00000025af164c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fd812a7d6cdbc30000000000000000000000000000000000000000000000000000000000000012000000000000000000000000f102060736a9c471b25468779ffffb1357f632e3d1101843640267f885d74f8c5485d48ef24c11f43d620116eb41b71e30045dffbbff7d2ce5229b4c17d7e98fb2a1bd106df20004ea759f953420934b432fb7f0dc8a0f4736ea7b803443fb85e3fa7297616907d74197be286ba68dd3a7359f5cf046893a10b452e21071107625a251a6c6d510dc14e74c5b51b06829b9f962d9011dffbc3743d97fe092e4587f69bd4d48926917d2824697ba7d3b4b6276e38ccd77c0c4f06ed82af4bd3a4a812e11020d1c8a1b5d493e50403f717ae85600ec70352187b6fc7dd542e44a2702a269469fac6dda4a29798f29251e5e9ca8d534319914352bc02d82356b83786dc99a109afc2288e1c5c4efdcca309ec1b3f8024f8c197c86861d8ab11e079b729b3589245c20"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) [ 86.449266] device lo entered promiscuous mode 2018/04/21 01:39:55 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xe800, 0x1, &(0x7f0000000600)=[{&(0x7f0000000640)="eb3c906d6b66732e666174000200010a0200027400f8", 0x16}], 0x0, &(0x7f0000000440)) [ 86.519373] Dev loop4: unable to read RDB block 1 [ 86.524405] loop4: unable to read partition table 2018/04/21 01:39:55 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x14, 0x1, 0x206, 0x1}, 0x14}, 0x1}, 0x0) [ 86.568161] device lo left promiscuous mode [ 86.589284] loop4: partition table beyond EOD, truncated [ 86.594928] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 86.605237] device lo left promiscuous mode [ 86.617836] FAT-fs (loop0): bogus sectors per cluster 0 [ 86.623341] FAT-fs (loop0): Can't find a valid FAT filesystem [ 86.628337] device lo entered promiscuous mode 2018/04/21 01:39:55 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) [ 86.640405] device lo left promiscuous mode [ 86.647479] device lo entered promiscuous mode [ 86.661255] device lo entered promiscuous mode [ 86.675587] device lo entered promiscuous mode 2018/04/21 01:39:55 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xe800, 0x1, &(0x7f0000000600)=[{&(0x7f0000000640)="eb3c906d6b66732e666174000200010a0200027400f8", 0x16}], 0x0, &(0x7f0000000440)) [ 86.760838] device lo left promiscuous mode 2018/04/21 01:39:55 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000001ac0)=[{&(0x7f0000000000)="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", 0x200}]) 2018/04/21 01:39:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) [ 86.843417] device lo entered promiscuous mode [ 86.849177] FAT-fs (loop0): bogus sectors per cluster 0 [ 86.854733] FAT-fs (loop0): Can't find a valid FAT filesystem [ 86.894900] Dev loop4: unable to read RDB block 1 [ 86.899890] loop4: unable to read partition table [ 86.919258] device lo left promiscuous mode [ 86.948500] device lo entered promiscuous mode [ 86.953388] loop4: partition table beyond EOD, truncated [ 86.958960] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 2018/04/21 01:39:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="800000000000000002004e22ac14141400000000000000000000000000000000000000cd2c6596d844d4490000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000004000000d9004e200000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000102000000000000000000000718200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20e00000025af164c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fd812a7d6cdbc30000000000000000000000000000000000000000000000000000000000000012000000000000000000000000f102060736a9c471b25468779ffffb1357f632e3d1101843640267f885d74f8c5485d48ef24c11f43d620116eb41b71e30045dffbbff7d2ce5229b4c17d7e98fb2a1bd106df20004ea759f953420934b432fb7f0dc8a0f4736ea7b803443fb85e3fa7297616907d74197be286ba68dd3a7359f5cf046893a10b452e21071107625a251a6c6d510dc14e74c5b51b06829b9f962d9011dffbc3743d97fe092e4587f69bd4d48926917d2824697ba7d3b4b6276e38ccd77c0c4f06ed82af4bd3a4a812e11020d1c8a1b5d493e50403f717ae85600ec70352187b6fc7dd542e44a2702a269469fac6dda4a29798f29251e5e9ca8d534319914352bc02d82356b83786dc99a109afc2288e1c5c4efdcca309ec1b3f8024f8c197c86861d8ab11e079b729b3589245c20"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:56 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x14, 0x1, 0x206, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/21 01:39:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="800000000000000002004e22ac14141400000000000000000000000000000000000000cd2c6596d844d4490000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000004000000d9004e200000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000102000000000000000000000718200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20e00000025af164c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fd812a7d6cdbc30000000000000000000000000000000000000000000000000000000000000012000000000000000000000000f102060736a9c471b25468779ffffb1357f632e3d1101843640267f885d74f8c5485d48ef24c11f43d620116eb41b71e30045dffbbff7d2ce5229b4c17d7e98fb2a1bd106df20004ea759f953420934b432fb7f0dc8a0f4736ea7b803443fb85e3fa7297616907d74197be286ba68dd3a7359f5cf046893a10b452e21071107625a251a6c6d510dc14e74c5b51b06829b9f962d9011dffbc3743d97fe092e4587f69bd4d48926917d2824697ba7d3b4b6276e38ccd77c0c4f06ed82af4bd3a4a812e11020d1c8a1b5d493e50403f717ae85600ec70352187b6fc7dd542e44a2702a269469fac6dda4a29798f29251e5e9ca8d534319914352bc02d82356b83786dc99a109afc2288e1c5c4efdcca309ec1b3f8024f8c197c86861d8ab11e079b729b3589245c20"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:56 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xe800, 0x1, &(0x7f0000000600)=[{&(0x7f0000000640)="eb3c906d6b66732e666174000200010a0200027400f8", 0x16}], 0x0, &(0x7f0000000440)) 2018/04/21 01:39:56 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfffffffffffffc25, &(0x7f0000000200)=""/251}, 0x48) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) [ 87.078942] device lo left promiscuous mode [ 87.090343] FAT-fs (loop0): bogus sectors per cluster 0 [ 87.095947] FAT-fs (loop0): Can't find a valid FAT filesystem [ 87.105543] device lo left promiscuous mode [ 87.130613] device lo left promiscuous mode 2018/04/21 01:39:56 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae9c, &(0x7f0000000040)=ANY=[@ANYBLOB="01000009"]) [ 87.152958] device lo entered promiscuous mode [ 87.170324] device lo left promiscuous mode [ 87.185088] device lo entered promiscuous mode 2018/04/21 01:39:56 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000000)={0xff, 0x8, [0x0, 0x0]}) [ 87.200663] device lo left promiscuous mode [ 87.213556] device lo entered promiscuous mode [ 87.232774] device lo entered promiscuous mode 2018/04/21 01:39:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="1f000000020319000000da6f8142bdb1e249853b09000500010100ff3ffe58", 0x1f}], 0x1) 2018/04/21 01:39:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfffffffffffffc25, &(0x7f0000000200)=""/251}, 0x48) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) [ 87.257150] device lo entered promiscuous mode 2018/04/21 01:39:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:56 executing program 2: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000dfaff0)="010000000300060000071a00009139cc", 0x10) close(r0) 2018/04/21 01:39:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="1f000000020319000000da6f8142bdb1e249853b09000500010100ff3ffe58", 0x1f}], 0x1) 2018/04/21 01:39:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) [ 87.447931] device lo left promiscuous mode [ 87.481376] device lo left promiscuous mode [ 87.505851] device lo entered promiscuous mode [ 87.521563] device lo entered promiscuous mode 2018/04/21 01:39:56 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000dfaff0)="010000000300060000071a00009139cc", 0x10) close(r0) 2018/04/21 01:39:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="1f000000020319000000da6f8142bdb1e249853b09000500010100ff3ffe58", 0x1f}], 0x1) 2018/04/21 01:39:56 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000000)={0xff, 0x8, [0x0, 0x0]}) 2018/04/21 01:39:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfffffffffffffc25, &(0x7f0000000200)=""/251}, 0x48) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 2018/04/21 01:39:56 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae9c, &(0x7f0000000040)=ANY=[@ANYBLOB="01000009"]) 2018/04/21 01:39:56 executing program 2: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000dfaff0)="010000000300060000071a00009139cc", 0x10) close(r0) 2018/04/21 01:39:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x20004000027, &(0x7f0000000180), &(0x7f00000001c0)=0x1c930366) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x816}], 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000440)={0xffffffffffffff80, 0x3, 0x62, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_buf(r1, 0x0, 0x200000000002, &(0x7f0000000640)=""/129, &(0x7f0000000380)=0x81) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000d00)=@filter={'filter\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x238, 0x328, 0x238, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000540), {[{{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e22, 0x4e24, 0x4e24, 0x4e21, [0x5, 0x1, 0x7d, 0x0, 0xbe9, 0x3, 0x7, 0x6, 0x2, 0x2, 0x74, 0x3, 0x100000001, 0x2, 0x8, 0x3, 0x7ff, 0x80, 0x8001, 0x1, 0x1, 0x7ff, 0x7f, 0x0, 0x40, 0xb600, 0x6, 0x20dd, 0x1000, 0x1, 0x1, 0x7, 0x80, 0x1, 0x0, 0x1, 0xa14, 0x1, 0x4, 0xcc, 0x7a, 0x7fffffff, 0x40, 0x1, 0xed8, 0x7, 0x9, 0x7, 0x2, 0xf421, 0x3ff, 0x6, 0x9, 0x2, 0x1, 0x4, 0x80, 0x5, 0x9, 0x42, 0x81, 0x6, 0x7], 0x1, [{0x47f, 0x9, 0x5}, {0x4, 0x0, 0x7}, {0x9, 0x5f, 0x2}, {0x1, 0x47, 0x2}], 0x0, 0x9e01ad92cc96ef1, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x5, 0x4, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bind$llc(r5, &(0x7f00000003c0)={0x1a, 0x303, 0x80000000, 0xcb7, 0x8e, 0x5, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x1, 0x7, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0xdaf}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc)="3b692cec", 0x4) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000000500)=@routing={0x3f, 0x0, 0x2, 0x5}, 0x8) 2018/04/21 01:39:56 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f000000dfed)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000f000)={0x9, 0x0, 0x0, 0x0, "2a5a7aa6e53ff258647a2c1a8eea9f6c6d94820ca1091fcd87f112b28bb336f2fc0f56e07866b5874c098814"}) 2018/04/21 01:39:56 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000000)={0xff, 0x8, [0x0, 0x0]}) 2018/04/21 01:39:56 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f000000dfed)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000f000)={0x9, 0x0, 0x0, 0x0, "2a5a7aa6e53ff258647a2c1a8eea9f6c6d94820ca1091fcd87f112b28bb336f2fc0f56e07866b5874c098814"}) 2018/04/21 01:39:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="1f000000020319000000da6f8142bdb1e249853b09000500010100ff3ffe58", 0x1f}], 0x1) 2018/04/21 01:39:56 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000dfaff0)="010000000300060000071a00009139cc", 0x10) close(r0) [ 87.672847] device lo left promiscuous mode 2018/04/21 01:39:56 executing program 2: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000dfaff0)="010000000300060000071a00009139cc", 0x10) close(r0) 2018/04/21 01:39:56 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae9c, &(0x7f0000000040)=ANY=[@ANYBLOB="01000009"]) [ 87.729690] device lo entered promiscuous mode 2018/04/21 01:39:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfffffffffffffc25, &(0x7f0000000200)=""/251}, 0x48) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 2018/04/21 01:39:56 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000000)={0xff, 0x8, [0x0, 0x0]}) 2018/04/21 01:39:56 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f000000dfed)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000f000)={0x9, 0x0, 0x0, 0x0, "2a5a7aa6e53ff258647a2c1a8eea9f6c6d94820ca1091fcd87f112b28bb336f2fc0f56e07866b5874c098814"}) 2018/04/21 01:39:57 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000dfaff0)="010000000300060000071a00009139cc", 0x10) close(r0) 2018/04/21 01:39:57 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f000000dfed)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000f000)={0x9, 0x0, 0x0, 0x0, "2a5a7aa6e53ff258647a2c1a8eea9f6c6d94820ca1091fcd87f112b28bb336f2fc0f56e07866b5874c098814"}) 2018/04/21 01:39:57 executing program 2: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000dfaff0)="010000000300060000071a00009139cc", 0x10) close(r0) 2018/04/21 01:39:57 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) io_setup(0x6, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000240)}]) 2018/04/21 01:39:57 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f000000dfed)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000f000)={0x9, 0x0, 0x0, 0x0, "2a5a7aa6e53ff258647a2c1a8eea9f6c6d94820ca1091fcd87f112b28bb336f2fc0f56e07866b5874c098814"}) 2018/04/21 01:39:57 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae9c, &(0x7f0000000040)=ANY=[@ANYBLOB="01000009"]) 2018/04/21 01:39:57 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000d81ff8)=0x101) r0 = eventfd(0x8000000001fc) write$eventfd(r0, &(0x7f0000000080)=0xffffffffffffff90, 0x8) write$eventfd(r0, &(0x7f0000000040), 0x8) 2018/04/21 01:39:57 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) pipe2(&(0x7f0000000100), 0x0) 2018/04/21 01:39:57 executing program 7: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={'nouuid,', {[{@noalign='noalign', 0x2c}, {@swalloc='swalloc', 0x2c}, {@swidth={'swidth', 0x3d, [0x35, 0x0]}, 0x2c}]}}) 2018/04/21 01:39:57 executing program 5: futex(&(0x7f000000cffc), 0x400000008, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) 2018/04/21 01:39:57 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f000000dfed)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000f000)={0x9, 0x0, 0x0, 0x0, "2a5a7aa6e53ff258647a2c1a8eea9f6c6d94820ca1091fcd87f112b28bb336f2fc0f56e07866b5874c098814"}) 2018/04/21 01:39:57 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) pipe2(&(0x7f0000000100), 0x0) 2018/04/21 01:39:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000480)="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", 0x101, 0x400}], 0x0, &(0x7f0000000440)) 2018/04/21 01:39:57 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) io_setup(0x6, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000240)}]) [ 88.214191] XFS (loop7): sunit and swidth options incompatible with the noalign option [ 88.250777] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities [ 88.320488] XFS (loop7): sunit and swidth options incompatible with the noalign option [ 88.339152] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities 2018/04/21 01:39:58 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) pipe2(&(0x7f0000000100), 0x0) 2018/04/21 01:39:58 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f000000dfed)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000f000)={0x9, 0x0, 0x0, 0x0, "2a5a7aa6e53ff258647a2c1a8eea9f6c6d94820ca1091fcd87f112b28bb336f2fc0f56e07866b5874c098814"}) 2018/04/21 01:39:58 executing program 5: futex(&(0x7f000000cffc), 0x400000008, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) 2018/04/21 01:39:58 executing program 7: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={'nouuid,', {[{@noalign='noalign', 0x2c}, {@swalloc='swalloc', 0x2c}, {@swidth={'swidth', 0x3d, [0x35, 0x0]}, 0x2c}]}}) 2018/04/21 01:39:58 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) io_setup(0x6, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000240)}]) 2018/04/21 01:39:58 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6}, 0x10) 2018/04/21 01:39:58 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000d81ff8)=0x101) r0 = eventfd(0x8000000001fc) write$eventfd(r0, &(0x7f0000000080)=0xffffffffffffff90, 0x8) write$eventfd(r0, &(0x7f0000000040), 0x8) 2018/04/21 01:39:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000480)="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", 0x101, 0x400}], 0x0, &(0x7f0000000440)) 2018/04/21 01:39:58 executing program 5: futex(&(0x7f000000cffc), 0x400000008, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) [ 89.002088] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities [ 89.038171] XFS (loop7): sunit and swidth options incompatible with the noalign option [ 89.072692] device syz_tun entered promiscuous mode 2018/04/21 01:39:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f00000000c0)="0f017c0026f00fc78c0078360fea3826360f2212baf80c66b8f3baef8b66efbafc0cb0c1ee36672e260fc798ec000000bad10466ed660f091e66b9ff0200000f32", 0x41}], 0x1, 0x20, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 89.250183] device syz_tun left promiscuous mode [ 89.271730] kvm: emulating exchange as write 2018/04/21 01:39:58 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000d81ff8)=0x101) r0 = eventfd(0x8000000001fc) write$eventfd(r0, &(0x7f0000000080)=0xffffffffffffff90, 0x8) write$eventfd(r0, &(0x7f0000000040), 0x8) 2018/04/21 01:39:58 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) pipe2(&(0x7f0000000100), 0x0) 2018/04/21 01:39:58 executing program 5: futex(&(0x7f000000cffc), 0x400000008, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) 2018/04/21 01:39:58 executing program 7: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={'nouuid,', {[{@noalign='noalign', 0x2c}, {@swalloc='swalloc', 0x2c}, {@swidth={'swidth', 0x3d, [0x35, 0x0]}, 0x2c}]}}) 2018/04/21 01:39:58 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6}, 0x10) 2018/04/21 01:39:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f00000000c0)="0f017c0026f00fc78c0078360fea3826360f2212baf80c66b8f3baef8b66efbafc0cb0c1ee36672e260fc798ec000000bad10466ed660f091e66b9ff0200000f32", 0x41}], 0x1, 0x20, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:39:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000480)="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", 0x101, 0x400}], 0x0, &(0x7f0000000440)) 2018/04/21 01:39:58 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) io_setup(0x6, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000240)}]) [ 89.972750] device syz_tun entered promiscuous mode [ 89.984687] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities [ 90.006587] XFS (loop7): sunit and swidth options incompatible with the noalign option 2018/04/21 01:39:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f00000000c0)="0f017c0026f00fc78c0078360fea3826360f2212baf80c66b8f3baef8b66efbafc0cb0c1ee36672e260fc798ec000000bad10466ed660f091e66b9ff0200000f32", 0x41}], 0x1, 0x20, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:39:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000009c0)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000000a00)=@setlink={0x34, 0x13, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x14, 0x2b, [@nested={0x10, 0x3, [@typed={0x4, 0x0, @fd}]}]}]}, 0x34}, 0x1}, 0x0) 2018/04/21 01:39:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/21 01:39:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000480)="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", 0x101, 0x400}], 0x0, &(0x7f0000000440)) 2018/04/21 01:39:59 executing program 7: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={'nouuid,', {[{@noalign='noalign', 0x2c}, {@swalloc='swalloc', 0x2c}, {@swidth={'swidth', 0x3d, [0x35, 0x0]}, 0x2c}]}}) 2018/04/21 01:39:59 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6}, 0x10) [ 90.188390] device syz_tun left promiscuous mode [ 90.207892] netlink: 'syz-executor4': attribute type 3 has an invalid length. 2018/04/21 01:39:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f00000000c0)="0f017c0026f00fc78c0078360fea3826360f2212baf80c66b8f3baef8b66efbafc0cb0c1ee36672e260fc798ec000000bad10466ed660f091e66b9ff0200000f32", 0x41}], 0x1, 0x20, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 90.237485] XFS (loop7): sunit and swidth options incompatible with the noalign option [ 90.249466] netlink: 'syz-executor4': attribute type 3 has an invalid length. 2018/04/21 01:39:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) [ 90.298115] device syz_tun entered promiscuous mode [ 90.301791] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities [ 90.444196] device syz_tun left promiscuous mode 2018/04/21 01:39:59 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6}, 0x10) 2018/04/21 01:39:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f00000000c0)="0f017c0026f00fc78c0078360fea3826360f2212baf80c66b8f3baef8b66efbafc0cb0c1ee36672e260fc798ec000000bad10466ed660f091e66b9ff0200000f32", 0x41}], 0x1, 0x20, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:39:59 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000d81ff8)=0x101) r0 = eventfd(0x8000000001fc) write$eventfd(r0, &(0x7f0000000080)=0xffffffffffffff90, 0x8) write$eventfd(r0, &(0x7f0000000040), 0x8) 2018/04/21 01:39:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/21 01:39:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000009c0)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000000a00)=@setlink={0x34, 0x13, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x14, 0x2b, [@nested={0x10, 0x3, [@typed={0x4, 0x0, @fd}]}]}]}, 0x34}, 0x1}, 0x0) 2018/04/21 01:39:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/21 01:39:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/21 01:39:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f00000000c0)="0f017c0026f00fc78c0078360fea3826360f2212baf80c66b8f3baef8b66efbafc0cb0c1ee36672e260fc798ec000000bad10466ed660f091e66b9ff0200000f32", 0x41}], 0x1, 0x20, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 90.943204] netlink: 'syz-executor4': attribute type 3 has an invalid length. [ 90.955764] device syz_tun entered promiscuous mode 2018/04/21 01:40:00 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/21 01:40:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/21 01:40:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) [ 90.998600] syz-executor7 (7887) used greatest stack depth: 15000 bytes left 2018/04/21 01:40:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000009c0)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000000a00)=@setlink={0x34, 0x13, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x14, 0x2b, [@nested={0x10, 0x3, [@typed={0x4, 0x0, @fd}]}]}]}, 0x34}, 0x1}, 0x0) 2018/04/21 01:40:00 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) read$eventfd(r1, &(0x7f0000000040), 0x8) read$eventfd(r1, &(0x7f0000000000), 0x8) read$eventfd(r1, &(0x7f0000000340), 0x8) ioctl$UFFDIO_UNREGISTER(r2, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) [ 91.054827] device syz_tun left promiscuous mode 2018/04/21 01:40:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) r1 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(r1, r0) 2018/04/21 01:40:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/21 01:40:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f00000000c0)="0f017c0026f00fc78c0078360fea3826360f2212baf80c66b8f3baef8b66efbafc0cb0c1ee36672e260fc798ec000000bad10466ed660f091e66b9ff0200000f32", 0x41}], 0x1, 0x20, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:40:00 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) [ 91.156714] netlink: 'syz-executor4': attribute type 3 has an invalid length. 2018/04/21 01:40:00 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt(r0, 0x800000000000010d, 0x5, &(0x7f000031df55)=""/4, &(0x7f0000b91000)=0x29c) 2018/04/21 01:40:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) r1 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(r1, r0) 2018/04/21 01:40:01 executing program 7: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00008f2000)={0xffffffffffffffff}) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f000012d000)) 2018/04/21 01:40:01 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt(r0, 0x800000000000010d, 0x5, &(0x7f000031df55)=""/4, &(0x7f0000b91000)=0x29c) 2018/04/21 01:40:01 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) read$eventfd(r1, &(0x7f0000000040), 0x8) read$eventfd(r1, &(0x7f0000000000), 0x8) read$eventfd(r1, &(0x7f0000000340), 0x8) ioctl$UFFDIO_UNREGISTER(r2, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2018/04/21 01:40:01 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x5, 0x402, 0x0, {}, {}, {0x2, 0x0, 0x7}, 0x1, @can={{0x2, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "4ad36c1040604c4e"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:40:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{0x1a0}]}) 2018/04/21 01:40:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x800000000004e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa}}, 0x0, 0x5ee}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2}}, 0x0, 0x0, 0x0, 0x0, 0x26}, 0x98) 2018/04/21 01:40:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000009c0)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000000a00)=@setlink={0x34, 0x13, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x14, 0x2b, [@nested={0x10, 0x3, [@typed={0x4, 0x0, @fd}]}]}]}, 0x34}, 0x1}, 0x0) [ 92.038383] netlink: 'syz-executor4': attribute type 3 has an invalid length. [ 92.049980] capability: warning: `syz-executor7' uses 32-bit capabilities (legacy support in use) 2018/04/21 01:40:01 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x5, 0x402, 0x0, {}, {}, {0x2, 0x0, 0x7}, 0x1, @can={{0x2, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "4ad36c1040604c4e"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:40:01 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt(r0, 0x800000000000010d, 0x5, &(0x7f000031df55)=""/4, &(0x7f0000b91000)=0x29c) 2018/04/21 01:40:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) r1 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(r1, r0) 2018/04/21 01:40:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) r1 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(r1, r0) 2018/04/21 01:40:01 executing program 7: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00008f2000)={0xffffffffffffffff}) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f000012d000)) 2018/04/21 01:40:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{0x1a0}]}) 2018/04/21 01:40:01 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt(r0, 0x800000000000010d, 0x5, &(0x7f000031df55)=""/4, &(0x7f0000b91000)=0x29c) 2018/04/21 01:40:01 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x5, 0x402, 0x0, {}, {}, {0x2, 0x0, 0x7}, 0x1, @can={{0x2, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "4ad36c1040604c4e"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:40:01 executing program 7: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00008f2000)={0xffffffffffffffff}) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f000012d000)) 2018/04/21 01:40:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) r1 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(r1, r0) 2018/04/21 01:40:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) r1 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(r1, r0) 2018/04/21 01:40:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{0x1a0}]}) 2018/04/21 01:40:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{0x1a0}]}) 2018/04/21 01:40:01 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x5, 0x402, 0x0, {}, {}, {0x2, 0x0, 0x7}, 0x1, @can={{0x2, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "4ad36c1040604c4e"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:40:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x800000000004e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa}}, 0x0, 0x5ee}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2}}, 0x0, 0x0, 0x0, 0x0, 0x26}, 0x98) 2018/04/21 01:40:01 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) read$eventfd(r1, &(0x7f0000000040), 0x8) read$eventfd(r1, &(0x7f0000000000), 0x8) read$eventfd(r1, &(0x7f0000000340), 0x8) ioctl$UFFDIO_UNREGISTER(r2, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2018/04/21 01:40:01 executing program 7: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00008f2000)={0xffffffffffffffff}) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f000012d000)) 2018/04/21 01:40:02 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x800000000004e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa}}, 0x0, 0x5ee}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2}}, 0x0, 0x0, 0x0, 0x0, 0x26}, 0x98) 2018/04/21 01:40:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) r1 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(r1, r0) 2018/04/21 01:40:02 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) read$eventfd(r1, &(0x7f0000000040), 0x8) read$eventfd(r1, &(0x7f0000000000), 0x8) read$eventfd(r1, &(0x7f0000000340), 0x8) ioctl$UFFDIO_UNREGISTER(r2, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2018/04/21 01:40:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) r1 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(r1, r0) 2018/04/21 01:40:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{0x1a0}]}) 2018/04/21 01:40:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{0x1a0}]}) 2018/04/21 01:40:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) r1 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(r1, r0) 2018/04/21 01:40:02 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) read$eventfd(r1, &(0x7f0000000040), 0x8) read$eventfd(r1, &(0x7f0000000000), 0x8) read$eventfd(r1, &(0x7f0000000340), 0x8) ioctl$UFFDIO_UNREGISTER(r2, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2018/04/21 01:40:02 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{0x1a0}]}) 2018/04/21 01:40:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) r1 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(r1, r0) 2018/04/21 01:40:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x127e, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3b55b24547dc2894e2bedeb4df8d0f5bd71b140543b3ae45e9fdaef8f2dd42b55e9c0bb5ca6bad73eacbeb45bce7d5219f014aac62d017e731fe449b2e4e06af", "6be23607a67a3c3e93c6163d9174b5a1cd0423840650e64533d557e9ccd83d2b77ee0a4b3e3eb43b572f25c4fde7d94faf9d1bd731687342f2392b4395f64137", "9ec8accec46ec2f1664847fb84ed9046e7391c9ebf5915ae804f9edaa86e017b"}) 2018/04/21 01:40:02 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:02 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x800000000004e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa}}, 0x0, 0x5ee}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2}}, 0x0, 0x0, 0x0, 0x0, 0x26}, 0x98) 2018/04/21 01:40:02 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x127e, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3b55b24547dc2894e2bedeb4df8d0f5bd71b140543b3ae45e9fdaef8f2dd42b55e9c0bb5ca6bad73eacbeb45bce7d5219f014aac62d017e731fe449b2e4e06af", "6be23607a67a3c3e93c6163d9174b5a1cd0423840650e64533d557e9ccd83d2b77ee0a4b3e3eb43b572f25c4fde7d94faf9d1bd731687342f2392b4395f64137", "9ec8accec46ec2f1664847fb84ed9046e7391c9ebf5915ae804f9edaa86e017b"}) 2018/04/21 01:40:02 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) read$eventfd(r1, &(0x7f0000000040), 0x8) read$eventfd(r1, &(0x7f0000000000), 0x8) read$eventfd(r1, &(0x7f0000000340), 0x8) ioctl$UFFDIO_UNREGISTER(r2, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2018/04/21 01:40:03 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) read$eventfd(r1, &(0x7f0000000040), 0x8) read$eventfd(r1, &(0x7f0000000000), 0x8) read$eventfd(r1, &(0x7f0000000340), 0x8) ioctl$UFFDIO_UNREGISTER(r2, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2018/04/21 01:40:03 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) read$eventfd(r1, &(0x7f0000000040), 0x8) read$eventfd(r1, &(0x7f0000000000), 0x8) read$eventfd(r1, &(0x7f0000000340), 0x8) ioctl$UFFDIO_UNREGISTER(r2, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2018/04/21 01:40:03 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x800000000004e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa}}, 0x0, 0x5ee}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2}}, 0x0, 0x0, 0x0, 0x0, 0x26}, 0x98) 2018/04/21 01:40:03 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x800000000004e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa}}, 0x0, 0x5ee}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2}}, 0x0, 0x0, 0x0, 0x0, 0x26}, 0x98) 2018/04/21 01:40:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x127e, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3b55b24547dc2894e2bedeb4df8d0f5bd71b140543b3ae45e9fdaef8f2dd42b55e9c0bb5ca6bad73eacbeb45bce7d5219f014aac62d017e731fe449b2e4e06af", "6be23607a67a3c3e93c6163d9174b5a1cd0423840650e64533d557e9ccd83d2b77ee0a4b3e3eb43b572f25c4fde7d94faf9d1bd731687342f2392b4395f64137", "9ec8accec46ec2f1664847fb84ed9046e7391c9ebf5915ae804f9edaa86e017b"}) 2018/04/21 01:40:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:03 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x127e, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3b55b24547dc2894e2bedeb4df8d0f5bd71b140543b3ae45e9fdaef8f2dd42b55e9c0bb5ca6bad73eacbeb45bce7d5219f014aac62d017e731fe449b2e4e06af", "6be23607a67a3c3e93c6163d9174b5a1cd0423840650e64533d557e9ccd83d2b77ee0a4b3e3eb43b572f25c4fde7d94faf9d1bd731687342f2392b4395f64137", "9ec8accec46ec2f1664847fb84ed9046e7391c9ebf5915ae804f9edaa86e017b"}) 2018/04/21 01:40:03 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:04 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:04 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) read$eventfd(r1, &(0x7f0000000040), 0x8) read$eventfd(r1, &(0x7f0000000000), 0x8) read$eventfd(r1, &(0x7f0000000340), 0x8) ioctl$UFFDIO_UNREGISTER(r2, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2018/04/21 01:40:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:04 executing program 6: memfd_create(&(0x7f0000000400)="eabba32122600ea879d1b2aae9e9059c17c791208d0865a8f8e76805a0bd9b99194126653e8a874f88419815cacd490fd41068b33baa0001a0345e733b36b659a57a0e3c964065f37f769606f3a97a731d790ddc25661275424f755d8667dc0148da894f3001a1a0d4f496cc901510e36bfc625755d5381cba01e6be93123fb8bc9e008663f3a7d5a8991e6dfa37f5dcfcc713fbbb1371af", 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000837000)='loginuid\x00') sendfile(r0, r0, &(0x7f000017f000), 0x5) 2018/04/21 01:40:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:04 executing program 0: r0 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x1000000000d1, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_int(r0, 0x0, 0xcf, &(0x7f0000000000), 0x4) 2018/04/21 01:40:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:04 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x800000000004e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa}}, 0x0, 0x5ee}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2}}, 0x0, 0x0, 0x0, 0x0, 0x26}, 0x98) 2018/04/21 01:40:04 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) read$eventfd(r1, &(0x7f0000000040), 0x8) read$eventfd(r1, &(0x7f0000000000), 0x8) read$eventfd(r1, &(0x7f0000000340), 0x8) ioctl$UFFDIO_UNREGISTER(r2, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 2018/04/21 01:40:04 executing program 6: memfd_create(&(0x7f0000000400)="eabba32122600ea879d1b2aae9e9059c17c791208d0865a8f8e76805a0bd9b99194126653e8a874f88419815cacd490fd41068b33baa0001a0345e733b36b659a57a0e3c964065f37f769606f3a97a731d790ddc25661275424f755d8667dc0148da894f3001a1a0d4f496cc901510e36bfc625755d5381cba01e6be93123fb8bc9e008663f3a7d5a8991e6dfa37f5dcfcc713fbbb1371af", 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000837000)='loginuid\x00') sendfile(r0, r0, &(0x7f000017f000), 0x5) 2018/04/21 01:40:04 executing program 0: r0 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x1000000000d1, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_int(r0, 0x0, 0xcf, &(0x7f0000000000), 0x4) 2018/04/21 01:40:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/21 01:40:04 executing program 5: r0 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x1000000000d1, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_int(r0, 0x0, 0xcf, &(0x7f0000000000), 0x4) 2018/04/21 01:40:04 executing program 5: r0 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x1000000000d1, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_int(r0, 0x0, 0xcf, &(0x7f0000000000), 0x4) 2018/04/21 01:40:04 executing program 0: r0 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x1000000000d1, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_int(r0, 0x0, 0xcf, &(0x7f0000000000), 0x4) 2018/04/21 01:40:04 executing program 1: memfd_create(&(0x7f0000000400)="eabba32122600ea879d1b2aae9e9059c17c791208d0865a8f8e76805a0bd9b99194126653e8a874f88419815cacd490fd41068b33baa0001a0345e733b36b659a57a0e3c964065f37f769606f3a97a731d790ddc25661275424f755d8667dc0148da894f3001a1a0d4f496cc901510e36bfc625755d5381cba01e6be93123fb8bc9e008663f3a7d5a8991e6dfa37f5dcfcc713fbbb1371af", 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000837000)='loginuid\x00') sendfile(r0, r0, &(0x7f000017f000), 0x5) 2018/04/21 01:40:05 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:05 executing program 6: memfd_create(&(0x7f0000000400)="eabba32122600ea879d1b2aae9e9059c17c791208d0865a8f8e76805a0bd9b99194126653e8a874f88419815cacd490fd41068b33baa0001a0345e733b36b659a57a0e3c964065f37f769606f3a97a731d790ddc25661275424f755d8667dc0148da894f3001a1a0d4f496cc901510e36bfc625755d5381cba01e6be93123fb8bc9e008663f3a7d5a8991e6dfa37f5dcfcc713fbbb1371af", 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000837000)='loginuid\x00') sendfile(r0, r0, &(0x7f000017f000), 0x5) 2018/04/21 01:40:05 executing program 5: r0 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x1000000000d1, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_int(r0, 0x0, 0xcf, &(0x7f0000000000), 0x4) 2018/04/21 01:40:05 executing program 0: r0 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x1000000000d1, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_int(r0, 0x0, 0xcf, &(0x7f0000000000), 0x4) 2018/04/21 01:40:05 executing program 1: memfd_create(&(0x7f0000000400)="eabba32122600ea879d1b2aae9e9059c17c791208d0865a8f8e76805a0bd9b99194126653e8a874f88419815cacd490fd41068b33baa0001a0345e733b36b659a57a0e3c964065f37f769606f3a97a731d790ddc25661275424f755d8667dc0148da894f3001a1a0d4f496cc901510e36bfc625755d5381cba01e6be93123fb8bc9e008663f3a7d5a8991e6dfa37f5dcfcc713fbbb1371af", 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000837000)='loginuid\x00') sendfile(r0, r0, &(0x7f000017f000), 0x5) 2018/04/21 01:40:05 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001280)=[{&(0x7f0000001200)=""/73, 0x49}], 0x1, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x7005, &(0x7f0000000080)) 2018/04/21 01:40:05 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x1000000000002, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) 2018/04/21 01:40:05 executing program 7: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/251, 0xfb}, {&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f0000000280)=""/134, 0x86}, {&(0x7f0000000340)=""/146, 0x92}, {&(0x7f0000000480)=""/223, 0xdf}], 0x5, 0x0, 0x0, 0x8}, 0x2000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="130000001000ffdde200f49f070f050000230a009d0000000f00afa73022e5f9ec3e4fe8697ae1a3490096000001e7b93c18983ae3820d1eb0f049a1b4b88ed4fe65be0602c2d3275df1f2aa09b1267c3d5f625e77e150da8ed7d56ca466a47bd87da5cd04b27dd26746ea50518c2c681bbce9093d468612f0267214ff9b20db0000009b2930d837b9cb3452bdc4e2387d886959e4ebd30961933ae9f90d1ad5b56d2a917a6f575b8b76199346c8f325b8", 0xb1) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000640)=0x4a2, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000031c0)) clock_settime(0x7, &(0x7f0000000680)={0x77359400}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000400)=""/115) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:05 executing program 0: semctl$IPC_RMID(0x0, 0x2, 0x10) 2018/04/21 01:40:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x800, 0x6, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/21 01:40:05 executing program 1: memfd_create(&(0x7f0000000400)="eabba32122600ea879d1b2aae9e9059c17c791208d0865a8f8e76805a0bd9b99194126653e8a874f88419815cacd490fd41068b33baa0001a0345e733b36b659a57a0e3c964065f37f769606f3a97a731d790ddc25661275424f755d8667dc0148da894f3001a1a0d4f496cc901510e36bfc625755d5381cba01e6be93123fb8bc9e008663f3a7d5a8991e6dfa37f5dcfcc713fbbb1371af", 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000837000)='loginuid\x00') sendfile(r0, r0, &(0x7f000017f000), 0x5) 2018/04/21 01:40:05 executing program 7: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/251, 0xfb}, {&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f0000000280)=""/134, 0x86}, {&(0x7f0000000340)=""/146, 0x92}, {&(0x7f0000000480)=""/223, 0xdf}], 0x5, 0x0, 0x0, 0x8}, 0x2000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="130000001000ffdde200f49f070f050000230a009d0000000f00afa73022e5f9ec3e4fe8697ae1a3490096000001e7b93c18983ae3820d1eb0f049a1b4b88ed4fe65be0602c2d3275df1f2aa09b1267c3d5f625e77e150da8ed7d56ca466a47bd87da5cd04b27dd26746ea50518c2c681bbce9093d468612f0267214ff9b20db0000009b2930d837b9cb3452bdc4e2387d886959e4ebd30961933ae9f90d1ad5b56d2a917a6f575b8b76199346c8f325b8", 0xb1) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000640)=0x4a2, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000031c0)) clock_settime(0x7, &(0x7f0000000680)={0x77359400}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000400)=""/115) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:06 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:06 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x1000000000002, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) 2018/04/21 01:40:06 executing program 0: semctl$IPC_RMID(0x0, 0x2, 0x10) 2018/04/21 01:40:06 executing program 6: memfd_create(&(0x7f0000000400)="eabba32122600ea879d1b2aae9e9059c17c791208d0865a8f8e76805a0bd9b99194126653e8a874f88419815cacd490fd41068b33baa0001a0345e733b36b659a57a0e3c964065f37f769606f3a97a731d790ddc25661275424f755d8667dc0148da894f3001a1a0d4f496cc901510e36bfc625755d5381cba01e6be93123fb8bc9e008663f3a7d5a8991e6dfa37f5dcfcc713fbbb1371af", 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000837000)='loginuid\x00') sendfile(r0, r0, &(0x7f000017f000), 0x5) 2018/04/21 01:40:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x800, 0x6, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/21 01:40:06 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001280)=[{&(0x7f0000001200)=""/73, 0x49}], 0x1, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x7005, &(0x7f0000000080)) 2018/04/21 01:40:06 executing program 7: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/251, 0xfb}, {&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f0000000280)=""/134, 0x86}, {&(0x7f0000000340)=""/146, 0x92}, {&(0x7f0000000480)=""/223, 0xdf}], 0x5, 0x0, 0x0, 0x8}, 0x2000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="130000001000ffdde200f49f070f050000230a009d0000000f00afa73022e5f9ec3e4fe8697ae1a3490096000001e7b93c18983ae3820d1eb0f049a1b4b88ed4fe65be0602c2d3275df1f2aa09b1267c3d5f625e77e150da8ed7d56ca466a47bd87da5cd04b27dd26746ea50518c2c681bbce9093d468612f0267214ff9b20db0000009b2930d837b9cb3452bdc4e2387d886959e4ebd30961933ae9f90d1ad5b56d2a917a6f575b8b76199346c8f325b8", 0xb1) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000640)=0x4a2, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000031c0)) clock_settime(0x7, &(0x7f0000000680)={0x77359400}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000400)=""/115) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:06 executing program 1: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/251, 0xfb}, {&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f0000000280)=""/134, 0x86}, {&(0x7f0000000340)=""/146, 0x92}, {&(0x7f0000000480)=""/223, 0xdf}], 0x5, 0x0, 0x0, 0x8}, 0x2000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="130000001000ffdde200f49f070f050000230a009d0000000f00afa73022e5f9ec3e4fe8697ae1a3490096000001e7b93c18983ae3820d1eb0f049a1b4b88ed4fe65be0602c2d3275df1f2aa09b1267c3d5f625e77e150da8ed7d56ca466a47bd87da5cd04b27dd26746ea50518c2c681bbce9093d468612f0267214ff9b20db0000009b2930d837b9cb3452bdc4e2387d886959e4ebd30961933ae9f90d1ad5b56d2a917a6f575b8b76199346c8f325b8", 0xb1) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000640)=0x4a2, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000031c0)) clock_settime(0x7, &(0x7f0000000680)={0x77359400}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000400)=""/115) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:06 executing program 0: semctl$IPC_RMID(0x0, 0x2, 0x10) 2018/04/21 01:40:06 executing program 7: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/251, 0xfb}, {&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f0000000280)=""/134, 0x86}, {&(0x7f0000000340)=""/146, 0x92}, {&(0x7f0000000480)=""/223, 0xdf}], 0x5, 0x0, 0x0, 0x8}, 0x2000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="130000001000ffdde200f49f070f050000230a009d0000000f00afa73022e5f9ec3e4fe8697ae1a3490096000001e7b93c18983ae3820d1eb0f049a1b4b88ed4fe65be0602c2d3275df1f2aa09b1267c3d5f625e77e150da8ed7d56ca466a47bd87da5cd04b27dd26746ea50518c2c681bbce9093d468612f0267214ff9b20db0000009b2930d837b9cb3452bdc4e2387d886959e4ebd30961933ae9f90d1ad5b56d2a917a6f575b8b76199346c8f325b8", 0xb1) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000640)=0x4a2, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000031c0)) clock_settime(0x7, &(0x7f0000000680)={0x77359400}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000400)=""/115) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x800, 0x6, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/21 01:40:07 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:07 executing program 1: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/251, 0xfb}, {&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f0000000280)=""/134, 0x86}, {&(0x7f0000000340)=""/146, 0x92}, {&(0x7f0000000480)=""/223, 0xdf}], 0x5, 0x0, 0x0, 0x8}, 0x2000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="130000001000ffdde200f49f070f050000230a009d0000000f00afa73022e5f9ec3e4fe8697ae1a3490096000001e7b93c18983ae3820d1eb0f049a1b4b88ed4fe65be0602c2d3275df1f2aa09b1267c3d5f625e77e150da8ed7d56ca466a47bd87da5cd04b27dd26746ea50518c2c681bbce9093d468612f0267214ff9b20db0000009b2930d837b9cb3452bdc4e2387d886959e4ebd30961933ae9f90d1ad5b56d2a917a6f575b8b76199346c8f325b8", 0xb1) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000640)=0x4a2, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000031c0)) clock_settime(0x7, &(0x7f0000000680)={0x77359400}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000400)=""/115) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:07 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x1000000000002, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) 2018/04/21 01:40:07 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:07 executing program 0: semctl$IPC_RMID(0x0, 0x2, 0x10) 2018/04/21 01:40:07 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001280)=[{&(0x7f0000001200)=""/73, 0x49}], 0x1, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x7005, &(0x7f0000000080)) 2018/04/21 01:40:07 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:07 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:07 executing program 1: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/251, 0xfb}, {&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f0000000280)=""/134, 0x86}, {&(0x7f0000000340)=""/146, 0x92}, {&(0x7f0000000480)=""/223, 0xdf}], 0x5, 0x0, 0x0, 0x8}, 0x2000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="130000001000ffdde200f49f070f050000230a009d0000000f00afa73022e5f9ec3e4fe8697ae1a3490096000001e7b93c18983ae3820d1eb0f049a1b4b88ed4fe65be0602c2d3275df1f2aa09b1267c3d5f625e77e150da8ed7d56ca466a47bd87da5cd04b27dd26746ea50518c2c681bbce9093d468612f0267214ff9b20db0000009b2930d837b9cb3452bdc4e2387d886959e4ebd30961933ae9f90d1ad5b56d2a917a6f575b8b76199346c8f325b8", 0xb1) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000640)=0x4a2, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000031c0)) clock_settime(0x7, &(0x7f0000000680)={0x77359400}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000400)=""/115) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:07 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x800, 0x6, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/21 01:40:07 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:07 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x1000000000002, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) 2018/04/21 01:40:07 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:07 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:08 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001280)=[{&(0x7f0000001200)=""/73, 0x49}], 0x1, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x7005, &(0x7f0000000080)) 2018/04/21 01:40:08 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:08 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:08 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/21 01:40:08 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:08 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:08 executing program 1: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/251, 0xfb}, {&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f0000000280)=""/134, 0x86}, {&(0x7f0000000340)=""/146, 0x92}, {&(0x7f0000000480)=""/223, 0xdf}], 0x5, 0x0, 0x0, 0x8}, 0x2000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="130000001000ffdde200f49f070f050000230a009d0000000f00afa73022e5f9ec3e4fe8697ae1a3490096000001e7b93c18983ae3820d1eb0f049a1b4b88ed4fe65be0602c2d3275df1f2aa09b1267c3d5f625e77e150da8ed7d56ca466a47bd87da5cd04b27dd26746ea50518c2c681bbce9093d468612f0267214ff9b20db0000009b2930d837b9cb3452bdc4e2387d886959e4ebd30961933ae9f90d1ad5b56d2a917a6f575b8b76199346c8f325b8", 0xb1) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000640)=0x4a2, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000031c0)) clock_settime(0x7, &(0x7f0000000680)={0x77359400}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000400)=""/115) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:08 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x6e, &(0x7f0000000080)="3447f36cbc3563f8dee5d01dbcef", &(0x7f00000000c0)=""/110}, 0x28) 2018/04/21 01:40:08 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:08 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/21 01:40:08 executing program 1: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/251, 0xfb}, {&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f0000000280)=""/134, 0x86}, {&(0x7f0000000340)=""/146, 0x92}, {&(0x7f0000000480)=""/223, 0xdf}], 0x5, 0x0, 0x0, 0x8}, 0x2000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="130000001000ffdde200f49f070f050000230a009d0000000f00afa73022e5f9ec3e4fe8697ae1a3490096000001e7b93c18983ae3820d1eb0f049a1b4b88ed4fe65be0602c2d3275df1f2aa09b1267c3d5f625e77e150da8ed7d56ca466a47bd87da5cd04b27dd26746ea50518c2c681bbce9093d468612f0267214ff9b20db0000009b2930d837b9cb3452bdc4e2387d886959e4ebd30961933ae9f90d1ad5b56d2a917a6f575b8b76199346c8f325b8", 0xb1) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000640)=0x4a2, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000031c0)) clock_settime(0x7, &(0x7f0000000680)={0x77359400}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000400)=""/115) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:08 executing program 6: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/21 01:40:08 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x85, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005e4ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = epoll_create1(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000019ff4)) ioctl$TCSETA(r1, 0x5402, &(0x7f0000000000)) write$sndseq(r1, &(0x7f000000a000)=[{0x40081, 0x80000006, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x30) 2018/04/21 01:40:08 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000001000)={{0x0, 0x0, 0x0, 0x0, "a399e9c558720d8d1f6728f1c5f07531dc6150defaca6ebcaf1b8b8c36184c8f147be96ea31efbf49ca9b9d7"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "655397eb4a90dc0d4bbdd330f3aa50c6a17a4cbe46f9a27f671d171c4a2c50f288493929c1e0fe9468a5eb556554a2803b25502ef5bc450d5f58f28b16e1198d", &(0x7f0000b0bfb2)="446465762f736e642f636f6e74726f6c4323009cb55a60fb8d54423e20546bd33125000000000000fd03e22965bb699aabcb8311b779fbf5497252581e19688501001a7898bd7751951d53b93ab1", 0x4e, [], [0x2]}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000001000)={&(0x7f0000000000), 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, "b1abe2da03000000e1000000fc00000000000000dc98784b49e0007e000020db"}}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)=""/250) 2018/04/21 01:40:08 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/21 01:40:08 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0xfffffffffffffffe, 0x0) 2018/04/21 01:40:09 executing program 1: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/251, 0xfb}, {&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f0000000280)=""/134, 0x86}, {&(0x7f0000000340)=""/146, 0x92}, {&(0x7f0000000480)=""/223, 0xdf}], 0x5, 0x0, 0x0, 0x8}, 0x2000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="130000001000ffdde200f49f070f050000230a009d0000000f00afa73022e5f9ec3e4fe8697ae1a3490096000001e7b93c18983ae3820d1eb0f049a1b4b88ed4fe65be0602c2d3275df1f2aa09b1267c3d5f625e77e150da8ed7d56ca466a47bd87da5cd04b27dd26746ea50518c2c681bbce9093d468612f0267214ff9b20db0000009b2930d837b9cb3452bdc4e2387d886959e4ebd30961933ae9f90d1ad5b56d2a917a6f575b8b76199346c8f325b8", 0xb1) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000640)=0x4a2, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000031c0)) clock_settime(0x7, &(0x7f0000000680)={0x77359400}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000400)=""/115) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:09 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/21 01:40:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0xfffffffffffffffe, 0x0) 2018/04/21 01:40:09 executing program 6: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/21 01:40:09 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000001000)={{0x0, 0x0, 0x0, 0x0, "a399e9c558720d8d1f6728f1c5f07531dc6150defaca6ebcaf1b8b8c36184c8f147be96ea31efbf49ca9b9d7"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "655397eb4a90dc0d4bbdd330f3aa50c6a17a4cbe46f9a27f671d171c4a2c50f288493929c1e0fe9468a5eb556554a2803b25502ef5bc450d5f58f28b16e1198d", &(0x7f0000b0bfb2)="446465762f736e642f636f6e74726f6c4323009cb55a60fb8d54423e20546bd33125000000000000fd03e22965bb699aabcb8311b779fbf5497252581e19688501001a7898bd7751951d53b93ab1", 0x4e, [], [0x2]}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000001000)={&(0x7f0000000000), 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, "b1abe2da03000000e1000000fc00000000000000dc98784b49e0007e000020db"}}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)=""/250) 2018/04/21 01:40:09 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x6e, &(0x7f0000000080)="3447f36cbc3563f8dee5d01dbcef", &(0x7f00000000c0)=""/110}, 0x28) 2018/04/21 01:40:09 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 2018/04/21 01:40:09 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x6e, &(0x7f0000000080)="3447f36cbc3563f8dee5d01dbcef", &(0x7f00000000c0)=""/110}, 0x28) 2018/04/21 01:40:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0xfffffffffffffffe, 0x0) 2018/04/21 01:40:09 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000001000)={{0x0, 0x0, 0x0, 0x0, "a399e9c558720d8d1f6728f1c5f07531dc6150defaca6ebcaf1b8b8c36184c8f147be96ea31efbf49ca9b9d7"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "655397eb4a90dc0d4bbdd330f3aa50c6a17a4cbe46f9a27f671d171c4a2c50f288493929c1e0fe9468a5eb556554a2803b25502ef5bc450d5f58f28b16e1198d", &(0x7f0000b0bfb2)="446465762f736e642f636f6e74726f6c4323009cb55a60fb8d54423e20546bd33125000000000000fd03e22965bb699aabcb8311b779fbf5497252581e19688501001a7898bd7751951d53b93ab1", 0x4e, [], [0x2]}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000001000)={&(0x7f0000000000), 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, "b1abe2da03000000e1000000fc00000000000000dc98784b49e0007e000020db"}}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)=""/250) 2018/04/21 01:40:09 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x6e, &(0x7f0000000080)="3447f36cbc3563f8dee5d01dbcef", &(0x7f00000000c0)=""/110}, 0x28) 2018/04/21 01:40:09 executing program 6: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/21 01:40:09 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(r0, &(0x7f0000d4bfe8)=@known='system.posix_acl_access\x00', &(0x7f00009b8000)="0200000001a5180040000000", 0xc, 0x0) 2018/04/21 01:40:09 executing program 4: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0185879, &(0x7f0000000080)={0x46cbb536c24fe78}) semget$private(0x0, 0xfffffffffffffffc, 0x3d) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x0, 0x8001, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0xca, 0x800}, {0x1, 0x1, 0x800}, {0x0, 0x6, 0x800}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xc001, 0x0, 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000200)=ANY=[]) dup2(r0, r1) 2018/04/21 01:40:09 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x6e, &(0x7f0000000080)="3447f36cbc3563f8dee5d01dbcef", &(0x7f00000000c0)=""/110}, 0x28) 2018/04/21 01:40:09 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 2018/04/21 01:40:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0xfffffffffffffffe, 0x0) 2018/04/21 01:40:10 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x6e, &(0x7f0000000080)="3447f36cbc3563f8dee5d01dbcef", &(0x7f00000000c0)=""/110}, 0x28) 2018/04/21 01:40:10 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 2018/04/21 01:40:10 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000001000)={{0x0, 0x0, 0x0, 0x0, "a399e9c558720d8d1f6728f1c5f07531dc6150defaca6ebcaf1b8b8c36184c8f147be96ea31efbf49ca9b9d7"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "655397eb4a90dc0d4bbdd330f3aa50c6a17a4cbe46f9a27f671d171c4a2c50f288493929c1e0fe9468a5eb556554a2803b25502ef5bc450d5f58f28b16e1198d", &(0x7f0000b0bfb2)="446465762f736e642f636f6e74726f6c4323009cb55a60fb8d54423e20546bd33125000000000000fd03e22965bb699aabcb8311b779fbf5497252581e19688501001a7898bd7751951d53b93ab1", 0x4e, [], [0x2]}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000001000)={&(0x7f0000000000), 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, "b1abe2da03000000e1000000fc00000000000000dc98784b49e0007e000020db"}}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)=""/250) 2018/04/21 01:40:10 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x6e, &(0x7f0000000080)="3447f36cbc3563f8dee5d01dbcef", &(0x7f00000000c0)=""/110}, 0x28) 2018/04/21 01:40:10 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(r0, &(0x7f0000d4bfe8)=@known='system.posix_acl_access\x00', &(0x7f00009b8000)="0200000001a5180040000000", 0xc, 0x0) 2018/04/21 01:40:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x14, 0x10000000000027, 0x331, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:40:10 executing program 4: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0185879, &(0x7f0000000080)={0x46cbb536c24fe78}) semget$private(0x0, 0xfffffffffffffffc, 0x3d) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x0, 0x8001, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0xca, 0x800}, {0x1, 0x1, 0x800}, {0x0, 0x6, 0x800}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xc001, 0x0, 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000200)=ANY=[]) dup2(r0, r1) 2018/04/21 01:40:10 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 2018/04/21 01:40:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x14, 0x10000000000027, 0x331, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:40:10 executing program 0: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0185879, &(0x7f0000000080)={0x46cbb536c24fe78}) semget$private(0x0, 0xfffffffffffffffc, 0x3d) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x0, 0x8001, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0xca, 0x800}, {0x1, 0x1, 0x800}, {0x0, 0x6, 0x800}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xc001, 0x0, 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000200)=ANY=[]) dup2(r0, r1) 2018/04/21 01:40:10 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0185879, &(0x7f0000000080)={0x46cbb536c24fe78}) semget$private(0x0, 0xfffffffffffffffc, 0x3d) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x0, 0x8001, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0xca, 0x800}, {0x1, 0x1, 0x800}, {0x0, 0x6, 0x800}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xc001, 0x0, 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000200)=ANY=[]) dup2(r0, r1) 2018/04/21 01:40:10 executing program 7: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0185879, &(0x7f0000000080)={0x46cbb536c24fe78}) semget$private(0x0, 0xfffffffffffffffc, 0x3d) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x0, 0x8001, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0xca, 0x800}, {0x1, 0x1, 0x800}, {0x0, 0x6, 0x800}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xc001, 0x0, 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000200)=ANY=[]) dup2(r0, r1) 2018/04/21 01:40:10 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 2018/04/21 01:40:10 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(r0, &(0x7f0000d4bfe8)=@known='system.posix_acl_access\x00', &(0x7f00009b8000)="0200000001a5180040000000", 0xc, 0x0) 2018/04/21 01:40:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x14, 0x10000000000027, 0x331, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:40:10 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 2018/04/21 01:40:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x14, 0x10000000000027, 0x331, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:40:10 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(r0, &(0x7f0000d4bfe8)=@known='system.posix_acl_access\x00', &(0x7f00009b8000)="0200000001a5180040000000", 0xc, 0x0) 2018/04/21 01:40:10 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x1000000000004148, &(0x7f0000000040)) 2018/04/21 01:40:10 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 2018/04/21 01:40:10 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe0000000000000000000000000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYBLOB="6d000000907800000a1c24650e5280b3e4dd3b86a443abe384e671a5f813643639f04a415821a2addae0d7dcef3be334a2dbdbfb4c1c9f9ef25f2e44fea016fb4d0a30147ccdd9b1419a08e889294f1a412c3bd5eb924468df08ee809a237e39fb69f3bea14e6f459da6bd7c4b749f8858d7fce36d874fcebbbaca1a8e095c40"], &(0x7f0000000000)) 2018/04/21 01:40:10 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x1000000000004148, &(0x7f0000000040)) 2018/04/21 01:40:11 executing program 4: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0185879, &(0x7f0000000080)={0x46cbb536c24fe78}) semget$private(0x0, 0xfffffffffffffffc, 0x3d) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x0, 0x8001, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0xca, 0x800}, {0x1, 0x1, 0x800}, {0x0, 0x6, 0x800}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xc001, 0x0, 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000200)=ANY=[]) dup2(r0, r1) 2018/04/21 01:40:11 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'syz_tun\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x3, @empty, 'ip6_vti0\x00'}}, 0x1e) dup3(r1, r0, 0x0) 2018/04/21 01:40:11 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x1000000000004148, &(0x7f0000000040)) 2018/04/21 01:40:12 executing program 0: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0185879, &(0x7f0000000080)={0x46cbb536c24fe78}) semget$private(0x0, 0xfffffffffffffffc, 0x3d) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x0, 0x8001, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0xca, 0x800}, {0x1, 0x1, 0x800}, {0x0, 0x6, 0x800}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xc001, 0x0, 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000200)=ANY=[]) dup2(r0, r1) 2018/04/21 01:40:12 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0185879, &(0x7f0000000080)={0x46cbb536c24fe78}) semget$private(0x0, 0xfffffffffffffffc, 0x3d) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x0, 0x8001, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0xca, 0x800}, {0x1, 0x1, 0x800}, {0x0, 0x6, 0x800}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xc001, 0x0, 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000200)=ANY=[]) dup2(r0, r1) 2018/04/21 01:40:12 executing program 4: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0185879, &(0x7f0000000080)={0x46cbb536c24fe78}) semget$private(0x0, 0xfffffffffffffffc, 0x3d) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x0, 0x8001, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0xca, 0x800}, {0x1, 0x1, 0x800}, {0x0, 0x6, 0x800}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xc001, 0x0, 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000200)=ANY=[]) dup2(r0, r1) 2018/04/21 01:40:12 executing program 7: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0185879, &(0x7f0000000080)={0x46cbb536c24fe78}) semget$private(0x0, 0xfffffffffffffffc, 0x3d) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x0, 0x8001, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0xca, 0x800}, {0x1, 0x1, 0x800}, {0x0, 0x6, 0x800}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xc001, 0x0, 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000200)=ANY=[]) dup2(r0, r1) 2018/04/21 01:40:12 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009375, &(0x7f0000000040)="010000000000000018") 2018/04/21 01:40:12 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x1000000000004148, &(0x7f0000000040)) 2018/04/21 01:40:12 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc0045103, &(0x7f0000000040)) 2018/04/21 01:40:12 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'syz_tun\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x3, @empty, 'ip6_vti0\x00'}}, 0x1e) dup3(r1, r0, 0x0) 2018/04/21 01:40:12 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'syz_tun\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x3, @empty, 'ip6_vti0\x00'}}, 0x1e) dup3(r1, r0, 0x0) 2018/04/21 01:40:12 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'syz_tun\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x3, @empty, 'ip6_vti0\x00'}}, 0x1e) dup3(r1, r0, 0x0) 2018/04/21 01:40:12 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc0045103, &(0x7f0000000040)) 2018/04/21 01:40:12 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009375, &(0x7f0000000040)="010000000000000018") 2018/04/21 01:40:12 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'syz_tun\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x3, @empty, 'ip6_vti0\x00'}}, 0x1e) dup3(r1, r0, 0x0) 2018/04/21 01:40:12 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'syz_tun\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x3, @empty, 'ip6_vti0\x00'}}, 0x1e) dup3(r1, r0, 0x0) 2018/04/21 01:40:12 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc0045103, &(0x7f0000000040)) 2018/04/21 01:40:12 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009375, &(0x7f0000000040)="010000000000000018") 2018/04/21 01:40:13 executing program 0: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0185879, &(0x7f0000000080)={0x46cbb536c24fe78}) semget$private(0x0, 0xfffffffffffffffc, 0x3d) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x0, 0x8001, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0xca, 0x800}, {0x1, 0x1, 0x800}, {0x0, 0x6, 0x800}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xc001, 0x0, 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000200)=ANY=[]) dup2(r0, r1) 2018/04/21 01:40:13 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009375, &(0x7f0000000040)="010000000000000018") 2018/04/21 01:40:13 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000040)="21a5ef8701e1636a01f384b76917d90bdaaf0c2cbd91a90b267df9a2c7b9e4055c86e0e4364baf6eb316736e67729cd7aa04b4b161f488756dafc4c709ab3fcc22e4f5c9a884b4a36dbd2992ced4b8f8e58147dec87962a60409f7762d86d16f9f6d18868d9ae4c55bdba059f256554e68f936c0df45a4b77c490358752f2748b58e", 0x82}], 0x1, 0x0) ioctl(r0, 0x2275, &(0x7f00000000c0)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x8012, r0, 0x0) 2018/04/21 01:40:13 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'syz_tun\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x3, @empty, 'ip6_vti0\x00'}}, 0x1e) dup3(r1, r0, 0x0) 2018/04/21 01:40:13 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0185879, &(0x7f0000000080)={0x46cbb536c24fe78}) semget$private(0x0, 0xfffffffffffffffc, 0x3d) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x0, 0x8001, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0xca, 0x800}, {0x1, 0x1, 0x800}, {0x0, 0x6, 0x800}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xc001, 0x0, 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000200)=ANY=[]) dup2(r0, r1) 2018/04/21 01:40:13 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc0045103, &(0x7f0000000040)) 2018/04/21 01:40:13 executing program 7: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0185879, &(0x7f0000000080)={0x46cbb536c24fe78}) semget$private(0x0, 0xfffffffffffffffc, 0x3d) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x0, 0x8001, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0xca, 0x800}, {0x1, 0x1, 0x800}, {0x0, 0x6, 0x800}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xc001, 0x0, 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000200)=ANY=[]) dup2(r0, r1) 2018/04/21 01:40:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000480)={[{@subvolid={'subvolid', 0x3d, '+eth1\\^[GPLppp0{\'cpuset'}, 0x2c}]}) 2018/04/21 01:40:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2}}, 0x7fffffff, 0x0, 0x0, 0x0, 0x1}, 0x98) 2018/04/21 01:40:13 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000040)="21a5ef8701e1636a01f384b76917d90bdaaf0c2cbd91a90b267df9a2c7b9e4055c86e0e4364baf6eb316736e67729cd7aa04b4b161f488756dafc4c709ab3fcc22e4f5c9a884b4a36dbd2992ced4b8f8e58147dec87962a60409f7762d86d16f9f6d18868d9ae4c55bdba059f256554e68f936c0df45a4b77c490358752f2748b58e", 0x82}], 0x1, 0x0) ioctl(r0, 0x2275, &(0x7f00000000c0)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x8012, r0, 0x0) 2018/04/21 01:40:13 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000040)="21a5ef8701e1636a01f384b76917d90bdaaf0c2cbd91a90b267df9a2c7b9e4055c86e0e4364baf6eb316736e67729cd7aa04b4b161f488756dafc4c709ab3fcc22e4f5c9a884b4a36dbd2992ced4b8f8e58147dec87962a60409f7762d86d16f9f6d18868d9ae4c55bdba059f256554e68f936c0df45a4b77c490358752f2748b58e", 0x82}], 0x1, 0x0) ioctl(r0, 0x2275, &(0x7f00000000c0)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x8012, r0, 0x0) 2018/04/21 01:40:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x8000000004, 0x4, 0x100000001, 0x0, r1}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r3, 0x50, &(0x7f00000001c0)}, 0x10) 2018/04/21 01:40:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000480)={[{@subvolid={'subvolid', 0x3d, '+eth1\\^[GPLppp0{\'cpuset'}, 0x2c}]}) 2018/04/21 01:40:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2}}, 0x7fffffff, 0x0, 0x0, 0x0, 0x1}, 0x98) 2018/04/21 01:40:13 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000040)="21a5ef8701e1636a01f384b76917d90bdaaf0c2cbd91a90b267df9a2c7b9e4055c86e0e4364baf6eb316736e67729cd7aa04b4b161f488756dafc4c709ab3fcc22e4f5c9a884b4a36dbd2992ced4b8f8e58147dec87962a60409f7762d86d16f9f6d18868d9ae4c55bdba059f256554e68f936c0df45a4b77c490358752f2748b58e", 0x82}], 0x1, 0x0) ioctl(r0, 0x2275, &(0x7f00000000c0)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x8012, r0, 0x0) 2018/04/21 01:40:13 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000040)="21a5ef8701e1636a01f384b76917d90bdaaf0c2cbd91a90b267df9a2c7b9e4055c86e0e4364baf6eb316736e67729cd7aa04b4b161f488756dafc4c709ab3fcc22e4f5c9a884b4a36dbd2992ced4b8f8e58147dec87962a60409f7762d86d16f9f6d18868d9ae4c55bdba059f256554e68f936c0df45a4b77c490358752f2748b58e", 0x82}], 0x1, 0x0) ioctl(r0, 0x2275, &(0x7f00000000c0)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x8012, r0, 0x0) 2018/04/21 01:40:13 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x0, &(0x7f0000becff0)) 2018/04/21 01:40:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2}}, 0x7fffffff, 0x0, 0x0, 0x0, 0x1}, 0x98) 2018/04/21 01:40:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x8000000004, 0x4, 0x100000001, 0x0, r1}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r3, 0x50, &(0x7f00000001c0)}, 0x10) 2018/04/21 01:40:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000480)={[{@subvolid={'subvolid', 0x3d, '+eth1\\^[GPLppp0{\'cpuset'}, 0x2c}]}) 2018/04/21 01:40:13 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000040)="21a5ef8701e1636a01f384b76917d90bdaaf0c2cbd91a90b267df9a2c7b9e4055c86e0e4364baf6eb316736e67729cd7aa04b4b161f488756dafc4c709ab3fcc22e4f5c9a884b4a36dbd2992ced4b8f8e58147dec87962a60409f7762d86d16f9f6d18868d9ae4c55bdba059f256554e68f936c0df45a4b77c490358752f2748b58e", 0x82}], 0x1, 0x0) ioctl(r0, 0x2275, &(0x7f00000000c0)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x8012, r0, 0x0) 2018/04/21 01:40:13 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000040)="21a5ef8701e1636a01f384b76917d90bdaaf0c2cbd91a90b267df9a2c7b9e4055c86e0e4364baf6eb316736e67729cd7aa04b4b161f488756dafc4c709ab3fcc22e4f5c9a884b4a36dbd2992ced4b8f8e58147dec87962a60409f7762d86d16f9f6d18868d9ae4c55bdba059f256554e68f936c0df45a4b77c490358752f2748b58e", 0x82}], 0x1, 0x0) ioctl(r0, 0x2275, &(0x7f00000000c0)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x8012, r0, 0x0) 2018/04/21 01:40:13 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x8000000004, 0x4, 0x100000001, 0x0, r1}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r3, 0x50, &(0x7f00000001c0)}, 0x10) 2018/04/21 01:40:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065b000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f3eff0), 0x0) 2018/04/21 01:40:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000480)={[{@subvolid={'subvolid', 0x3d, '+eth1\\^[GPLppp0{\'cpuset'}, 0x2c}]}) 2018/04/21 01:40:14 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x8000000004, 0x4, 0x100000001, 0x0, r1}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r3, 0x50, &(0x7f00000001c0)}, 0x10) 2018/04/21 01:40:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) write(r0, &(0x7f0000000000), 0x0) 2018/04/21 01:40:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065b000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f3eff0), 0x0) 2018/04/21 01:40:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2}}, 0x7fffffff, 0x0, 0x0, 0x0, 0x1}, 0x98) 2018/04/21 01:40:14 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) open(&(0x7f00000000c0)='./control\x00', 0x410001, 0x52) 2018/04/21 01:40:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x8000000004, 0x4, 0x100000001, 0x0, r1}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r3, 0x50, &(0x7f00000001c0)}, 0x10) 2018/04/21 01:40:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x8000000004, 0x4, 0x100000001, 0x0, r1}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r3, 0x50, &(0x7f00000001c0)}, 0x10) 2018/04/21 01:40:14 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) write(r0, &(0x7f0000000000), 0x0) 2018/04/21 01:40:14 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x8000000004, 0x4, 0x100000001, 0x0, r1}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r3, 0x50, &(0x7f00000001c0)}, 0x10) 2018/04/21 01:40:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065b000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f3eff0), 0x0) 2018/04/21 01:40:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00005e1fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc), 0x0) r2 = accept$alg(r1, 0x0, 0x0) dup3(r2, r1, 0x0) 2018/04/21 01:40:14 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) open(&(0x7f00000000c0)='./control\x00', 0x410001, 0x52) 2018/04/21 01:40:14 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x0, &(0x7f0000becff0)) 2018/04/21 01:40:14 executing program 7: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffff"], 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f00000000c0)="020000000000", 0x6) 2018/04/21 01:40:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) write(r0, &(0x7f0000000000), 0x0) 2018/04/21 01:40:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065b000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f3eff0), 0x0) 2018/04/21 01:40:14 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) open(&(0x7f00000000c0)='./control\x00', 0x410001, 0x52) [ 105.486467] devpts: called with bogus options 2018/04/21 01:40:14 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r1}, 0x10) perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/04/21 01:40:14 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x0, &(0x7f0000becff0)) 2018/04/21 01:40:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00005e1fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc), 0x0) r2 = accept$alg(r1, 0x0, 0x0) dup3(r2, r1, 0x0) [ 105.608027] hugetlbfs: Bad mount option: "" 2018/04/21 01:40:14 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) open(&(0x7f00000000c0)='./control\x00', 0x410001, 0x52) 2018/04/21 01:40:14 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c07, 0x0) [ 105.775820] devpts: called with bogus options [ 105.821013] hfs: can't find a HFS filesystem on dev loop5 [ 105.834779] hugetlbfs: Bad mount option: "" 2018/04/21 01:40:14 executing program 7: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffff"], 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f00000000c0)="020000000000", 0x6) 2018/04/21 01:40:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) write(r0, &(0x7f0000000000), 0x0) 2018/04/21 01:40:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000240)) 2018/04/21 01:40:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00005e1fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc), 0x0) r2 = accept$alg(r1, 0x0, 0x0) dup3(r2, r1, 0x0) 2018/04/21 01:40:14 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x0, &(0x7f0000becff0)) 2018/04/21 01:40:14 executing program 6: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffff"], 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f00000000c0)="020000000000", 0x6) 2018/04/21 01:40:14 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c07, 0x0) 2018/04/21 01:40:14 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00005e1fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc), 0x0) r2 = accept$alg(r1, 0x0, 0x0) dup3(r2, r1, 0x0) 2018/04/21 01:40:15 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:15 executing program 6: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffff"], 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f00000000c0)="020000000000", 0x6) [ 106.054874] hfs: can't find a HFS filesystem on dev loop5 [ 106.074963] devpts: called with bogus options [ 106.170912] hugetlbfs: Bad mount option: "" [ 106.185461] devpts: called with bogus options [ 106.251785] hugetlbfs: Bad mount option: "" 2018/04/21 01:40:15 executing program 7: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffff"], 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f00000000c0)="020000000000", 0x6) 2018/04/21 01:40:15 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:15 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:15 executing program 6: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffff"], 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f00000000c0)="020000000000", 0x6) 2018/04/21 01:40:15 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c07, 0x0) 2018/04/21 01:40:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000240)) 2018/04/21 01:40:15 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:15 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:15 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:15 executing program 7: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffff"], 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f00000000c0)="020000000000", 0x6) [ 106.395351] hfs: can't find a HFS filesystem on dev loop5 [ 106.422539] devpts: called with bogus options [ 106.436438] devpts: called with bogus options 2018/04/21 01:40:15 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c07, 0x0) [ 106.463280] devpts: called with bogus options [ 106.487317] devpts: called with bogus options [ 106.530462] hugetlbfs: Bad mount option: "" [ 106.562686] hugetlbfs: Bad mount option: "" [ 106.586324] hugetlbfs: Bad mount option: "" [ 106.616672] hugetlbfs: Bad mount option: "" [ 106.629622] devpts: called with bogus options [ 106.708009] hugetlbfs: Bad mount option: "" 2018/04/21 01:40:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000240)) 2018/04/21 01:40:15 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:15 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:15 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:15 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:15 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:15 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:15 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 106.932492] devpts: called with bogus options [ 106.941776] devpts: called with bogus options [ 106.948269] devpts: called with bogus options [ 106.959099] devpts: called with bogus options [ 106.967543] devpts: called with bogus options [ 106.974442] devpts: called with bogus options 2018/04/21 01:40:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000240)) [ 106.987963] hugetlbfs: Bad mount option: "" [ 106.999530] hugetlbfs: Bad mount option: "" [ 107.007009] devpts: called with bogus options [ 107.032797] hugetlbfs: Bad mount option: "" [ 107.048761] hugetlbfs: Bad mount option: "" [ 107.057859] hugetlbfs: Bad mount option: "" [ 107.072047] hugetlbfs: Bad mount option: "" 2018/04/21 01:40:16 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 107.094089] hugetlbfs: Bad mount option: "" 2018/04/21 01:40:16 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:16 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:16 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:16 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:16 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x22001) ioctl$TUNGETSNDBUF(r0, 0x5452, &(0x7f0000000180)) 2018/04/21 01:40:16 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:16 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00000001c0)='debugfs\x00', 0x4005, &(0x7f000000a000)) [ 107.328277] devpts: called with bogus options 2018/04/21 01:40:16 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x22001) ioctl$TUNGETSNDBUF(r0, 0x5452, &(0x7f0000000180)) [ 107.366988] devpts: called with bogus options [ 107.375677] devpts: called with bogus options [ 107.409420] devpts: called with bogus options [ 107.457842] hugetlbfs: Bad mount option: "" [ 107.460536] hugetlbfs: Bad mount option: "" [ 107.476395] hugetlbfs: Bad mount option: "" [ 107.491815] devpts: called with bogus options 2018/04/21 01:40:16 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00000001c0)='debugfs\x00', 0x4005, &(0x7f000000a000)) [ 107.512545] hugetlbfs: Bad mount option: "" 2018/04/21 01:40:16 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x22001) ioctl$TUNGETSNDBUF(r0, 0x5452, &(0x7f0000000180)) [ 107.537580] hugetlbfs: Bad mount option: "" [ 107.539201] devpts: called with bogus options 2018/04/21 01:40:16 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:16 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:16 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x22001) ioctl$TUNGETSNDBUF(r0, 0x5452, &(0x7f0000000180)) [ 107.623853] hugetlbfs: Bad mount option: "" 2018/04/21 01:40:16 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 107.799954] devpts: called with bogus options [ 107.817768] devpts: called with bogus options [ 107.834466] devpts: called with bogus options [ 107.854339] hugetlbfs: Bad mount option: "" [ 107.864911] hugetlbfs: Bad mount option: "" [ 107.882287] hugetlbfs: Bad mount option: "" 2018/04/21 01:40:16 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) 2018/04/21 01:40:16 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00000001c0)='debugfs\x00', 0x4005, &(0x7f000000a000)) 2018/04/21 01:40:16 executing program 2: syz_mount_image$f2fs(&(0x7f0000000180)='f2fs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="1020f5f20100070009000000030000000c0000000900000002000000010000000000000000480000000000000d00000022000400020000000200000002000000020000001a000000000400000004000000080000000c000000100000001400050a0000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000240)) 2018/04/21 01:40:16 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) close(r2) close(r3) 2018/04/21 01:40:16 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) read(r1, &(0x7f0000000100)=""/118, 0x76) 2018/04/21 01:40:16 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000077a000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/4096, 0x1000) 2018/04/21 01:40:16 executing program 3: mremap(&(0x7f0000001000/0x1000)=nil, 0x7ffffffff000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) syz_fuse_mount(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/21 01:40:16 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x0, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xd8, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc4744284", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/04/21 01:40:17 executing program 3: mremap(&(0x7f0000001000/0x1000)=nil, 0x7ffffffff000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) syz_fuse_mount(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 107.993782] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 108.001323] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 108.070422] devpts: called with bogus options [ 108.098745] F2FS-fs (loop2): Invalid Fs Meta Ino: node(1) meta(2) root(10) [ 108.105954] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 108.151696] hugetlbfs: Bad mount option: "" [ 108.170325] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 108.177604] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 108.191670] F2FS-fs (loop2): Invalid Fs Meta Ino: node(1) meta(2) root(10) 2018/04/21 01:40:17 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00000001c0)='debugfs\x00', 0x4005, &(0x7f000000a000)) 2018/04/21 01:40:17 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) close(r2) close(r3) 2018/04/21 01:40:17 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) 2018/04/21 01:40:17 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) read(r1, &(0x7f0000000100)=""/118, 0x76) 2018/04/21 01:40:17 executing program 3: mremap(&(0x7f0000001000/0x1000)=nil, 0x7ffffffff000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) syz_fuse_mount(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/21 01:40:17 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000077a000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/4096, 0x1000) 2018/04/21 01:40:17 executing program 2: syz_mount_image$f2fs(&(0x7f0000000180)='f2fs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="1020f5f20100070009000000030000000c0000000900000002000000010000000000000000480000000000000d00000022000400020000000200000002000000020000001a000000000400000004000000080000000c000000100000001400050a0000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000240)) 2018/04/21 01:40:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) close(r2) close(r3) [ 108.198841] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 108.214711] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 108.221986] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 2018/04/21 01:40:17 executing program 3: mremap(&(0x7f0000001000/0x1000)=nil, 0x7ffffffff000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) syz_fuse_mount(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/21 01:40:17 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) read(r1, &(0x7f0000000100)=""/118, 0x76) 2018/04/21 01:40:17 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) close(r2) close(r3) [ 108.358644] random: crng init done 2018/04/21 01:40:17 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) 2018/04/21 01:40:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) close(r2) close(r3) 2018/04/21 01:40:17 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000077a000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/4096, 0x1000) 2018/04/21 01:40:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) close(r2) close(r3) 2018/04/21 01:40:17 executing program 2: syz_mount_image$f2fs(&(0x7f0000000180)='f2fs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="1020f5f20100070009000000030000000c0000000900000002000000010000000000000000480000000000000d00000022000400020000000200000002000000020000001a000000000400000004000000080000000c000000100000001400050a0000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000240)) 2018/04/21 01:40:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) close(r2) close(r3) 2018/04/21 01:40:17 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) read(r1, &(0x7f0000000100)=""/118, 0x76) 2018/04/21 01:40:17 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) 2018/04/21 01:40:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) close(r2) close(r3) 2018/04/21 01:40:17 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) close(r2) close(r3) 2018/04/21 01:40:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) close(r2) close(r3) 2018/04/21 01:40:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) close(r2) close(r3) 2018/04/21 01:40:17 executing program 2: syz_mount_image$f2fs(&(0x7f0000000180)='f2fs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="1020f5f20100070009000000030000000c0000000900000002000000010000000000000000480000000000000d00000022000400020000000200000002000000020000001a000000000400000004000000080000000c000000100000001400050a0000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000240)) 2018/04/21 01:40:17 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000077a000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/4096, 0x1000) 2018/04/21 01:40:17 executing program 5: mremap(&(0x7f0000001000/0x1000)=nil, 0x7ffffffff000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) syz_fuse_mount(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/21 01:40:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) close(r2) close(r3) 2018/04/21 01:40:17 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') preadv(r0, &(0x7f0000b5cff8)=[{&(0x7f00006f0000)=""/154, 0x9a}], 0x1, 0x47) 2018/04/21 01:40:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f00000000c0)=@ethtool_cmd={0x34}}) 2018/04/21 01:40:17 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000200)=[{{&(0x7f00005fafe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000c3fff8), 0x0, &(0x7f00000004c0)}}], 0x2, 0x0) 2018/04/21 01:40:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) close(r2) close(r3) 2018/04/21 01:40:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x20, 0x2d, 0xaff, 0x0, 0x0, {0x4001}, [@nested={0xc, 0x0, [@typed={0x8, 0x3, @binary='\b'}]}]}, 0x20}, 0x1}, 0x0) 2018/04/21 01:40:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x47}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xf, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0xffffff85}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 2018/04/21 01:40:18 executing program 5: mremap(&(0x7f0000001000/0x1000)=nil, 0x7ffffffff000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) syz_fuse_mount(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/21 01:40:18 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$netlink(0x10, 0x3, 0x4) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000001180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001340), 0x0, &(0x7f0000001380)=""/135, 0x87}, 0x0) writev(r0, &(0x7f0000312ff0)=[{&(0x7f0000000080)="48000000140019ea19ca424a2efa55560affffffffe006ff00000000bc5603ca00000fff890000000709ff5bff87c3e4cb6b716c0123b261a2000000000000000000000000000000", 0x48}], 0x1) 2018/04/21 01:40:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f00000000c0)=@ethtool_cmd={0x34}}) 2018/04/21 01:40:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x20, 0x2d, 0xaff, 0x0, 0x0, {0x4001}, [@nested={0xc, 0x0, [@typed={0x8, 0x3, @binary='\b'}]}]}, 0x20}, 0x1}, 0x0) 2018/04/21 01:40:18 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') preadv(r0, &(0x7f0000b5cff8)=[{&(0x7f00006f0000)=""/154, 0x9a}], 0x1, 0x47) 2018/04/21 01:40:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') preadv(r0, &(0x7f0000b5cff8)=[{&(0x7f00006f0000)=""/154, 0x9a}], 0x1, 0x47) 2018/04/21 01:40:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x47}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xf, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0xffffff85}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 2018/04/21 01:40:18 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000200)=[{{&(0x7f00005fafe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000c3fff8), 0x0, &(0x7f00000004c0)}}], 0x2, 0x0) 2018/04/21 01:40:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f00000000c0)=@ethtool_cmd={0x34}}) 2018/04/21 01:40:18 executing program 5: mremap(&(0x7f0000001000/0x1000)=nil, 0x7ffffffff000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) syz_fuse_mount(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/21 01:40:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x20, 0x2d, 0xaff, 0x0, 0x0, {0x4001}, [@nested={0xc, 0x0, [@typed={0x8, 0x3, @binary='\b'}]}]}, 0x20}, 0x1}, 0x0) 2018/04/21 01:40:18 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000200)=[{{&(0x7f00005fafe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000c3fff8), 0x0, &(0x7f00000004c0)}}], 0x2, 0x0) 2018/04/21 01:40:18 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') preadv(r0, &(0x7f0000b5cff8)=[{&(0x7f00006f0000)=""/154, 0x9a}], 0x1, 0x47) 2018/04/21 01:40:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') preadv(r0, &(0x7f0000b5cff8)=[{&(0x7f00006f0000)=""/154, 0x9a}], 0x1, 0x47) 2018/04/21 01:40:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x47}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xf, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0xffffff85}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 2018/04/21 01:40:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000efdffc)=0x1, 0xd2) setsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f0000000000), 0x4) 2018/04/21 01:40:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f00000000c0)=@ethtool_cmd={0x34}}) 2018/04/21 01:40:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x20, 0x2d, 0xaff, 0x0, 0x0, {0x4001}, [@nested={0xc, 0x0, [@typed={0x8, 0x3, @binary='\b'}]}]}, 0x20}, 0x1}, 0x0) 2018/04/21 01:40:18 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000200)=[{{&(0x7f00005fafe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000c3fff8), 0x0, &(0x7f00000004c0)}}], 0x2, 0x0) 2018/04/21 01:40:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000efdffc)=0x1, 0xd2) setsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f0000000000), 0x4) 2018/04/21 01:40:18 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') preadv(r0, &(0x7f0000b5cff8)=[{&(0x7f00006f0000)=""/154, 0x9a}], 0x1, 0x47) 2018/04/21 01:40:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') preadv(r0, &(0x7f0000b5cff8)=[{&(0x7f00006f0000)=""/154, 0x9a}], 0x1, 0x47) 2018/04/21 01:40:18 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$netlink(0x10, 0x3, 0x4) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000001180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001340), 0x0, &(0x7f0000001380)=""/135, 0x87}, 0x0) writev(r0, &(0x7f0000312ff0)=[{&(0x7f0000000080)="48000000140019ea19ca424a2efa55560affffffffe006ff00000000bc5603ca00000fff890000000709ff5bff87c3e4cb6b716c0123b261a2000000000000000000000000000000", 0x48}], 0x1) 2018/04/21 01:40:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x47}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xf, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0xffffff85}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 2018/04/21 01:40:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000efdffc)=0x1, 0xd2) setsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f0000000000), 0x4) 2018/04/21 01:40:19 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x114, 0x5, &(0x7f0000000740)={{{@in6, @in6=@dev={0xfe, 0x80}}}, {{@in6=@loopback={0x0, 0x1}}, 0x0, @in=@multicast2=0xe0000002}}, 0xe8) 2018/04/21 01:40:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="0f017000660f23790f18f90f0d7df301e5e28e0f01cf0f1ba316842e65666c0f0119", 0x22}], 0x1, 0x0, &(0x7f00000001c0), 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @raw32}], 0x30) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x5001, 0x1000, &(0x7f0000ff2000/0x1000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:40:19 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x3000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 2018/04/21 01:40:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x14, 0x301, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:40:19 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') sendfile(r1, r0, &(0x7f000058f000)=0xf, 0xd) 2018/04/21 01:40:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r2, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write(r2, &(0x7f0000000300)='o', 0x1) accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) 2018/04/21 01:40:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000efdffc)=0x1, 0xd2) setsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f0000000000), 0x4) 2018/04/21 01:40:19 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x114, 0x5, &(0x7f0000000740)={{{@in6, @in6=@dev={0xfe, 0x80}}}, {{@in6=@loopback={0x0, 0x1}}, 0x0, @in=@multicast2=0xe0000002}}, 0xe8) 2018/04/21 01:40:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x14, 0x301, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:40:19 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x3000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 2018/04/21 01:40:19 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') sendfile(r1, r0, &(0x7f000058f000)=0xf, 0xd) 2018/04/21 01:40:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="0f017000660f23790f18f90f0d7df301e5e28e0f01cf0f1ba316842e65666c0f0119", 0x22}], 0x1, 0x0, &(0x7f00000001c0), 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @raw32}], 0x30) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x5001, 0x1000, &(0x7f0000ff2000/0x1000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:40:19 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$netlink(0x10, 0x3, 0x4) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000001180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001340), 0x0, &(0x7f0000001380)=""/135, 0x87}, 0x0) writev(r0, &(0x7f0000312ff0)=[{&(0x7f0000000080)="48000000140019ea19ca424a2efa55560affffffffe006ff00000000bc5603ca00000fff890000000709ff5bff87c3e4cb6b716c0123b261a2000000000000000000000000000000", 0x48}], 0x1) 2018/04/21 01:40:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r2, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write(r2, &(0x7f0000000300)='o', 0x1) accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) 2018/04/21 01:40:19 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x114, 0x5, &(0x7f0000000740)={{{@in6, @in6=@dev={0xfe, 0x80}}}, {{@in6=@loopback={0x0, 0x1}}, 0x0, @in=@multicast2=0xe0000002}}, 0xe8) 2018/04/21 01:40:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="0f017000660f23790f18f90f0d7df301e5e28e0f01cf0f1ba316842e65666c0f0119", 0x22}], 0x1, 0x0, &(0x7f00000001c0), 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @raw32}], 0x30) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x5001, 0x1000, &(0x7f0000ff2000/0x1000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:40:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') sendfile(r1, r0, &(0x7f000058f000)=0xf, 0xd) 2018/04/21 01:40:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x14, 0x301, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:40:19 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') sendfile(r1, r0, &(0x7f000058f000)=0xf, 0xd) 2018/04/21 01:40:20 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x3000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 2018/04/21 01:40:20 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x114, 0x5, &(0x7f0000000740)={{{@in6, @in6=@dev={0xfe, 0x80}}}, {{@in6=@loopback={0x0, 0x1}}, 0x0, @in=@multicast2=0xe0000002}}, 0xe8) 2018/04/21 01:40:20 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') sendfile(r1, r0, &(0x7f000058f000)=0xf, 0xd) 2018/04/21 01:40:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') sendfile(r1, r0, &(0x7f000058f000)=0xf, 0xd) 2018/04/21 01:40:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x14, 0x301, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:40:20 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$netlink(0x10, 0x3, 0x4) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000001180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001340), 0x0, &(0x7f0000001380)=""/135, 0x87}, 0x0) writev(r0, &(0x7f0000312ff0)=[{&(0x7f0000000080)="48000000140019ea19ca424a2efa55560affffffffe006ff00000000bc5603ca00000fff890000000709ff5bff87c3e4cb6b716c0123b261a2000000000000000000000000000000", 0x48}], 0x1) 2018/04/21 01:40:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="0f017000660f23790f18f90f0d7df301e5e28e0f01cf0f1ba316842e65666c0f0119", 0x22}], 0x1, 0x0, &(0x7f00000001c0), 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @raw32}], 0x30) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x5001, 0x1000, &(0x7f0000ff2000/0x1000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:40:20 executing program 7: r0 = userfaultfd(0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000ffafe8)={0xaa}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000f70ff0)={&(0x7f00008a2000/0x1000)=nil, 0x1000}) 2018/04/21 01:40:20 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_rxfh={0x46, 0x0, 0x0, 0x0, 0x0, "4762b2"}}) 2018/04/21 01:40:20 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000d80)={{0x3, 0x0, 0x0, 0x0, "12bced685d1a5afe5df7e8d0a3a5bee0b731edd11c591eb7cb373aa219ee8d56f83bf316d4212e5c69e1f0fb"}}) 2018/04/21 01:40:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r2, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write(r2, &(0x7f0000000300)='o', 0x1) accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) 2018/04/21 01:40:20 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x3000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 2018/04/21 01:40:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') sendfile(r1, r0, &(0x7f000058f000)=0xf, 0xd) 2018/04/21 01:40:20 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_rxfh={0x46, 0x0, 0x0, 0x0, 0x0, "4762b2"}}) 2018/04/21 01:40:20 executing program 7: r0 = userfaultfd(0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000ffafe8)={0xaa}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000f70ff0)={&(0x7f00008a2000/0x1000)=nil, 0x1000}) 2018/04/21 01:40:20 executing program 6: syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="584653420000100000000000000010000000001f7de7df40febce5000000000034fb8fb9e4bf48b6ad26c597084f5c1900000000130000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000345d7fd2c24e80ccbc0", 0x67}], 0x8000, &(0x7f0000000240)={'nouuid,'}) 2018/04/21 01:40:20 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000d80)={{0x3, 0x0, 0x0, 0x0, "12bced685d1a5afe5df7e8d0a3a5bee0b731edd11c591eb7cb373aa219ee8d56f83bf316d4212e5c69e1f0fb"}}) [ 111.921964] XFS (loop6): bad version [ 111.964192] XFS (loop6): bad version 2018/04/21 01:40:21 executing program 6: syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="584653420000100000000000000010000000001f7de7df40febce5000000000034fb8fb9e4bf48b6ad26c597084f5c1900000000130000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000345d7fd2c24e80ccbc0", 0x67}], 0x8000, &(0x7f0000000240)={'nouuid,'}) 2018/04/21 01:40:21 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_rxfh={0x46, 0x0, 0x0, 0x0, 0x0, "4762b2"}}) 2018/04/21 01:40:21 executing program 7: r0 = userfaultfd(0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000ffafe8)={0xaa}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000f70ff0)={&(0x7f00008a2000/0x1000)=nil, 0x1000}) 2018/04/21 01:40:21 executing program 0: r0 = socket$packet(0x11, 0x80000000000002, 0x300) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x11f, 0x4) sendto$inet6(r0, &(0x7f0000000040)="b2", 0x1, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) recvmsg(r0, &(0x7f0000000580)={0x0, 0xfef2, &(0x7f00000000c0), 0x2bf, &(0x7f0000000500)=""/115, 0x73}, 0x2000) 2018/04/21 01:40:21 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000d80)={{0x3, 0x0, 0x0, 0x0, "12bced685d1a5afe5df7e8d0a3a5bee0b731edd11c591eb7cb373aa219ee8d56f83bf316d4212e5c69e1f0fb"}}) 2018/04/21 01:40:21 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r2, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write(r2, &(0x7f0000000300)='o', 0x1) accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) 2018/04/21 01:40:21 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f00000000c0)=""/72, 0x1f) 2018/04/21 01:40:21 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x8000000000000011, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x1, 0x4) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) 2018/04/21 01:40:21 executing program 7: r0 = userfaultfd(0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000ffafe8)={0xaa}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000f70ff0)={&(0x7f00008a2000/0x1000)=nil, 0x1000}) 2018/04/21 01:40:21 executing program 0: r0 = socket$packet(0x11, 0x80000000000002, 0x300) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x11f, 0x4) sendto$inet6(r0, &(0x7f0000000040)="b2", 0x1, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) recvmsg(r0, &(0x7f0000000580)={0x0, 0xfef2, &(0x7f00000000c0), 0x2bf, &(0x7f0000000500)=""/115, 0x73}, 0x2000) 2018/04/21 01:40:21 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_rxfh={0x46, 0x0, 0x0, 0x0, 0x0, "4762b2"}}) 2018/04/21 01:40:21 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000d80)={{0x3, 0x0, 0x0, 0x0, "12bced685d1a5afe5df7e8d0a3a5bee0b731edd11c591eb7cb373aa219ee8d56f83bf316d4212e5c69e1f0fb"}}) 2018/04/21 01:40:21 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x8000000000000011, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x1, 0x4) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) [ 112.655807] XFS (loop6): bad version 2018/04/21 01:40:21 executing program 7: r0 = socket$packet(0x11, 0x80000000000002, 0x300) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x11f, 0x4) sendto$inet6(r0, &(0x7f0000000040)="b2", 0x1, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) recvmsg(r0, &(0x7f0000000580)={0x0, 0xfef2, &(0x7f00000000c0), 0x2bf, &(0x7f0000000500)=""/115, 0x73}, 0x2000) 2018/04/21 01:40:21 executing program 0: r0 = socket$packet(0x11, 0x80000000000002, 0x300) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x11f, 0x4) sendto$inet6(r0, &(0x7f0000000040)="b2", 0x1, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) recvmsg(r0, &(0x7f0000000580)={0x0, 0xfef2, &(0x7f00000000c0), 0x2bf, &(0x7f0000000500)=""/115, 0x73}, 0x2000) 2018/04/21 01:40:21 executing program 6: syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="584653420000100000000000000010000000001f7de7df40febce5000000000034fb8fb9e4bf48b6ad26c597084f5c1900000000130000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000345d7fd2c24e80ccbc0", 0x67}], 0x8000, &(0x7f0000000240)={'nouuid,'}) 2018/04/21 01:40:21 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) write$eventfd(r2, &(0x7f0000000040), 0x8) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r1, r0, 0x3, 0x0) dup2(r1, r3) [ 112.914944] XFS (loop6): bad version 2018/04/21 01:40:22 executing program 0: r0 = socket$packet(0x11, 0x80000000000002, 0x300) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x11f, 0x4) sendto$inet6(r0, &(0x7f0000000040)="b2", 0x1, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) recvmsg(r0, &(0x7f0000000580)={0x0, 0xfef2, &(0x7f00000000c0), 0x2bf, &(0x7f0000000500)=""/115, 0x73}, 0x2000) 2018/04/21 01:40:22 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x8000000000000011, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x1, 0x4) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) 2018/04/21 01:40:22 executing program 7: r0 = socket$packet(0x11, 0x80000000000002, 0x300) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x11f, 0x4) sendto$inet6(r0, &(0x7f0000000040)="b2", 0x1, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) recvmsg(r0, &(0x7f0000000580)={0x0, 0xfef2, &(0x7f00000000c0), 0x2bf, &(0x7f0000000500)=""/115, 0x73}, 0x2000) 2018/04/21 01:40:22 executing program 6: syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="584653420000100000000000000010000000001f7de7df40febce5000000000034fb8fb9e4bf48b6ad26c597084f5c1900000000130000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000345d7fd2c24e80ccbc0", 0x67}], 0x8000, &(0x7f0000000240)={'nouuid,'}) 2018/04/21 01:40:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x1e, 0x18, &(0x7f0000000380)="0aac1ac22028d576e0e5504088ca9e4994e25b35831f64ffd77376b81f8b", &(0x7f0000000140)=""/24}, 0x28) 2018/04/21 01:40:22 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) write$eventfd(r2, &(0x7f0000000040), 0x8) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r1, r0, 0x3, 0x0) dup2(r1, r3) 2018/04/21 01:40:22 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) write$eventfd(r2, &(0x7f0000000040), 0x8) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r1, r0, 0x3, 0x0) dup2(r1, r3) 2018/04/21 01:40:22 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f00000000c0)=""/72, 0x1f) 2018/04/21 01:40:22 executing program 0: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) write$eventfd(r2, &(0x7f0000000040), 0x8) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r1, r0, 0x3, 0x0) dup2(r1, r3) 2018/04/21 01:40:22 executing program 7: r0 = socket$packet(0x11, 0x80000000000002, 0x300) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x11f, 0x4) sendto$inet6(r0, &(0x7f0000000040)="b2", 0x1, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) recvmsg(r0, &(0x7f0000000580)={0x0, 0xfef2, &(0x7f00000000c0), 0x2bf, &(0x7f0000000500)=""/115, 0x73}, 0x2000) 2018/04/21 01:40:22 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x8000000000000011, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x1, 0x4) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) [ 113.843625] XFS (loop6): bad version 2018/04/21 01:40:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x1e, 0x18, &(0x7f0000000380)="0aac1ac22028d576e0e5504088ca9e4994e25b35831f64ffd77376b81f8b", &(0x7f0000000140)=""/24}, 0x28) 2018/04/21 01:40:22 executing program 6: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000006780)=[{{&(0x7f0000000340)=@in={0x2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000940)}}, {{&(0x7f0000000040)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000000)="ffefffff", 0x4}], 0x1}}], 0x2, 0x0) 2018/04/21 01:40:22 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}]}, 0x18) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}, 0x0, 0x2, [{{0x2, 0x0, @loopback=0x7f000001}}, {{0x2, 0x0, @loopback=0x7f000001}}]}, 0x190) 2018/04/21 01:40:23 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f00000000c0)=""/72, 0x1f) 2018/04/21 01:40:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x1e, 0x18, &(0x7f0000000380)="0aac1ac22028d576e0e5504088ca9e4994e25b35831f64ffd77376b81f8b", &(0x7f0000000140)=""/24}, 0x28) 2018/04/21 01:40:23 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}]}, 0x18) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}, 0x0, 0x2, [{{0x2, 0x0, @loopback=0x7f000001}}, {{0x2, 0x0, @loopback=0x7f000001}}]}, 0x190) 2018/04/21 01:40:23 executing program 6: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000006780)=[{{&(0x7f0000000340)=@in={0x2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000940)}}, {{&(0x7f0000000040)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000000)="ffefffff", 0x4}], 0x1}}], 0x2, 0x0) 2018/04/21 01:40:23 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) write$eventfd(r2, &(0x7f0000000040), 0x8) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r1, r0, 0x3, 0x0) dup2(r1, r3) 2018/04/21 01:40:23 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) write$eventfd(r2, &(0x7f0000000040), 0x8) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r1, r0, 0x3, 0x0) dup2(r1, r3) 2018/04/21 01:40:23 executing program 0: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) write$eventfd(r2, &(0x7f0000000040), 0x8) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r1, r0, 0x3, 0x0) dup2(r1, r3) 2018/04/21 01:40:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}]}, 0x18) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}, 0x0, 0x2, [{{0x2, 0x0, @loopback=0x7f000001}}, {{0x2, 0x0, @loopback=0x7f000001}}]}, 0x190) 2018/04/21 01:40:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x1e, 0x18, &(0x7f0000000380)="0aac1ac22028d576e0e5504088ca9e4994e25b35831f64ffd77376b81f8b", &(0x7f0000000140)=""/24}, 0x28) 2018/04/21 01:40:23 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}]}, 0x18) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}, 0x0, 0x2, [{{0x2, 0x0, @loopback=0x7f000001}}, {{0x2, 0x0, @loopback=0x7f000001}}]}, 0x190) 2018/04/21 01:40:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}]}, 0x18) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}, 0x0, 0x2, [{{0x2, 0x0, @loopback=0x7f000001}}, {{0x2, 0x0, @loopback=0x7f000001}}]}, 0x190) 2018/04/21 01:40:23 executing program 6: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000006780)=[{{&(0x7f0000000340)=@in={0x2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000940)}}, {{&(0x7f0000000040)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000000)="ffefffff", 0x4}], 0x1}}], 0x2, 0x0) 2018/04/21 01:40:23 executing program 6: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000006780)=[{{&(0x7f0000000340)=@in={0x2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000940)}}, {{&(0x7f0000000040)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000000)="ffefffff", 0x4}], 0x1}}], 0x2, 0x0) 2018/04/21 01:40:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}]}, 0x18) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}, 0x0, 0x2, [{{0x2, 0x0, @loopback=0x7f000001}}, {{0x2, 0x0, @loopback=0x7f000001}}]}, 0x190) 2018/04/21 01:40:23 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}]}, 0x18) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}, 0x0, 0x2, [{{0x2, 0x0, @loopback=0x7f000001}}, {{0x2, 0x0, @loopback=0x7f000001}}]}, 0x190) 2018/04/21 01:40:23 executing program 1: kexec_load(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000080), 0x0, 0x0, 0x3e0000}], 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) 2018/04/21 01:40:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xbe, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x14, 0x32, 0x100008aff}, 0x14}, 0x1}, 0x0) 2018/04/21 01:40:24 executing program 7: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) 2018/04/21 01:40:24 executing program 1: kexec_load(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000080), 0x0, 0x0, 0x3e0000}], 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) 2018/04/21 01:40:24 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) write$eventfd(r2, &(0x7f0000000040), 0x8) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r1, r0, 0x3, 0x0) dup2(r1, r3) 2018/04/21 01:40:24 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) write$eventfd(r2, &(0x7f0000000040), 0x8) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r1, r0, 0x3, 0x0) dup2(r1, r3) 2018/04/21 01:40:24 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f00000000c0)=""/72, 0x1f) 2018/04/21 01:40:24 executing program 0: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) write$eventfd(r2, &(0x7f0000000040), 0x8) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r1, r0, 0x3, 0x0) dup2(r1, r3) 2018/04/21 01:40:24 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt(r0, 0x1, 0x14, &(0x7f0000e64ff7)="d74a06ec0000053900000000000003e5", 0x10) 2018/04/21 01:40:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xbe, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x14, 0x32, 0x100008aff}, 0x14}, 0x1}, 0x0) 2018/04/21 01:40:24 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt(r0, 0x1, 0x14, &(0x7f0000e64ff7)="d74a06ec0000053900000000000003e5", 0x10) [ 115.637740] binder: 9615:9627 got new transaction with bad transaction stack, transaction 2 has target 9615:0 [ 115.648134] binder: 9615:9627 transaction failed 29201/-71, size 0-0 line 2875 2018/04/21 01:40:24 executing program 1: kexec_load(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000080), 0x0, 0x0, 0x3e0000}], 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) 2018/04/21 01:40:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xbe, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x14, 0x32, 0x100008aff}, 0x14}, 0x1}, 0x0) [ 115.687894] binder: 9615:9627 BC_ACQUIRE_DONE u00000000204edf8a node 3 cookie mismatch 0000000000000000 != 0000000000000001 2018/04/21 01:40:24 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt(r0, 0x1, 0x14, &(0x7f0000e64ff7)="d74a06ec0000053900000000000003e5", 0x10) [ 115.742670] binder: BINDER_SET_CONTEXT_MGR already set [ 115.763390] binder: 9615:9638 ioctl 40046207 0 returned -16 [ 115.784448] binder_alloc: 9615: binder_alloc_buf, no vma [ 115.790411] binder: 9615:9627 transaction failed 29189/-3, size 40-8 line 2963 2018/04/21 01:40:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xbe, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x14, 0x32, 0x100008aff}, 0x14}, 0x1}, 0x0) 2018/04/21 01:40:24 executing program 1: kexec_load(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000080), 0x0, 0x0, 0x3e0000}], 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) [ 115.811412] binder_alloc: 9615: binder_alloc_buf, no vma [ 115.817089] binder: 9615:9647 transaction failed 29189/-3, size 0-0 line 2963 [ 115.892184] binder: undelivered TRANSACTION_ERROR: 29189 [ 115.899171] binder: release 9615:9627 transaction 2 out, still active [ 115.906096] binder: send failed reply for transaction 2, target dead 2018/04/21 01:40:25 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt(r0, 0x1, 0x14, &(0x7f0000e64ff7)="d74a06ec0000053900000000000003e5", 0x10) 2018/04/21 01:40:25 executing program 7: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) 2018/04/21 01:40:25 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) 2018/04/21 01:40:25 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) 2018/04/21 01:40:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f000000dff7)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x40247007, &(0x7f0000001ffc)) 2018/04/21 01:40:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) recvmsg(r0, &(0x7f0000000000)={&(0x7f00000006c0)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f0000000600)=""/135, 0x87}], 0x1, &(0x7f0000000180)=""/128, 0x80}, 0x3) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001000)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd438dfbe84ef20bd7e66cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4525d", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) 2018/04/21 01:40:25 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) 2018/04/21 01:40:25 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) [ 116.576908] binder: BINDER_SET_CONTEXT_MGR already set [ 116.582307] binder: BINDER_SET_CONTEXT_MGR already set [ 116.592580] binder: BINDER_SET_CONTEXT_MGR already set [ 116.599180] binder: 9675:9676 ioctl 40046207 0 returned -16 [ 116.609150] binder: 9674:9678 got new transaction with bad transaction stack, transaction 9 has target 9674:0 [ 116.612139] binder: 9679:9680 ioctl 40046207 0 returned -16 2018/04/21 01:40:25 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) [ 116.619340] binder: 9674:9678 transaction failed 29201/-71, size 0-0 line 2875 [ 116.619511] binder: BINDER_SET_CONTEXT_MGR already set [ 116.628087] binder: 9668:9683 ioctl 40046207 0 returned -16 [ 116.646088] binder: 9675:9676 got new transaction with bad transaction stack, transaction 13 has target 9674:0 [ 116.656376] binder: 9675:9676 transaction failed 29201/-71, size 0-0 line 2875 [ 116.656675] binder: 9684:9685 ioctl 40046207 0 returned -16 2018/04/21 01:40:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f000000dff7)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x40247007, &(0x7f0000001ffc)) [ 116.671093] binder: 9674:9678 BC_ACQUIRE_DONE u00000000204edf8a node 10 cookie mismatch 0000000000000000 != 0000000000000001 [ 116.697131] binder: 9679:9680 got new transaction with bad transaction stack, transaction 17 has target 9674:0 [ 116.707427] binder: 9679:9680 transaction failed 29201/-71, size 0-0 line 2875 2018/04/21 01:40:25 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) [ 116.718438] binder: 9668:9683 got new transaction with bad transaction stack, transaction 21 has target 9674:0 [ 116.728751] binder: 9668:9683 transaction failed 29201/-71, size 0-0 line 2875 [ 116.731177] binder: 9675:9676 Release 1 refcount change on invalid ref 1 ret -22 [ 116.748303] binder: 9679:9680 Release 1 refcount change on invalid ref 1 ret -22 [ 116.763884] binder: 9668:9683 Release 1 refcount change on invalid ref 1 ret -22 [ 116.767635] binder: 9684:9685 got new transaction with bad transaction stack, transaction 25 has target 9674:0 [ 116.781786] binder: 9684:9685 transaction failed 29201/-71, size 0-0 line 2875 [ 116.784889] binder: 9679:9680 BC_ACQUIRE_DONE u00000000204edf8a node 18 cookie mismatch 0000000000000000 != 0000000000000001 [ 116.808254] binder: 9668:9683 BC_ACQUIRE_DONE u00000000204edf8a node 22 cookie mismatch 0000000000000000 != 0000000000000001 2018/04/21 01:40:25 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) [ 116.809972] binder: 9675:9676 BC_ACQUIRE_DONE u00000000204edf8a node 14 cookie mismatch 0000000000000000 != 0000000000000001 [ 116.820073] binder: release 9674:9678 transaction 9 out, still active [ 116.837917] binder: send failed reply for transaction 9, target dead [ 116.844467] binder: send failed reply for transaction 13 to 9675:9676 [ 116.851317] binder: send failed reply for transaction 17 to 9679:9680 [ 116.857963] binder: send failed reply for transaction 21 to 9668:9683 [ 116.864612] binder: send failed reply for transaction 25 to 9684:9685 2018/04/21 01:40:25 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) 2018/04/21 01:40:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f000000dff7)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x40247007, &(0x7f0000001ffc)) [ 116.871983] binder: 9684:9685 Release 1 refcount change on invalid ref 1 ret -22 2018/04/21 01:40:25 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) 2018/04/21 01:40:25 executing program 7: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) 2018/04/21 01:40:25 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) 2018/04/21 01:40:26 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) [ 116.915897] binder: 9698:9699 got new transaction with bad transaction stack, transaction 30 has target 9698:0 [ 116.926217] binder: 9698:9699 transaction failed 29201/-71, size 0-0 line 2875 [ 116.941462] binder: 9684:9685 BC_INCREFS_DONE u0000000000000000 no match [ 116.998533] binder: 9698:9699 BC_ACQUIRE_DONE u00000000204edf8a node 31 cookie mismatch 0000000000000000 != 0000000000000001 [ 116.999245] binder: BINDER_SET_CONTEXT_MGR already set [ 117.024524] binder: 9684:9685 BC_ACQUIRE_DONE u0000000000000000 no match [ 117.031251] binder: BINDER_SET_CONTEXT_MGR already set [ 117.055080] binder: BINDER_SET_CONTEXT_MGR already set [ 117.069944] binder: undelivered TRANSACTION_ERROR: 29189 [ 117.076591] binder: 9709:9711 ioctl 40046207 0 returned -16 [ 117.089770] binder: undelivered TRANSACTION_ERROR: 29189 [ 117.095622] binder: 9712:9713 ioctl 40046207 0 returned -16 [ 117.108181] binder: undelivered TRANSACTION_ERROR: 29189 [ 117.119689] binder: 9709:9711 got new transaction with bad transaction stack, transaction 34 has target 9698:0 [ 117.122567] binder: 9705:9707 ioctl 40046207 0 returned -16 [ 117.129976] binder: 9709:9711 transaction failed 29201/-71, size 0-0 line 2875 [ 117.151242] binder: release 9698:9699 transaction 30 out, still active [ 117.158097] binder: send failed reply for transaction 30, target dead [ 117.164739] binder: send failed reply for transaction 34 to 9709:9711 [ 117.177114] binder: 9712:9713 transaction failed 29189/-22, size 40-8 line 2848 [ 117.199275] binder: 9709:9711 Release 1 refcount change on invalid ref 1 ret -22 [ 117.199545] binder: 9705:9707 transaction failed 29189/-22, size 40-8 line 2848 [ 117.208453] binder: 9712:9713 Release 1 refcount change on invalid ref 1 ret -22 [ 117.223354] binder: undelivered TRANSACTION_ERROR: 29189 [ 117.230439] binder: 9709:9711 BC_ACQUIRE_DONE u00000000204edf8a node 35 cookie mismatch 0000000000000000 != 0000000000000001 [ 117.233685] binder: 9705:9707 Release 1 refcount change on invalid ref 1 ret -22 [ 117.248972] binder: 9712:9713 BC_INCREFS_DONE u0000000000000000 no match [ 117.257431] binder: 9705:9707 BC_INCREFS_DONE u0000000000000000 no match [ 117.257614] binder: 9705:9707 BC_ACQUIRE_DONE u0000000000000000 no match [ 117.274784] binder: 9712:9713 BC_ACQUIRE_DONE u0000000000000000 no match [ 117.296607] binder: undelivered TRANSACTION_ERROR: 29189 2018/04/21 01:40:26 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f000000dff7)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x40247007, &(0x7f0000001ffc)) 2018/04/21 01:40:26 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) 2018/04/21 01:40:26 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) 2018/04/21 01:40:26 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xf, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x380) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000022c0)={r0, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) 2018/04/21 01:40:26 executing program 7: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) 2018/04/21 01:40:26 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) 2018/04/21 01:40:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) recvmsg(r0, &(0x7f0000000000)={&(0x7f00000006c0)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f0000000600)=""/135, 0x87}], 0x1, &(0x7f0000000180)=""/128, 0x80}, 0x3) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001000)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd438dfbe84ef20bd7e66cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4525d", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) 2018/04/21 01:40:26 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) [ 117.416268] binder: BINDER_SET_CONTEXT_MGR already set [ 117.421772] binder: BINDER_SET_CONTEXT_MGR already set [ 117.427118] binder: BINDER_SET_CONTEXT_MGR already set [ 117.433112] binder: BINDER_SET_CONTEXT_MGR already set [ 117.440008] binder: 9724:9729 got new transaction with bad transaction stack, transaction 41 has target 9724:0 [ 117.447198] binder: 9730:9733 ioctl 40046207 0 returned -16 [ 117.450396] binder: 9724:9729 transaction failed 29201/-71, size 0-0 line 2875 2018/04/21 01:40:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) recvmsg(r0, &(0x7f0000000000)={&(0x7f00000006c0)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f0000000600)=""/135, 0x87}], 0x1, &(0x7f0000000180)=""/128, 0x80}, 0x3) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001000)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd438dfbe84ef20bd7e66cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4525d", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) [ 117.457610] binder: 9735:9736 ioctl 40046207 0 returned -16 [ 117.469815] binder: 9726:9734 ioctl 40046207 0 returned -16 [ 117.475680] binder: 9732:9738 ioctl 40046207 0 returned -16 [ 117.495794] binder: 9730:9733 got new transaction with bad transaction stack, transaction 45 has target 9724:0 [ 117.497588] binder: 9732:9738 got new transaction with bad transaction stack, transaction 49 has target 9724:0 [ 117.506187] binder: 9730:9733 transaction failed 29201/-71, size 0-0 line 2875 [ 117.516347] binder: 9732:9738 transaction failed 29201/-71, size 0-0 line 2875 [ 117.539262] binder: 9724:9729 BC_ACQUIRE_DONE u00000000204edf8a node 42 cookie mismatch 0000000000000000 != 0000000000000001 2018/04/21 01:40:26 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xf, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x380) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000022c0)={r0, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) [ 117.561103] binder: 9726:9734 got new transaction with bad transaction stack, transaction 53 has target 9724:0 [ 117.571367] binder: 9726:9734 transaction failed 29201/-71, size 0-0 line 2875 [ 117.589672] binder: release 9724:9729 transaction 41 out, still active [ 117.596565] binder: send failed reply for transaction 41, target dead [ 117.598579] binder: 9726:9734 Release 1 refcount change on invalid ref 1 ret -22 [ 117.603230] binder: send failed reply for transaction 45 to 9730:9733 2018/04/21 01:40:26 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000090a000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="11634840"], 0x74, 0x0, &(0x7f00000006c0)="684f4b60f68c3ea854d1d4e65fa76fd9ab258c88ac58d96229cb17eccceb2b785b587b77fe08b5c3e213603a5dbaa3aa764245ffe9b9e8b4dfb953ff122e052c45f8f9e716e60e45ee088b32c108fb0b022a72cf5c64aeaefba3c0b63253d4d191a17c2d51c809fee963c21c49504b765fb52ca6"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r1, 0x1}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, r2}], 0x0, 0x0, &(0x7f0000000480)}) [ 117.615932] binder: 9735:9736 transaction failed 29189/-22, size 40-8 line 2848 [ 117.617393] binder: send failed reply for transaction 49 to 9732:9738 [ 117.631488] binder: send failed reply for transaction 53 to 9726:9734 [ 117.655710] binder: 9730:9733 Release 1 refcount change on invalid ref 1 ret -22 [ 117.661858] binder: 9732:9738 Release 1 refcount change on invalid ref 1 ret -22 [ 117.675394] binder: 9732:9738 BC_ACQUIRE_DONE u00000000204edf8a node 50 cookie mismatch 0000000000000000 != 0000000000000001 [ 117.684120] binder: 9735:9736 Release 1 refcount change on invalid ref 1 ret -22 [ 117.687912] binder: 9749:9750 got new transaction with bad transaction stack, transaction 59 has target 9749:0 [ 117.696453] binder: 9730:9733 BC_INCREFS_DONE u0000000000000000 no match 2018/04/21 01:40:26 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xf, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x380) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000022c0)={r0, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) 2018/04/21 01:40:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xf, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x380) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000022c0)={r0, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) [ 117.704778] binder: 9749:9750 transaction failed 29201/-71, size 0-0 line 2875 [ 117.719985] binder: 9726:9734 BC_INCREFS_DONE u0000000000000000 no match [ 117.722303] binder: 9735:9736 BC_INCREFS_DONE u0000000000000000 no match [ 117.747451] binder: undelivered TRANSACTION_ERROR: 29189 [ 117.750792] binder: 9730:9733 BC_ACQUIRE_DONE u0000000000000000 no match [ 117.753217] binder: 9726:9734 BC_ACQUIRE_DONE u0000000000000000 no match [ 117.802220] binder: 9735:9736 BC_ACQUIRE_DONE u0000000000000000 no match [ 117.812560] binder: 9749:9750 BC_ACQUIRE_DONE u00000000204edf8a node 60 cookie mismatch 0000000000000000 != 0000000000000001 [ 117.844922] binder: undelivered TRANSACTION_ERROR: 29189 [ 117.887794] binder: undelivered TRANSACTION_ERROR: 29189 [ 117.918780] binder: release 9749:9750 transaction 59 out, still active [ 117.925620] binder: send failed reply for transaction 59, target dead 2018/04/21 01:40:27 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xf, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x380) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000022c0)={r0, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) 2018/04/21 01:40:27 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x5) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 2018/04/21 01:40:27 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xf, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x380) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000022c0)={r0, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) 2018/04/21 01:40:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f00000a8000)=[{&(0x7f0000aef000)="580000001200192300bb4b80040d8c5628060000000004106a9643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004001ce1ed5e0000000000221f100001000700f8ffff0000ec6b0f536e", 0x58}], 0x1) 2018/04/21 01:40:27 executing program 0: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)='\x00') 2018/04/21 01:40:27 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000000)='\x00\x00\x00n', 0x4) 2018/04/21 01:40:27 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) recvmsg(r0, &(0x7f0000000000)={&(0x7f00000006c0)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f0000000600)=""/135, 0x87}], 0x1, &(0x7f0000000180)=""/128, 0x80}, 0x3) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001000)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd438dfbe84ef20bd7e66cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4525d", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) 2018/04/21 01:40:27 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) recvmsg(r0, &(0x7f0000000000)={&(0x7f00000006c0)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f0000000600)=""/135, 0x87}], 0x1, &(0x7f0000000180)=""/128, 0x80}, 0x3) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001000)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd438dfbe84ef20bd7e66cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4525d", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) 2018/04/21 01:40:27 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000000)='\x00\x00\x00n', 0x4) 2018/04/21 01:40:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f00000a8000)=[{&(0x7f0000aef000)="580000001200192300bb4b80040d8c5628060000000004106a9643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004001ce1ed5e0000000000221f100001000700f8ffff0000ec6b0f536e", 0x58}], 0x1) 2018/04/21 01:40:27 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 2018/04/21 01:40:27 executing program 0: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)='\x00') 2018/04/21 01:40:27 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xf, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x380) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000022c0)={r0, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) 2018/04/21 01:40:27 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x5) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 2018/04/21 01:40:27 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000000)='\x00\x00\x00n', 0x4) 2018/04/21 01:40:27 executing program 6: io_setup(0x8000000008, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) write(r0, &(0x7f0000ffdffb)='#!', 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000ff5000)='net/rt_cache\x00') sendfile(r0, r1, &(0x7f00006dbff8), 0x6) io_setup(0x2a96, &(0x7f0000000000)) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:40:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f00000a8000)=[{&(0x7f0000aef000)="580000001200192300bb4b80040d8c5628060000000004106a9643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004001ce1ed5e0000000000221f100001000700f8ffff0000ec6b0f536e", 0x58}], 0x1) 2018/04/21 01:40:27 executing program 0: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)='\x00') 2018/04/21 01:40:27 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000012000)=0x3fe, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000eb3fe0)=[@in={0x2, 0x0, @broadcast=0xffffffff}], 0x10) sendto$inet(r0, &(0x7f0000000040)='=', 0x1, 0x0, &(0x7f0000001040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/21 01:40:28 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000000)='\x00\x00\x00n', 0x4) 2018/04/21 01:40:28 executing program 6: io_setup(0x8000000008, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) write(r0, &(0x7f0000ffdffb)='#!', 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000ff5000)='net/rt_cache\x00') sendfile(r0, r1, &(0x7f00006dbff8), 0x6) io_setup(0x2a96, &(0x7f0000000000)) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:40:28 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x5) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 2018/04/21 01:40:28 executing program 0: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)='\x00') 2018/04/21 01:40:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f00000a8000)=[{&(0x7f0000aef000)="580000001200192300bb4b80040d8c5628060000000004106a9643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004001ce1ed5e0000000000221f100001000700f8ffff0000ec6b0f536e", 0x58}], 0x1) 2018/04/21 01:40:28 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000012000)=0x3fe, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000eb3fe0)=[@in={0x2, 0x0, @broadcast=0xffffffff}], 0x10) sendto$inet(r0, &(0x7f0000000040)='=', 0x1, 0x0, &(0x7f0000001040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/21 01:40:28 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) recvmsg(r0, &(0x7f0000000000)={&(0x7f00000006c0)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f0000000600)=""/135, 0x87}], 0x1, &(0x7f0000000180)=""/128, 0x80}, 0x3) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001000)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd438dfbe84ef20bd7e66cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4525d", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) 2018/04/21 01:40:28 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) recvmsg(r0, &(0x7f0000000000)={&(0x7f00000006c0)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f0000000600)=""/135, 0x87}], 0x1, &(0x7f0000000180)=""/128, 0x80}, 0x3) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001000)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd438dfbe84ef20bd7e66cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4525d", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) 2018/04/21 01:40:28 executing program 0: io_setup(0x8000000008, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) write(r0, &(0x7f0000ffdffb)='#!', 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000ff5000)='net/rt_cache\x00') sendfile(r0, r1, &(0x7f00006dbff8), 0x6) io_setup(0x2a96, &(0x7f0000000000)) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:40:28 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000012000)=0x3fe, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000eb3fe0)=[@in={0x2, 0x0, @broadcast=0xffffffff}], 0x10) sendto$inet(r0, &(0x7f0000000040)='=', 0x1, 0x0, &(0x7f0000001040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/21 01:40:28 executing program 4: io_setup(0x8000000008, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) write(r0, &(0x7f0000ffdffb)='#!', 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000ff5000)='net/rt_cache\x00') sendfile(r0, r1, &(0x7f00006dbff8), 0x6) io_setup(0x2a96, &(0x7f0000000000)) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:40:28 executing program 3: munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) r0 = socket$netlink(0x10, 0x3, 0x0) io_setup(0xa3f, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0xfd28}]) 2018/04/21 01:40:28 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x5) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 2018/04/21 01:40:28 executing program 6: io_setup(0x8000000008, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) write(r0, &(0x7f0000ffdffb)='#!', 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000ff5000)='net/rt_cache\x00') sendfile(r0, r1, &(0x7f00006dbff8), 0x6) io_setup(0x2a96, &(0x7f0000000000)) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:40:28 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000012000)=0x3fe, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000eb3fe0)=[@in={0x2, 0x0, @broadcast=0xffffffff}], 0x10) sendto$inet(r0, &(0x7f0000000040)='=', 0x1, 0x0, &(0x7f0000001040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/21 01:40:29 executing program 4: io_setup(0x8000000008, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) write(r0, &(0x7f0000ffdffb)='#!', 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000ff5000)='net/rt_cache\x00') sendfile(r0, r1, &(0x7f00006dbff8), 0x6) io_setup(0x2a96, &(0x7f0000000000)) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:40:29 executing program 3: munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) r0 = socket$netlink(0x10, 0x3, 0x0) io_setup(0xa3f, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0xfd28}]) 2018/04/21 01:40:29 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x5, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000040)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00002d4000)}, 0x0) 2018/04/21 01:40:29 executing program 6: io_setup(0x8000000008, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) write(r0, &(0x7f0000ffdffb)='#!', 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000ff5000)='net/rt_cache\x00') sendfile(r0, r1, &(0x7f00006dbff8), 0x6) io_setup(0x2a96, &(0x7f0000000000)) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:40:29 executing program 5: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = shmget$private(0x0, 0x2000, 0x1b02, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) 2018/04/21 01:40:29 executing program 1: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000afb000)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x1}) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000040)=@generic={0x10000000001e, "0100000000007b0000000001e526cc573c5bf86c483724d91e14dd81739effea1b48006be61ffe06d79f00000000000000076c3f010039d880000000000000000000af50d5fe32c419d600cbc7e3ad3100088356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000100), 0x8f, &(0x7f0000f4def0)}, 0x0) 2018/04/21 01:40:29 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) r0 = epoll_create1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000a09ff1)='net/ipv6_route\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000e37ff4)={0x20000005}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000557ff4)={0xa90d0101}) 2018/04/21 01:40:29 executing program 0: io_setup(0x8000000008, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) write(r0, &(0x7f0000ffdffb)='#!', 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000ff5000)='net/rt_cache\x00') sendfile(r0, r1, &(0x7f00006dbff8), 0x6) io_setup(0x2a96, &(0x7f0000000000)) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:40:29 executing program 5: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = shmget$private(0x0, 0x2000, 0x1b02, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) 2018/04/21 01:40:29 executing program 3: munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) r0 = socket$netlink(0x10, 0x3, 0x0) io_setup(0xa3f, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0xfd28}]) 2018/04/21 01:40:29 executing program 4: io_setup(0x8000000008, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) write(r0, &(0x7f0000ffdffb)='#!', 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000ff5000)='net/rt_cache\x00') sendfile(r0, r1, &(0x7f00006dbff8), 0x6) io_setup(0x2a96, &(0x7f0000000000)) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:40:29 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) r0 = epoll_create1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000a09ff1)='net/ipv6_route\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000e37ff4)={0x20000005}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000557ff4)={0xa90d0101}) 2018/04/21 01:40:29 executing program 1: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000afb000)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x1}) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000040)=@generic={0x10000000001e, "0100000000007b0000000001e526cc573c5bf86c483724d91e14dd81739effea1b48006be61ffe06d79f00000000000000076c3f010039d880000000000000000000af50d5fe32c419d600cbc7e3ad3100088356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000100), 0x8f, &(0x7f0000f4def0)}, 0x0) 2018/04/21 01:40:29 executing program 0: io_setup(0x8000000008, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) write(r0, &(0x7f0000ffdffb)='#!', 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000ff5000)='net/rt_cache\x00') sendfile(r0, r1, &(0x7f00006dbff8), 0x6) io_setup(0x2a96, &(0x7f0000000000)) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:40:29 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x5, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000040)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00002d4000)}, 0x0) 2018/04/21 01:40:29 executing program 6: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = shmget$private(0x0, 0x2000, 0x1b02, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) 2018/04/21 01:40:29 executing program 1: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000afb000)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x1}) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000040)=@generic={0x10000000001e, "0100000000007b0000000001e526cc573c5bf86c483724d91e14dd81739effea1b48006be61ffe06d79f00000000000000076c3f010039d880000000000000000000af50d5fe32c419d600cbc7e3ad3100088356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000100), 0x8f, &(0x7f0000f4def0)}, 0x0) 2018/04/21 01:40:29 executing program 3: munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) r0 = socket$netlink(0x10, 0x3, 0x0) io_setup(0xa3f, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0xfd28}]) 2018/04/21 01:40:29 executing program 5: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = shmget$private(0x0, 0x2000, 0x1b02, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) 2018/04/21 01:40:29 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) r0 = epoll_create1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000a09ff1)='net/ipv6_route\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000e37ff4)={0x20000005}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000557ff4)={0xa90d0101}) 2018/04/21 01:40:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000031000)=@mpls_newroute={0x24, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_TTL_PROPAGATE={0x8, 0xa}]}, 0x24}, 0x1}, 0x0) 2018/04/21 01:40:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x18, &(0x7f0000000140)=""/4096, &(0x7f0000001140)=0x1000) 2018/04/21 01:40:29 executing program 6: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = shmget$private(0x0, 0x2000, 0x1b02, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) 2018/04/21 01:40:29 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x5, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000040)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00002d4000)}, 0x0) 2018/04/21 01:40:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x18, &(0x7f0000000140)=""/4096, &(0x7f0000001140)=0x1000) 2018/04/21 01:40:29 executing program 5: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = shmget$private(0x0, 0x2000, 0x1b02, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) 2018/04/21 01:40:29 executing program 1: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000afb000)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x1}) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000040)=@generic={0x10000000001e, "0100000000007b0000000001e526cc573c5bf86c483724d91e14dd81739effea1b48006be61ffe06d79f00000000000000076c3f010039d880000000000000000000af50d5fe32c419d600cbc7e3ad3100088356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000100), 0x8f, &(0x7f0000f4def0)}, 0x0) 2018/04/21 01:40:29 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), &(0x7f0000000200), 0x8) 2018/04/21 01:40:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000031000)=@mpls_newroute={0x24, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_TTL_PROPAGATE={0x8, 0xa}]}, 0x24}, 0x1}, 0x0) 2018/04/21 01:40:29 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) r0 = epoll_create1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000a09ff1)='net/ipv6_route\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000e37ff4)={0x20000005}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000557ff4)={0xa90d0101}) 2018/04/21 01:40:29 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x5, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000040)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00002d4000)}, 0x0) 2018/04/21 01:40:29 executing program 6: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = shmget$private(0x0, 0x2000, 0x1b02, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) 2018/04/21 01:40:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x18, &(0x7f0000000140)=""/4096, &(0x7f0000001140)=0x1000) 2018/04/21 01:40:29 executing program 1: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f00000017c0)="1f000000160007f2000094ffa4000800000000000001000000000000f30004", 0x1f) recvfrom$unix(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x958938) 2018/04/21 01:40:29 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000d1b252)) 2018/04/21 01:40:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000031000)=@mpls_newroute={0x24, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_TTL_PROPAGATE={0x8, 0xa}]}, 0x24}, 0x1}, 0x0) 2018/04/21 01:40:30 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xf, 0x8000000000004, 0x4, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x13, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2ff) close(r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r2}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x4}, 0x14) 2018/04/21 01:40:30 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), &(0x7f0000000200), 0x8) 2018/04/21 01:40:30 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000ffc)=@fragment, 0x8) 2018/04/21 01:40:30 executing program 1: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f00000017c0)="1f000000160007f2000094ffa4000800000000000001000000000000f30004", 0x1f) recvfrom$unix(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x958938) 2018/04/21 01:40:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x18, &(0x7f0000000140)=""/4096, &(0x7f0000001140)=0x1000) 2018/04/21 01:40:30 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000d1b252)) 2018/04/21 01:40:30 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000d32fc0), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x5f) sync() ioprio_set$pid(0x0, 0x0, 0x4001) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0xfffffffffffffffd}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x8000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000400)={{0xd2, 0x5}, 'port0\x00', 0x8, 0x10000, 0x4, 0x3, 0x2, 0x8001, 0x2, 0x0, 0x0, 0xffffffffffffffc0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000005c0)={{0x3, 0x63}, 'port0\x00', 0x10, 0x10401, 0x100, 0x229, 0x7f, 0xffffffffffffffc0, 0x80000000, 0x0, 0x2, 0x3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x80, @time, 0x0, {0xfff, 0x7}, 0x0, 0x0, 0x3e8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000580)) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r5 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000044ff6)='./control\x00', 0x0) r6 = fanotify_init(0x4, 0x800) fanotify_mark(r6, 0x32, 0x40000002, r5, &(0x7f0000000000)='./control\x00') setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000680)={r3, 0x1, 0xfffffffffffffca9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff96) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/89) 2018/04/21 01:40:30 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000ffc)=@fragment, 0x8) 2018/04/21 01:40:30 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000140)={0xffffffffffff5720, 0x0, 'client1\x00', 0x0, "9942af6b91fb0640", "55d6e988152940d5ab92eb57a97b0ab1bb3437b9298ea48813ed11d29f9e206c"}) 2018/04/21 01:40:30 executing program 1: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f00000017c0)="1f000000160007f2000094ffa4000800000000000001000000000000f30004", 0x1f) recvfrom$unix(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x958938) 2018/04/21 01:40:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000031000)=@mpls_newroute={0x24, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_TTL_PROPAGATE={0x8, 0xa}]}, 0x24}, 0x1}, 0x0) 2018/04/21 01:40:30 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xf, 0x8000000000004, 0x4, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x13, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2ff) close(r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r2}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x4}, 0x14) 2018/04/21 01:40:30 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), &(0x7f0000000200), 0x8) 2018/04/21 01:40:30 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000ffc)=@fragment, 0x8) 2018/04/21 01:40:30 executing program 4: socketpair(0xb, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={r3, 0x5, 0x400, 0x6}, 0x10) prctl$intptr(0x21, 0x1) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000240), 0x4) io_setup(0x61c, &(0x7f0000000500)) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:30 executing program 1: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f00000017c0)="1f000000160007f2000094ffa4000800000000000001000000000000f30004", 0x1f) recvfrom$unix(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x958938) 2018/04/21 01:40:30 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000d1b252)) 2018/04/21 01:40:31 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), &(0x7f0000000200), 0x8) 2018/04/21 01:40:31 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xf, 0x8000000000004, 0x4, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x13, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2ff) close(r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r2}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x4}, 0x14) 2018/04/21 01:40:31 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000140)={0xffffffffffff5720, 0x0, 'client1\x00', 0x0, "9942af6b91fb0640", "55d6e988152940d5ab92eb57a97b0ab1bb3437b9298ea48813ed11d29f9e206c"}) 2018/04/21 01:40:31 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000d1b252)) 2018/04/21 01:40:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f8dfc8)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/67, 0x43}], 0x1, &(0x7f0000000340)=""/67, 0x43}, 0x0) 2018/04/21 01:40:31 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000ffc)=@fragment, 0x8) 2018/04/21 01:40:31 executing program 4: socketpair(0xb, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={r3, 0x5, 0x400, 0x6}, 0x10) prctl$intptr(0x21, 0x1) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000240), 0x4) io_setup(0x61c, &(0x7f0000000500)) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:31 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000d32fc0), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x5f) sync() ioprio_set$pid(0x0, 0x0, 0x4001) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0xfffffffffffffffd}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x8000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000400)={{0xd2, 0x5}, 'port0\x00', 0x8, 0x10000, 0x4, 0x3, 0x2, 0x8001, 0x2, 0x0, 0x0, 0xffffffffffffffc0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000005c0)={{0x3, 0x63}, 'port0\x00', 0x10, 0x10401, 0x100, 0x229, 0x7f, 0xffffffffffffffc0, 0x80000000, 0x0, 0x2, 0x3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x80, @time, 0x0, {0xfff, 0x7}, 0x0, 0x0, 0x3e8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000580)) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r5 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000044ff6)='./control\x00', 0x0) r6 = fanotify_init(0x4, 0x800) fanotify_mark(r6, 0x32, 0x40000002, r5, &(0x7f0000000000)='./control\x00') setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000680)={r3, 0x1, 0xfffffffffffffca9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff96) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/89) 2018/04/21 01:40:31 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xf, 0x8000000000004, 0x4, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x13, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2ff) close(r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r2}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x4}, 0x14) 2018/04/21 01:40:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000d32fc0), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x5f) sync() ioprio_set$pid(0x0, 0x0, 0x4001) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0xfffffffffffffffd}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x8000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000400)={{0xd2, 0x5}, 'port0\x00', 0x8, 0x10000, 0x4, 0x3, 0x2, 0x8001, 0x2, 0x0, 0x0, 0xffffffffffffffc0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000005c0)={{0x3, 0x63}, 'port0\x00', 0x10, 0x10401, 0x100, 0x229, 0x7f, 0xffffffffffffffc0, 0x80000000, 0x0, 0x2, 0x3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x80, @time, 0x0, {0xfff, 0x7}, 0x0, 0x0, 0x3e8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000580)) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r5 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000044ff6)='./control\x00', 0x0) r6 = fanotify_init(0x4, 0x800) fanotify_mark(r6, 0x32, 0x40000002, r5, &(0x7f0000000000)='./control\x00') setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000680)={r3, 0x1, 0xfffffffffffffca9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff96) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/89) 2018/04/21 01:40:31 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000140)={0xffffffffffff5720, 0x0, 'client1\x00', 0x0, "9942af6b91fb0640", "55d6e988152940d5ab92eb57a97b0ab1bb3437b9298ea48813ed11d29f9e206c"}) 2018/04/21 01:40:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000d32fc0), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x5f) sync() ioprio_set$pid(0x0, 0x0, 0x4001) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0xfffffffffffffffd}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x8000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000400)={{0xd2, 0x5}, 'port0\x00', 0x8, 0x10000, 0x4, 0x3, 0x2, 0x8001, 0x2, 0x0, 0x0, 0xffffffffffffffc0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000005c0)={{0x3, 0x63}, 'port0\x00', 0x10, 0x10401, 0x100, 0x229, 0x7f, 0xffffffffffffffc0, 0x80000000, 0x0, 0x2, 0x3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x80, @time, 0x0, {0xfff, 0x7}, 0x0, 0x0, 0x3e8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000580)) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r5 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000044ff6)='./control\x00', 0x0) r6 = fanotify_init(0x4, 0x800) fanotify_mark(r6, 0x32, 0x40000002, r5, &(0x7f0000000000)='./control\x00') setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000680)={r3, 0x1, 0xfffffffffffffca9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff96) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/89) 2018/04/21 01:40:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000d32fc0), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x5f) sync() ioprio_set$pid(0x0, 0x0, 0x4001) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0xfffffffffffffffd}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x8000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000400)={{0xd2, 0x5}, 'port0\x00', 0x8, 0x10000, 0x4, 0x3, 0x2, 0x8001, 0x2, 0x0, 0x0, 0xffffffffffffffc0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000005c0)={{0x3, 0x63}, 'port0\x00', 0x10, 0x10401, 0x100, 0x229, 0x7f, 0xffffffffffffffc0, 0x80000000, 0x0, 0x2, 0x3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x80, @time, 0x0, {0xfff, 0x7}, 0x0, 0x0, 0x3e8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000580)) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r5 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000044ff6)='./control\x00', 0x0) r6 = fanotify_init(0x4, 0x800) fanotify_mark(r6, 0x32, 0x40000002, r5, &(0x7f0000000000)='./control\x00') setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000680)={r3, 0x1, 0xfffffffffffffca9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff96) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/89) 2018/04/21 01:40:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f8dfc8)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/67, 0x43}], 0x1, &(0x7f0000000340)=""/67, 0x43}, 0x0) 2018/04/21 01:40:31 executing program 4: socketpair(0xb, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={r3, 0x5, 0x400, 0x6}, 0x10) prctl$intptr(0x21, 0x1) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000240), 0x4) io_setup(0x61c, &(0x7f0000000500)) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:31 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) 2018/04/21 01:40:31 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000140)={0xffffffffffff5720, 0x0, 'client1\x00', 0x0, "9942af6b91fb0640", "55d6e988152940d5ab92eb57a97b0ab1bb3437b9298ea48813ed11d29f9e206c"}) 2018/04/21 01:40:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f8dfc8)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/67, 0x43}], 0x1, &(0x7f0000000340)=""/67, 0x43}, 0x0) 2018/04/21 01:40:31 executing program 4: socketpair(0xb, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={r3, 0x5, 0x400, 0x6}, 0x10) prctl$intptr(0x21, 0x1) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000240), 0x4) io_setup(0x61c, &(0x7f0000000500)) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/21 01:40:31 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000000c0)=0x4) 2018/04/21 01:40:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f8dfc8)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/67, 0x43}], 0x1, &(0x7f0000000340)=""/67, 0x43}, 0x0) 2018/04/21 01:40:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000115fe0)) fcntl$lock(r1, 0x26, &(0x7f000001d000)) dup2(r0, r1) 2018/04/21 01:40:31 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) 2018/04/21 01:40:32 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000d32fc0), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x5f) sync() ioprio_set$pid(0x0, 0x0, 0x4001) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0xfffffffffffffffd}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x8000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000400)={{0xd2, 0x5}, 'port0\x00', 0x8, 0x10000, 0x4, 0x3, 0x2, 0x8001, 0x2, 0x0, 0x0, 0xffffffffffffffc0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000005c0)={{0x3, 0x63}, 'port0\x00', 0x10, 0x10401, 0x100, 0x229, 0x7f, 0xffffffffffffffc0, 0x80000000, 0x0, 0x2, 0x3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x80, @time, 0x0, {0xfff, 0x7}, 0x0, 0x0, 0x3e8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000580)) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r5 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000044ff6)='./control\x00', 0x0) r6 = fanotify_init(0x4, 0x800) fanotify_mark(r6, 0x32, 0x40000002, r5, &(0x7f0000000000)='./control\x00') setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000680)={r3, 0x1, 0xfffffffffffffca9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff96) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/89) 2018/04/21 01:40:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000d32fc0), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x5f) sync() ioprio_set$pid(0x0, 0x0, 0x4001) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0xfffffffffffffffd}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x8000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000400)={{0xd2, 0x5}, 'port0\x00', 0x8, 0x10000, 0x4, 0x3, 0x2, 0x8001, 0x2, 0x0, 0x0, 0xffffffffffffffc0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000005c0)={{0x3, 0x63}, 'port0\x00', 0x10, 0x10401, 0x100, 0x229, 0x7f, 0xffffffffffffffc0, 0x80000000, 0x0, 0x2, 0x3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x80, @time, 0x0, {0xfff, 0x7}, 0x0, 0x0, 0x3e8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000580)) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r5 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000044ff6)='./control\x00', 0x0) r6 = fanotify_init(0x4, 0x800) fanotify_mark(r6, 0x32, 0x40000002, r5, &(0x7f0000000000)='./control\x00') setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000680)={r3, 0x1, 0xfffffffffffffca9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff96) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/89) 2018/04/21 01:40:32 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000000c0)=0x4) 2018/04/21 01:40:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000d32fc0), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x5f) sync() ioprio_set$pid(0x0, 0x0, 0x4001) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0xfffffffffffffffd}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x8000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000400)={{0xd2, 0x5}, 'port0\x00', 0x8, 0x10000, 0x4, 0x3, 0x2, 0x8001, 0x2, 0x0, 0x0, 0xffffffffffffffc0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000005c0)={{0x3, 0x63}, 'port0\x00', 0x10, 0x10401, 0x100, 0x229, 0x7f, 0xffffffffffffffc0, 0x80000000, 0x0, 0x2, 0x3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x80, @time, 0x0, {0xfff, 0x7}, 0x0, 0x0, 0x3e8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000580)) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r5 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000044ff6)='./control\x00', 0x0) r6 = fanotify_init(0x4, 0x800) fanotify_mark(r6, 0x32, 0x40000002, r5, &(0x7f0000000000)='./control\x00') setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000680)={r3, 0x1, 0xfffffffffffffca9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff96) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/89) 2018/04/21 01:40:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000d32fc0), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x5f) sync() ioprio_set$pid(0x0, 0x0, 0x4001) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0xfffffffffffffffd}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x8000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000400)={{0xd2, 0x5}, 'port0\x00', 0x8, 0x10000, 0x4, 0x3, 0x2, 0x8001, 0x2, 0x0, 0x0, 0xffffffffffffffc0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000005c0)={{0x3, 0x63}, 'port0\x00', 0x10, 0x10401, 0x100, 0x229, 0x7f, 0xffffffffffffffc0, 0x80000000, 0x0, 0x2, 0x3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x80, @time, 0x0, {0xfff, 0x7}, 0x0, 0x0, 0x3e8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000580)) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r5 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000044ff6)='./control\x00', 0x0) r6 = fanotify_init(0x4, 0x800) fanotify_mark(r6, 0x32, 0x40000002, r5, &(0x7f0000000000)='./control\x00') setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000680)={r3, 0x1, 0xfffffffffffffca9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff96) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/89) 2018/04/21 01:40:32 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) 2018/04/21 01:40:32 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) bind(r1, &(0x7f0000d01ff0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 2018/04/21 01:40:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000115fe0)) fcntl$lock(r1, 0x26, &(0x7f000001d000)) dup2(r0, r1) 2018/04/21 01:40:32 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) 2018/04/21 01:40:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000115fe0)) fcntl$lock(r1, 0x26, &(0x7f000001d000)) dup2(r0, r1) 2018/04/21 01:40:32 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000000c0)=0x4) 2018/04/21 01:40:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000115fe0)) fcntl$lock(r1, 0x26, &(0x7f000001d000)) dup2(r0, r1) 2018/04/21 01:40:32 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000115fe0)) fcntl$lock(r1, 0x26, &(0x7f000001d000)) dup2(r0, r1) 2018/04/21 01:40:32 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000000c0)=0x4) 2018/04/21 01:40:32 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f000000efe8)={0xaa}) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa04, &(0x7f0000006ffc)={{&(0x7f0000009000/0x4000)=nil, 0x4000}}) 2018/04/21 01:40:32 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x40086310}], 0x0, 0x0, &(0x7f0000000f4d)}) [ 123.765156] binder: 10197:10198 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 123.785549] binder: 10197:10199 BC_DEAD_BINDER_DONE 0000000000000000 not found 2018/04/21 01:40:33 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000d32fc0), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x5f) sync() ioprio_set$pid(0x0, 0x0, 0x4001) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0xfffffffffffffffd}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x8000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000400)={{0xd2, 0x5}, 'port0\x00', 0x8, 0x10000, 0x4, 0x3, 0x2, 0x8001, 0x2, 0x0, 0x0, 0xffffffffffffffc0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000005c0)={{0x3, 0x63}, 'port0\x00', 0x10, 0x10401, 0x100, 0x229, 0x7f, 0xffffffffffffffc0, 0x80000000, 0x0, 0x2, 0x3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x80, @time, 0x0, {0xfff, 0x7}, 0x0, 0x0, 0x3e8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000580)) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r5 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000044ff6)='./control\x00', 0x0) r6 = fanotify_init(0x4, 0x800) fanotify_mark(r6, 0x32, 0x40000002, r5, &(0x7f0000000000)='./control\x00') setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000680)={r3, 0x1, 0xfffffffffffffca9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff96) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/89) 2018/04/21 01:40:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000d32fc0), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x5f) sync() ioprio_set$pid(0x0, 0x0, 0x4001) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0xfffffffffffffffd}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x8000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000400)={{0xd2, 0x5}, 'port0\x00', 0x8, 0x10000, 0x4, 0x3, 0x2, 0x8001, 0x2, 0x0, 0x0, 0xffffffffffffffc0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000005c0)={{0x3, 0x63}, 'port0\x00', 0x10, 0x10401, 0x100, 0x229, 0x7f, 0xffffffffffffffc0, 0x80000000, 0x0, 0x2, 0x3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x80, @time, 0x0, {0xfff, 0x7}, 0x0, 0x0, 0x3e8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000580)) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r5 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000044ff6)='./control\x00', 0x0) r6 = fanotify_init(0x4, 0x800) fanotify_mark(r6, 0x32, 0x40000002, r5, &(0x7f0000000000)='./control\x00') setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000680)={r3, 0x1, 0xfffffffffffffca9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff96) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/89) 2018/04/21 01:40:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000d32fc0), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x5f) sync() ioprio_set$pid(0x0, 0x0, 0x4001) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0xfffffffffffffffd}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x8000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000400)={{0xd2, 0x5}, 'port0\x00', 0x8, 0x10000, 0x4, 0x3, 0x2, 0x8001, 0x2, 0x0, 0x0, 0xffffffffffffffc0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000005c0)={{0x3, 0x63}, 'port0\x00', 0x10, 0x10401, 0x100, 0x229, 0x7f, 0xffffffffffffffc0, 0x80000000, 0x0, 0x2, 0x3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x80, @time, 0x0, {0xfff, 0x7}, 0x0, 0x0, 0x3e8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000580)) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r5 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000044ff6)='./control\x00', 0x0) r6 = fanotify_init(0x4, 0x800) fanotify_mark(r6, 0x32, 0x40000002, r5, &(0x7f0000000000)='./control\x00') setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000680)={r3, 0x1, 0xfffffffffffffca9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff96) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/89) 2018/04/21 01:40:33 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000115fe0)) fcntl$lock(r1, 0x26, &(0x7f000001d000)) dup2(r0, r1) 2018/04/21 01:40:33 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x40086310}], 0x0, 0x0, &(0x7f0000000f4d)}) 2018/04/21 01:40:33 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f000000efe8)={0xaa}) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa04, &(0x7f0000006ffc)={{&(0x7f0000009000/0x4000)=nil, 0x4000}}) 2018/04/21 01:40:33 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) bind(r1, &(0x7f0000d01ff0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 2018/04/21 01:40:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000d32fc0), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x5f) sync() ioprio_set$pid(0x0, 0x0, 0x4001) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0xfffffffffffffffd}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x8000, 0x4}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000400)={{0xd2, 0x5}, 'port0\x00', 0x8, 0x10000, 0x4, 0x3, 0x2, 0x8001, 0x2, 0x0, 0x0, 0xffffffffffffffc0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000005c0)={{0x3, 0x63}, 'port0\x00', 0x10, 0x10401, 0x100, 0x229, 0x7f, 0xffffffffffffffc0, 0x80000000, 0x0, 0x2, 0x3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x80, @time, 0x0, {0xfff, 0x7}, 0x0, 0x0, 0x3e8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000580)) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r5 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000044ff6)='./control\x00', 0x0) r6 = fanotify_init(0x4, 0x800) fanotify_mark(r6, 0x32, 0x40000002, r5, &(0x7f0000000000)='./control\x00') setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000680)={r3, 0x1, 0xfffffffffffffca9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff96) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/89) 2018/04/21 01:40:33 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f000000efe8)={0xaa}) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa04, &(0x7f0000006ffc)={{&(0x7f0000009000/0x4000)=nil, 0x4000}}) [ 124.726873] binder: 10232:10243 BC_DEAD_BINDER_DONE 0000000000000000 not found 2018/04/21 01:40:33 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000115fe0)) fcntl$lock(r1, 0x26, &(0x7f000001d000)) dup2(r0, r1) 2018/04/21 01:40:33 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x40086310}], 0x0, 0x0, &(0x7f0000000f4d)}) 2018/04/21 01:40:33 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f000000efe8)={0xaa}) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa04, &(0x7f0000006ffc)={{&(0x7f0000009000/0x4000)=nil, 0x4000}}) 2018/04/21 01:40:33 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x40086310}], 0x0, 0x0, &(0x7f0000000f4d)}) 2018/04/21 01:40:33 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) bind(r1, &(0x7f0000d01ff0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) [ 124.818621] binder: 10253:10254 BC_DEAD_BINDER_DONE 0000000000000000 not found 2018/04/21 01:40:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) bind(r1, &(0x7f0000d01ff0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 2018/04/21 01:40:33 executing program 0: syz_emit_ethernet(0x5a, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "f3b639", 0x24, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[@fragment={0x2c}, @srh={0x3c, 0x0, 0x4}], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000004c0)) [ 124.906218] binder: 10261:10263 BC_DEAD_BINDER_DONE 0000000000000000 not found 2018/04/21 01:40:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) bind(r1, &(0x7f0000d01ff0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 2018/04/21 01:40:34 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) bind(r1, &(0x7f0000d01ff0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 2018/04/21 01:40:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) bind(r1, &(0x7f0000d01ff0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 2018/04/21 01:40:34 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) io_setup(0xc40, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)}]) 2018/04/21 01:40:34 executing program 2: mq_notify(0xffffffffffffffff, &(0x7f0000477fa0)={0x0, 0x0, 0x0, @thr={&(0x7f0000bc8000), &(0x7f0000589000)}}) 2018/04/21 01:40:34 executing program 0: syz_emit_ethernet(0x5a, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "f3b639", 0x24, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[@fragment={0x2c}, @srh={0x3c, 0x0, 0x4}], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000004c0)) 2018/04/21 01:40:34 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) sendto$inet6(r0, &(0x7f0000001340), 0x0, 0x0, &(0x7f0000008000)={0xa, 0x1, 0x4, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/21 01:40:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x10, 0x0, 0x6}) accept4$ipx(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000002c0)=0x10, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/38, 0x26}, &(0x7f0000000080)}, 0x20) chroot(&(0x7f0000000140)='./file0\x00') socketpair$ax25(0x3, 0x0, 0x0, &(0x7f0000000280)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)=0x6, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:40:34 executing program 0: syz_emit_ethernet(0x5a, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "f3b639", 0x24, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[@fragment={0x2c}, @srh={0x3c, 0x0, 0x4}], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000004c0)) 2018/04/21 01:40:34 executing program 2: mq_notify(0xffffffffffffffff, &(0x7f0000477fa0)={0x0, 0x0, 0x0, @thr={&(0x7f0000bc8000), &(0x7f0000589000)}}) 2018/04/21 01:40:35 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) sendto$inet6(r0, &(0x7f0000001340), 0x0, 0x0, &(0x7f0000008000)={0xa, 0x1, 0x4, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/21 01:40:35 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) io_setup(0xc40, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)}]) 2018/04/21 01:40:35 executing program 0: syz_emit_ethernet(0x5a, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "f3b639", 0x24, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[@fragment={0x2c}, @srh={0x3c, 0x0, 0x4}], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000004c0)) 2018/04/21 01:40:35 executing program 2: mq_notify(0xffffffffffffffff, &(0x7f0000477fa0)={0x0, 0x0, 0x0, @thr={&(0x7f0000bc8000), &(0x7f0000589000)}}) 2018/04/21 01:40:35 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) sendto$inet6(r0, &(0x7f0000001340), 0x0, 0x0, &(0x7f0000008000)={0xa, 0x1, 0x4, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/21 01:40:35 executing program 0: socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000001ff8)={0x0}) sendmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000001b00)=@vsock={0x1e, 0x0, 0x0, @reserved=0x1}, 0x10, &(0x7f0000001bc0), 0x61, &(0x7f0000003000)}}], 0x2, 0x0) 2018/04/21 01:40:35 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) bind(r1, &(0x7f0000d01ff0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 2018/04/21 01:40:35 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) io_setup(0xc40, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)}]) 2018/04/21 01:40:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x10, 0x0, 0x6}) accept4$ipx(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000002c0)=0x10, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/38, 0x26}, &(0x7f0000000080)}, 0x20) chroot(&(0x7f0000000140)='./file0\x00') socketpair$ax25(0x3, 0x0, 0x0, &(0x7f0000000280)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)=0x6, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:40:35 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) sendto$inet6(r0, &(0x7f0000001340), 0x0, 0x0, &(0x7f0000008000)={0xa, 0x1, 0x4, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/21 01:40:35 executing program 2: mq_notify(0xffffffffffffffff, &(0x7f0000477fa0)={0x0, 0x0, 0x0, @thr={&(0x7f0000bc8000), &(0x7f0000589000)}}) 2018/04/21 01:40:35 executing program 0: socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000001ff8)={0x0}) sendmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000001b00)=@vsock={0x1e, 0x0, 0x0, @reserved=0x1}, 0x10, &(0x7f0000001bc0), 0x61, &(0x7f0000003000)}}], 0x2, 0x0) 2018/04/21 01:40:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) bind(r1, &(0x7f0000d01ff0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 2018/04/21 01:40:35 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) bind(r1, &(0x7f0000d01ff0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 2018/04/21 01:40:35 executing program 0: socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000001ff8)={0x0}) sendmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000001b00)=@vsock={0x1e, 0x0, 0x0, @reserved=0x1}, 0x10, &(0x7f0000001bc0), 0x61, &(0x7f0000003000)}}], 0x2, 0x0) 2018/04/21 01:40:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001580)="f4", 0x1}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 01:40:35 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x491}]}) 2018/04/21 01:40:35 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) io_setup(0xc40, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)}]) 2018/04/21 01:40:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x10, 0x0, 0x6}) accept4$ipx(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000002c0)=0x10, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/38, 0x26}, &(0x7f0000000080)}, 0x20) chroot(&(0x7f0000000140)='./file0\x00') socketpair$ax25(0x3, 0x0, 0x0, &(0x7f0000000280)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)=0x6, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:40:35 executing program 0: socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000001ff8)={0x0}) sendmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000001b00)=@vsock={0x1e, 0x0, 0x0, @reserved=0x1}, 0x10, &(0x7f0000001bc0), 0x61, &(0x7f0000003000)}}], 0x2, 0x0) 2018/04/21 01:40:35 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x491}]}) 2018/04/21 01:40:36 executing program 5: msgsnd(0x0, &(0x7f000010d000), 0xfffffe60, 0x0) 2018/04/21 01:40:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001580)="f4", 0x1}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 01:40:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001580)="f4", 0x1}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 01:40:36 executing program 5: msgsnd(0x0, &(0x7f000010d000), 0xfffffe60, 0x0) 2018/04/21 01:40:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x10, 0x0, 0x6}) accept4$ipx(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000002c0)=0x10, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/38, 0x26}, &(0x7f0000000080)}, 0x20) chroot(&(0x7f0000000140)='./file0\x00') socketpair$ax25(0x3, 0x0, 0x0, &(0x7f0000000280)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)=0x6, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:40:36 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x491}]}) 2018/04/21 01:40:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f00000000c0)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x40000073, 0x0, 0x7ff}]}) 2018/04/21 01:40:36 executing program 6: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4000000000000006}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="0cd57b85eba93a96ade37bb5cc779cfa44385ca8bfc579860c604b628df3247aae13b4d6bd91acf69f", 0x29}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/21 01:40:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x2004e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000540), 0x0, 0x600007ff, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000380)=0x4) recvmsg(r0, &(0x7f00000025c0)={&(0x7f00000023c0)=@hci, 0x80, &(0x7f00000024c0), 0x0, &(0x7f0000002500)=""/179, 0xb3}, 0x0) shutdown(r0, 0x1) 2018/04/21 01:40:36 executing program 5: msgsnd(0x0, &(0x7f000010d000), 0xfffffe60, 0x0) 2018/04/21 01:40:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001580)="f4", 0x1}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 01:40:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001580)="f4", 0x1}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 01:40:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f00000000c0)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x40000073, 0x0, 0x7ff}]}) 2018/04/21 01:40:37 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x491}]}) 2018/04/21 01:40:37 executing program 5: msgsnd(0x0, &(0x7f000010d000), 0xfffffe60, 0x0) 2018/04/21 01:40:37 executing program 6: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4000000000000006}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="0cd57b85eba93a96ade37bb5cc779cfa44385ca8bfc579860c604b628df3247aae13b4d6bd91acf69f", 0x29}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/21 01:40:37 executing program 3: mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000003ffc), &(0x7f0000001ffc)=0x2a2) 2018/04/21 01:40:37 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x2004e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000540), 0x0, 0x600007ff, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000380)=0x4) recvmsg(r0, &(0x7f00000025c0)={&(0x7f00000023c0)=@hci, 0x80, &(0x7f00000024c0), 0x0, &(0x7f0000002500)=""/179, 0xb3}, 0x0) shutdown(r0, 0x1) 2018/04/21 01:40:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001580)="f4", 0x1}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 01:40:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x2004e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000540), 0x0, 0x600007ff, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000380)=0x4) recvmsg(r0, &(0x7f00000025c0)={&(0x7f00000023c0)=@hci, 0x80, &(0x7f00000024c0), 0x0, &(0x7f0000002500)=""/179, 0xb3}, 0x0) shutdown(r0, 0x1) 2018/04/21 01:40:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001580)="f4", 0x1}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 01:40:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff600611803"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000002cc0)="73797a6b616c6c657201", 0x7, 0xfde1, &(0x7f00000003c0)=""/187}, 0x48) 2018/04/21 01:40:37 executing program 3: mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000003ffc), &(0x7f0000001ffc)=0x2a2) 2018/04/21 01:40:37 executing program 6: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4000000000000006}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="0cd57b85eba93a96ade37bb5cc779cfa44385ca8bfc579860c604b628df3247aae13b4d6bd91acf69f", 0x29}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/21 01:40:37 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x72868cb5}}, 0x1c) 2018/04/21 01:40:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f00000000c0)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x40000073, 0x0, 0x7ff}]}) 2018/04/21 01:40:37 executing program 3: mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000003ffc), &(0x7f0000001ffc)=0x2a2) 2018/04/21 01:40:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff600611803"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000002cc0)="73797a6b616c6c657201", 0x7, 0xfde1, &(0x7f00000003c0)=""/187}, 0x48) 2018/04/21 01:40:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') fallocate(r0, 0x0, 0x0, 0x200) 2018/04/21 01:40:37 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x72868cb5}}, 0x1c) 2018/04/21 01:40:37 executing program 6: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4000000000000006}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="0cd57b85eba93a96ade37bb5cc779cfa44385ca8bfc579860c604b628df3247aae13b4d6bd91acf69f", 0x29}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/21 01:40:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f00000000c0)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r3, r2, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x40000073, 0x0, 0x7ff}]}) 2018/04/21 01:40:37 executing program 3: mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000003ffc), &(0x7f0000001ffc)=0x2a2) 2018/04/21 01:40:38 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x2004e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000540), 0x0, 0x600007ff, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000380)=0x4) recvmsg(r0, &(0x7f00000025c0)={&(0x7f00000023c0)=@hci, 0x80, &(0x7f00000024c0), 0x0, &(0x7f0000002500)=""/179, 0xb3}, 0x0) shutdown(r0, 0x1) 2018/04/21 01:40:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') fallocate(r0, 0x0, 0x0, 0x200) 2018/04/21 01:40:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff600611803"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000002cc0)="73797a6b616c6c657201", 0x7, 0xfde1, &(0x7f00000003c0)=""/187}, 0x48) 2018/04/21 01:40:38 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x72868cb5}}, 0x1c) 2018/04/21 01:40:38 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="ca1535dd40dad7eb4b9d9a81ff4bbc7910c59d0fc06754a8eb30c9d8f4f5fa44f5e238fffe9987e1ce9fe81f970949edef0420bc318ad0b958", 0x39) 2018/04/21 01:40:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000000a300)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="9147ad46390d00c80000009d4d5469d01101c2f87d13e3bf", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = dup(r1) sendmmsg(r2, &(0x7f0000004b00)=[{{&(0x7f0000000000)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-sse2\x00'}, 0x80, &(0x7f0000000100)=[{&(0x7f00000002c0)='H', 0x1}], 0x1, &(0x7f00000005c0)}}, {{&(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x80, &(0x7f0000003a40), 0x0, &(0x7f0000003ac0)=[{0x10}], 0x10}}], 0x2, 0x0) 2018/04/21 01:40:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc={0x10}, 0x80, &(0x7f0000009000), 0x0, &(0x7f0000004000)}, 0x0) 2018/04/21 01:40:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x2004e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000540), 0x0, 0x600007ff, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000380)=0x4) recvmsg(r0, &(0x7f00000025c0)={&(0x7f00000023c0)=@hci, 0x80, &(0x7f00000024c0), 0x0, &(0x7f0000002500)=""/179, 0xb3}, 0x0) shutdown(r0, 0x1) 2018/04/21 01:40:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000000a300)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="9147ad46390d00c80000009d4d5469d01101c2f87d13e3bf", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = dup(r1) sendmmsg(r2, &(0x7f0000004b00)=[{{&(0x7f0000000000)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-sse2\x00'}, 0x80, &(0x7f0000000100)=[{&(0x7f00000002c0)='H', 0x1}], 0x1, &(0x7f00000005c0)}}, {{&(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x80, &(0x7f0000003a40), 0x0, &(0x7f0000003ac0)=[{0x10}], 0x10}}], 0x2, 0x0) 2018/04/21 01:40:38 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="ca1535dd40dad7eb4b9d9a81ff4bbc7910c59d0fc06754a8eb30c9d8f4f5fa44f5e238fffe9987e1ce9fe81f970949edef0420bc318ad0b958", 0x39) 2018/04/21 01:40:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff600611803"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000002cc0)="73797a6b616c6c657201", 0x7, 0xfde1, &(0x7f00000003c0)=""/187}, 0x48) 2018/04/21 01:40:38 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x72868cb5}}, 0x1c) 2018/04/21 01:40:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') fallocate(r0, 0x0, 0x0, 0x200) 2018/04/21 01:40:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc={0x10}, 0x80, &(0x7f0000009000), 0x0, &(0x7f0000004000)}, 0x0) 2018/04/21 01:40:38 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f000027efd4)={0xa, 0x1, 0x7f, 0x9}, 0x2a) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f00000000c0), 0x2}, 0x20) 2018/04/21 01:40:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') fallocate(r0, 0x0, 0x0, 0x200) 2018/04/21 01:40:39 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x2004e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000540), 0x0, 0x600007ff, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000380)=0x4) recvmsg(r0, &(0x7f00000025c0)={&(0x7f00000023c0)=@hci, 0x80, &(0x7f00000024c0), 0x0, &(0x7f0000002500)=""/179, 0xb3}, 0x0) shutdown(r0, 0x1) 2018/04/21 01:40:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000000a300)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="9147ad46390d00c80000009d4d5469d01101c2f87d13e3bf", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = dup(r1) sendmmsg(r2, &(0x7f0000004b00)=[{{&(0x7f0000000000)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-sse2\x00'}, 0x80, &(0x7f0000000100)=[{&(0x7f00000002c0)='H', 0x1}], 0x1, &(0x7f00000005c0)}}, {{&(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x80, &(0x7f0000003a40), 0x0, &(0x7f0000003ac0)=[{0x10}], 0x10}}], 0x2, 0x0) 2018/04/21 01:40:39 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc={0x10}, 0x80, &(0x7f0000009000), 0x0, &(0x7f0000004000)}, 0x0) 2018/04/21 01:40:39 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="ca1535dd40dad7eb4b9d9a81ff4bbc7910c59d0fc06754a8eb30c9d8f4f5fa44f5e238fffe9987e1ce9fe81f970949edef0420bc318ad0b958", 0x39) 2018/04/21 01:40:39 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000000c0)=""/70) close(0xffffffffffffffff) 2018/04/21 01:40:39 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x4, &(0x7f0000000000), 0x14) 2018/04/21 01:40:39 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f000027efd4)={0xa, 0x1, 0x7f, 0x9}, 0x2a) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f00000000c0), 0x2}, 0x20) 2018/04/21 01:40:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x2004e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000540), 0x0, 0x600007ff, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000380)=0x4) recvmsg(r0, &(0x7f00000025c0)={&(0x7f00000023c0)=@hci, 0x80, &(0x7f00000024c0), 0x0, &(0x7f0000002500)=""/179, 0xb3}, 0x0) shutdown(r0, 0x1) 2018/04/21 01:40:39 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="ca1535dd40dad7eb4b9d9a81ff4bbc7910c59d0fc06754a8eb30c9d8f4f5fa44f5e238fffe9987e1ce9fe81f970949edef0420bc318ad0b958", 0x39) 2018/04/21 01:40:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000000a300)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="9147ad46390d00c80000009d4d5469d01101c2f87d13e3bf", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = dup(r1) sendmmsg(r2, &(0x7f0000004b00)=[{{&(0x7f0000000000)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-sse2\x00'}, 0x80, &(0x7f0000000100)=[{&(0x7f00000002c0)='H', 0x1}], 0x1, &(0x7f00000005c0)}}, {{&(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x80, &(0x7f0000003a40), 0x0, &(0x7f0000003ac0)=[{0x10}], 0x10}}], 0x2, 0x0) 2018/04/21 01:40:39 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000000c0)=""/70) close(0xffffffffffffffff) 2018/04/21 01:40:39 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc={0x10}, 0x80, &(0x7f0000009000), 0x0, &(0x7f0000004000)}, 0x0) 2018/04/21 01:40:39 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x4, &(0x7f0000000000), 0x14) 2018/04/21 01:40:39 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f000027efd4)={0xa, 0x1, 0x7f, 0x9}, 0x2a) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f00000000c0), 0x2}, 0x20) 2018/04/21 01:40:39 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f000027efd4)={0xa, 0x1, 0x7f, 0x9}, 0x2a) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f00000000c0), 0x2}, 0x20) 2018/04/21 01:40:39 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000000c0)=""/70) close(0xffffffffffffffff) 2018/04/21 01:40:40 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180), 0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) clock_gettime(0x0, &(0x7f00000002c0)) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0x7530}}) 2018/04/21 01:40:40 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x4, &(0x7f0000000000), 0x14) 2018/04/21 01:40:40 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="220000002100070600be0000090007010a00001effe3000057ff040405000c0028be", 0x22) 2018/04/21 01:40:40 executing program 5: syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000f08fc0), &(0x7f0000086000), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000d0a000)={&(0x7f00001da000), 0x8}) 2018/04/21 01:40:40 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x200000000000007, 0x10040000000000d9}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0xf0ffffff7f0000, 0x0, &(0x7f0000000180)) 2018/04/21 01:40:40 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f000027efd4)={0xa, 0x1, 0x7f, 0x9}, 0x2a) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f00000000c0), 0x2}, 0x20) 2018/04/21 01:40:40 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000000c0)=""/70) close(0xffffffffffffffff) 2018/04/21 01:40:40 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f000027efd4)={0xa, 0x1, 0x7f, 0x9}, 0x2a) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f00000000c0), 0x2}, 0x20) 2018/04/21 01:40:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_aout(r1, &(0x7f00000005c0)={{0x107}}, 0x20) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/21 01:40:40 executing program 7: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x800014, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000e64000)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file1\x00') 2018/04/21 01:40:40 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="220000002100070600be0000090007010a00001effe3000057ff040405000c0028be", 0x22) 2018/04/21 01:40:40 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f000027efd4)={0xa, 0x1, 0x7f, 0x9}, 0x2a) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f00000000c0), 0x2}, 0x20) 2018/04/21 01:40:40 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x4, &(0x7f0000000000), 0x14) 2018/04/21 01:40:40 executing program 5: syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000f08fc0), &(0x7f0000086000), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000d0a000)={&(0x7f00001da000), 0x8}) 2018/04/21 01:40:40 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x200000000000007, 0x10040000000000d9}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0xf0ffffff7f0000, 0x0, &(0x7f0000000180)) 2018/04/21 01:40:40 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="220000002100070600be0000090007010a00001effe3000057ff040405000c0028be", 0x22) 2018/04/21 01:40:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x800014, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000e64000)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file1\x00') 2018/04/21 01:40:40 executing program 7: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x800014, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000e64000)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file1\x00') 2018/04/21 01:40:40 executing program 5: syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000f08fc0), &(0x7f0000086000), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000d0a000)={&(0x7f00001da000), 0x8}) 2018/04/21 01:40:40 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180), 0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) clock_gettime(0x0, &(0x7f00000002c0)) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0x7530}}) 2018/04/21 01:40:40 executing program 6: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "51e59cbb1a332e1e768a0774584587590579e2575bb8b02e57e4e89191625855d86d3fe760d75d427a006bba694e2543d8b477a8660dfae53f19a6a71e7794"}, 0x60) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb78209ad88b89d1fd309169f44812107130ee55da30510420aaa96759ecbc36eb9bb12b6126793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a"}, 0x60) dup2(r0, r1) 2018/04/21 01:40:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_aout(r1, &(0x7f00000005c0)={{0x107}}, 0x20) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/21 01:40:40 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="220000002100070600be0000090007010a00001effe3000057ff040405000c0028be", 0x22) 2018/04/21 01:40:40 executing program 6: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "51e59cbb1a332e1e768a0774584587590579e2575bb8b02e57e4e89191625855d86d3fe760d75d427a006bba694e2543d8b477a8660dfae53f19a6a71e7794"}, 0x60) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb78209ad88b89d1fd309169f44812107130ee55da30510420aaa96759ecbc36eb9bb12b6126793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a"}, 0x60) dup2(r0, r1) 2018/04/21 01:40:40 executing program 5: syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000f08fc0), &(0x7f0000086000), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000d0a000)={&(0x7f00001da000), 0x8}) 2018/04/21 01:40:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_aout(r1, &(0x7f00000005c0)={{0x107}}, 0x20) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/21 01:40:40 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180), 0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) clock_gettime(0x0, &(0x7f00000002c0)) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0x7530}}) 2018/04/21 01:40:40 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x200000000000007, 0x10040000000000d9}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0xf0ffffff7f0000, 0x0, &(0x7f0000000180)) 2018/04/21 01:40:40 executing program 7: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x800014, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000e64000)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file1\x00') 2018/04/21 01:40:41 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x800014, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000e64000)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file1\x00') 2018/04/21 01:40:41 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "51e59cbb1a332e1e768a0774584587590579e2575bb8b02e57e4e89191625855d86d3fe760d75d427a006bba694e2543d8b477a8660dfae53f19a6a71e7794"}, 0x60) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb78209ad88b89d1fd309169f44812107130ee55da30510420aaa96759ecbc36eb9bb12b6126793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a"}, 0x60) dup2(r0, r1) 2018/04/21 01:40:41 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "51e59cbb1a332e1e768a0774584587590579e2575bb8b02e57e4e89191625855d86d3fe760d75d427a006bba694e2543d8b477a8660dfae53f19a6a71e7794"}, 0x60) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb78209ad88b89d1fd309169f44812107130ee55da30510420aaa96759ecbc36eb9bb12b6126793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a"}, 0x60) dup2(r0, r1) 2018/04/21 01:40:41 executing program 6: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "51e59cbb1a332e1e768a0774584587590579e2575bb8b02e57e4e89191625855d86d3fe760d75d427a006bba694e2543d8b477a8660dfae53f19a6a71e7794"}, 0x60) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb78209ad88b89d1fd309169f44812107130ee55da30510420aaa96759ecbc36eb9bb12b6126793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a"}, 0x60) dup2(r0, r1) 2018/04/21 01:40:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_aout(r1, &(0x7f00000005c0)={{0x107}}, 0x20) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/21 01:40:41 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x200000000000007, 0x10040000000000d9}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0xf0ffffff7f0000, 0x0, &(0x7f0000000180)) 2018/04/21 01:40:41 executing program 7: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x800014, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000e64000)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file1\x00') 2018/04/21 01:40:41 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180), 0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) clock_gettime(0x0, &(0x7f00000002c0)) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0x7530}}) 2018/04/21 01:40:41 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "51e59cbb1a332e1e768a0774584587590579e2575bb8b02e57e4e89191625855d86d3fe760d75d427a006bba694e2543d8b477a8660dfae53f19a6a71e7794"}, 0x60) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb78209ad88b89d1fd309169f44812107130ee55da30510420aaa96759ecbc36eb9bb12b6126793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a"}, 0x60) dup2(r0, r1) 2018/04/21 01:40:41 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "51e59cbb1a332e1e768a0774584587590579e2575bb8b02e57e4e89191625855d86d3fe760d75d427a006bba694e2543d8b477a8660dfae53f19a6a71e7794"}, 0x60) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb78209ad88b89d1fd309169f44812107130ee55da30510420aaa96759ecbc36eb9bb12b6126793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a"}, 0x60) dup2(r0, r1) 2018/04/21 01:40:41 executing program 6: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "51e59cbb1a332e1e768a0774584587590579e2575bb8b02e57e4e89191625855d86d3fe760d75d427a006bba694e2543d8b477a8660dfae53f19a6a71e7794"}, 0x60) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb78209ad88b89d1fd309169f44812107130ee55da30510420aaa96759ecbc36eb9bb12b6126793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a"}, 0x60) dup2(r0, r1) 2018/04/21 01:40:41 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180), 0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) clock_gettime(0x0, &(0x7f00000002c0)) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0x7530}}) 2018/04/21 01:40:41 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180), 0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) clock_gettime(0x0, &(0x7f00000002c0)) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0x7530}}) 2018/04/21 01:40:41 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0xaf01, &(0x7f00001e3000)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000600)={0x2, 0x0, [{0x0, 0x9d, &(0x7f0000000500)=""/157}, {0x1, 0x30, &(0x7f00000005c0)=""/48}]}) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) 2018/04/21 01:40:41 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x800014, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000e64000)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file1\x00') 2018/04/21 01:40:41 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "51e59cbb1a332e1e768a0774584587590579e2575bb8b02e57e4e89191625855d86d3fe760d75d427a006bba694e2543d8b477a8660dfae53f19a6a71e7794"}, 0x60) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb78209ad88b89d1fd309169f44812107130ee55da30510420aaa96759ecbc36eb9bb12b6126793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a"}, 0x60) dup2(r0, r1) 2018/04/21 01:40:41 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "51e59cbb1a332e1e768a0774584587590579e2575bb8b02e57e4e89191625855d86d3fe760d75d427a006bba694e2543d8b477a8660dfae53f19a6a71e7794"}, 0x60) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb78209ad88b89d1fd309169f44812107130ee55da30510420aaa96759ecbc36eb9bb12b6126793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a"}, 0x60) dup2(r0, r1) 2018/04/21 01:40:41 executing program 7: msgctl$IPC_SET(0x0, 0xd, &(0x7f0000000700)) 2018/04/21 01:40:41 executing program 7: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/21 01:40:41 executing program 5: r0 = gettid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ptmx\x00', 0x2, 0x0) write(r1, &(0x7f000006e000), 0xfffffdd8) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x800) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) write$sndseq(r1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @control}], 0x30) tkill(r0, 0x1000000000013) 2018/04/21 01:40:41 executing program 6: mmap(&(0x7f0000000000/0xfbf000)=nil, 0xfbf000, 0x0, 0x800000000000032, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000012000)) 2018/04/21 01:40:41 executing program 4: r0 = socket$nl_xfrm(0xa, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000000)={0x10}, 0xc) 2018/04/21 01:40:41 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180), 0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) clock_gettime(0x0, &(0x7f00000002c0)) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0x7530}}) 2018/04/21 01:40:41 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180), 0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) clock_gettime(0x0, &(0x7f00000002c0)) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0x7530}}) 2018/04/21 01:40:41 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0xaf01, &(0x7f00001e3000)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000600)={0x2, 0x0, [{0x0, 0x9d, &(0x7f0000000500)=""/157}, {0x1, 0x30, &(0x7f00000005c0)=""/48}]}) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) 2018/04/21 01:40:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0xaf01, &(0x7f00001e3000)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000600)={0x2, 0x0, [{0x0, 0x9d, &(0x7f0000000500)=""/157}, {0x1, 0x30, &(0x7f00000005c0)=""/48}]}) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) [ 132.646090] ================================================================== [ 132.653722] BUG: KASAN: null-ptr-deref in refcount_inc_not_zero+0x8f/0x2d0 [ 132.660755] Read of size 4 at addr 0000000000000004 by task syz-executor7/10822 [ 132.668206] [ 132.669851] CPU: 1 PID: 10822 Comm: syz-executor7 Not tainted 4.17.0-rc1+ #10 [ 132.677125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.686493] Call Trace: [ 132.689105] dump_stack+0x1b9/0x294 [ 132.692762] ? dump_stack_print_info.cold.2+0x52/0x52 [ 132.697971] ? kasan_check_write+0x14/0x20 [ 132.702224] ? do_raw_spin_lock+0xc1/0x200 [ 132.706477] ? vprintk_func+0x81/0xe7 [ 132.710383] ? refcount_inc_not_zero+0x8f/0x2d0 [ 132.715161] kasan_report.cold.7+0x6d/0x2fe [ 132.719504] check_memory_region+0x13e/0x1b0 [ 132.723967] kasan_check_read+0x11/0x20 [ 132.727964] refcount_inc_not_zero+0x8f/0x2d0 [ 132.732478] ? refcount_add_not_zero+0x320/0x320 [ 132.737253] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 132.742284] ? lock_sock_nested+0x9f/0x120 [ 132.746548] refcount_inc+0x15/0x70 [ 132.750184] llc_ui_release+0xba/0x2b0 [ 132.754077] ? fsnotify_first_mark+0x330/0x330 [ 132.758674] sock_release+0x96/0x1b0 [ 132.762394] ? sock_alloc_file+0x4e0/0x4e0 [ 132.766634] sock_close+0x16/0x20 [ 132.770094] __fput+0x34d/0x890 [ 132.773385] ? fput+0x1a0/0x1a0 [ 132.776675] ? _raw_spin_unlock_irq+0x27/0x70 [ 132.781186] ____fput+0x15/0x20 [ 132.784478] task_work_run+0x1e4/0x290 [ 132.788380] ? task_work_cancel+0x240/0x240 2018/04/21 01:40:41 executing program 6: mmap(&(0x7f0000000000/0xfbf000)=nil, 0xfbf000, 0x0, 0x800000000000032, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000012000)) 2018/04/21 01:40:41 executing program 6: mmap(&(0x7f0000000000/0xfbf000)=nil, 0xfbf000, 0x0, 0x800000000000032, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000012000)) 2018/04/21 01:40:41 executing program 6: mmap(&(0x7f0000000000/0xfbf000)=nil, 0xfbf000, 0x0, 0x800000000000032, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000012000)) [ 132.792724] ? switch_task_namespaces+0xbd/0xd0 [ 132.797405] do_exit+0x1aee/0x2730 [ 132.800966] ? mm_update_next_owner+0x980/0x980 [ 132.805644] ? print_usage_bug+0xc0/0xc0 [ 132.809719] ? check_same_owner+0x320/0x320 [ 132.814060] ? do_raw_spin_unlock+0x9e/0x2e0 [ 132.818488] ? rcu_note_context_switch+0x710/0x710 [ 132.823436] ? lock_acquire+0x1dc/0x520 [ 132.827425] ? __might_sleep+0x95/0x190 [ 132.831425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.836972] ? __lock_acquire+0x7f5/0x5140 [ 132.841223] ? kasan_check_write+0x14/0x20 [ 132.845472] ? do_raw_spin_lock+0xc1/0x200 [ 132.849727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.855286] ? debug_check_no_locks_freed+0x310/0x310 [ 132.860504] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 132.865715] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 132.871280] ? drop_futex_key_refs.isra.13+0x6d/0xe0 [ 132.876400] ? futex_wait+0x5c1/0x9f0 [ 132.880217] ? perf_trace_lock+0xd6/0x900 [ 132.884384] ? zap_class+0x720/0x720 [ 132.888110] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 132.893324] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 132.898876] ? drop_futex_key_refs.isra.13+0x6d/0xe0 [ 132.903994] ? futex_wake+0x2f6/0x750 [ 132.907807] ? graph_lock+0x170/0x170 [ 132.911629] ? memset+0x31/0x40 [ 132.914930] ? find_held_lock+0x36/0x1c0 [ 132.919016] ? lock_downgrade+0x8e0/0x8e0 [ 132.923189] do_group_exit+0x16f/0x430 [ 132.927088] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 132.931679] ? __ia32_sys_exit+0x50/0x50 [ 132.935755] ? _raw_spin_unlock_irq+0x27/0x70 [ 132.940265] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 132.945303] get_signal+0x886/0x1960 [ 132.949044] ? ptrace_notify+0x130/0x130 [ 132.953130] ? graph_lock+0x170/0x170 [ 132.956947] ? rcu_is_watching+0x85/0x140 [ 132.961138] ? mntput_no_expire+0x186/0xba0 [ 132.965487] ? dentry_kill+0xce/0x5a0 [ 132.969349] ? mnt_get_count+0x150/0x150 [ 132.973429] ? find_held_lock+0x36/0x1c0 [ 132.977512] do_signal+0x98/0x2040 [ 132.981071] ? lock_downgrade+0x8e0/0x8e0 [ 132.985236] ? setup_sigcontext+0x7d0/0x7d0 [ 132.989572] ? kasan_check_read+0x11/0x20 2018/04/21 01:40:42 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180), 0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) clock_gettime(0x0, &(0x7f00000002c0)) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0x7530}}) [ 132.993731] ? do_raw_spin_unlock+0x9e/0x2e0 [ 132.998146] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 133.002745] ? _raw_spin_unlock_irq+0x27/0x70 [ 133.007251] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 133.012304] ? exit_to_usermode_loop+0x87/0x310 [ 133.016992] exit_to_usermode_loop+0x28a/0x310 [ 133.021597] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 133.026454] ? fput+0x130/0x1a0 [ 133.029747] ? do_syscall_64+0x92/0x800 [ 133.033744] do_syscall_64+0x6ac/0x800 [ 133.037650] ? finish_task_switch+0x1ca/0x810 [ 133.042160] ? syscall_return_slowpath+0x5c0/0x5c0 [ 133.047103] ? syscall_return_slowpath+0x30f/0x5c0 [ 133.052069] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 133.057450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 133.062338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 133.067553] RIP: 0033:0x455389 [ 133.070747] RSP: 002b:00007f0b7a5abce8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 133.078644] RAX: 0000000000000000 RBX: 000000000072bec8 RCX: 0000000000455389 [ 133.085917] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000072bec8 2018/04/21 01:40:42 executing program 4: r0 = socket$nl_xfrm(0xa, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000000)={0x10}, 0xc) [ 133.093180] RBP: 000000000072bec8 R08: 0000000000000000 R09: 000000000072bea0 [ 133.100438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 133.107697] R13: 00007ffcc5f7124f R14: 00007f0b7a5ac9c0 R15: 0000000000000000 [ 133.114961] ================================================================== [ 133.122302] Disabling lock debugging due to kernel taint [ 133.128209] Kernel panic - not syncing: panic_on_warn set ... [ 133.128209] [ 133.135592] CPU: 1 PID: 10822 Comm: syz-executor7 Tainted: G B 4.17.0-rc1+ #10 2018/04/21 01:40:42 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180), 0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) clock_gettime(0x0, &(0x7f00000002c0)) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0x7530}}) 2018/04/21 01:40:42 executing program 4: r0 = socket$nl_xfrm(0xa, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000000)={0x10}, 0xc) [ 133.144255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.153622] Call Trace: [ 133.156228] dump_stack+0x1b9/0x294 [ 133.159875] ? dump_stack_print_info.cold.2+0x52/0x52 [ 133.165082] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 133.169846] ? refcount_add_not_zero+0x300/0x320 [ 133.174614] panic+0x22f/0x4de [ 133.177813] ? add_taint.cold.5+0x16/0x16 [ 133.181972] ? do_raw_spin_unlock+0x9e/0x2e0 [ 133.186389] ? do_raw_spin_unlock+0x9e/0x2e0 [ 133.190810] ? refcount_inc_not_zero+0x8f/0x2d0 2018/04/21 01:40:42 executing program 4: r0 = socket$nl_xfrm(0xa, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000000)={0x10}, 0xc) [ 133.195577] kasan_end_report+0x47/0x4f [ 133.199559] kasan_report.cold.7+0x76/0x2fe [ 133.203894] check_memory_region+0x13e/0x1b0 [ 133.208313] kasan_check_read+0x11/0x20 [ 133.212304] refcount_inc_not_zero+0x8f/0x2d0 [ 133.216813] ? refcount_add_not_zero+0x320/0x320 [ 133.221581] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 133.226611] ? lock_sock_nested+0x9f/0x120 [ 133.230860] refcount_inc+0x15/0x70 [ 133.234503] llc_ui_release+0xba/0x2b0 [ 133.238398] ? fsnotify_first_mark+0x330/0x330 [ 133.242990] sock_release+0x96/0x1b0 [ 133.246706] ? sock_alloc_file+0x4e0/0x4e0 [ 133.250947] sock_close+0x16/0x20 [ 133.254405] __fput+0x34d/0x890 [ 133.257692] ? fput+0x1a0/0x1a0 [ 133.260980] ? _raw_spin_unlock_irq+0x27/0x70 [ 133.265488] ____fput+0x15/0x20 [ 133.268777] task_work_run+0x1e4/0x290 [ 133.272709] ? task_work_cancel+0x240/0x240 [ 133.277041] ? switch_task_namespaces+0xbd/0xd0 [ 133.281739] do_exit+0x1aee/0x2730 [ 133.285312] ? mm_update_next_owner+0x980/0x980 [ 133.289989] ? print_usage_bug+0xc0/0xc0 [ 133.294062] ? check_same_owner+0x320/0x320 [ 133.298396] ? do_raw_spin_unlock+0x9e/0x2e0 [ 133.302816] ? rcu_note_context_switch+0x710/0x710 [ 133.307751] ? lock_acquire+0x1dc/0x520 [ 133.311738] ? __might_sleep+0x95/0x190 [ 133.315711] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 133.321235] ? __lock_acquire+0x7f5/0x5140 [ 133.325461] ? kasan_check_write+0x14/0x20 [ 133.329698] ? do_raw_spin_lock+0xc1/0x200 [ 133.333931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 133.339466] ? debug_check_no_locks_freed+0x310/0x310 [ 133.344651] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 133.349832] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 133.355364] ? drop_futex_key_refs.isra.13+0x6d/0xe0 [ 133.360479] ? futex_wait+0x5c1/0x9f0 [ 133.364275] ? perf_trace_lock+0xd6/0x900 [ 133.368437] ? zap_class+0x720/0x720 [ 133.372156] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 133.377348] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 133.382877] ? drop_futex_key_refs.isra.13+0x6d/0xe0 [ 133.387961] ? futex_wake+0x2f6/0x750 [ 133.391746] ? graph_lock+0x170/0x170 [ 133.395549] ? memset+0x31/0x40 [ 133.398826] ? find_held_lock+0x36/0x1c0 [ 133.402891] ? lock_downgrade+0x8e0/0x8e0 [ 133.407046] do_group_exit+0x16f/0x430 [ 133.410939] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 133.415522] ? __ia32_sys_exit+0x50/0x50 [ 133.419592] ? _raw_spin_unlock_irq+0x27/0x70 [ 133.424094] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 133.429114] get_signal+0x886/0x1960 [ 133.432814] ? ptrace_notify+0x130/0x130 [ 133.436881] ? graph_lock+0x170/0x170 [ 133.440665] ? rcu_is_watching+0x85/0x140 [ 133.444803] ? mntput_no_expire+0x186/0xba0 [ 133.449115] ? dentry_kill+0xce/0x5a0 [ 133.452907] ? mnt_get_count+0x150/0x150 [ 133.456966] ? find_held_lock+0x36/0x1c0 [ 133.461016] do_signal+0x98/0x2040 [ 133.464549] ? lock_downgrade+0x8e0/0x8e0 [ 133.468680] ? setup_sigcontext+0x7d0/0x7d0 [ 133.472984] ? kasan_check_read+0x11/0x20 [ 133.477128] ? do_raw_spin_unlock+0x9e/0x2e0 [ 133.481518] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 133.486083] ? _raw_spin_unlock_irq+0x27/0x70 [ 133.490560] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 133.495565] ? exit_to_usermode_loop+0x87/0x310 [ 133.500220] exit_to_usermode_loop+0x28a/0x310 [ 133.504787] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 133.509615] ? fput+0x130/0x1a0 [ 133.512874] ? do_syscall_64+0x92/0x800 [ 133.516832] do_syscall_64+0x6ac/0x800 [ 133.520706] ? finish_task_switch+0x1ca/0x810 [ 133.525184] ? syscall_return_slowpath+0x5c0/0x5c0 [ 133.530121] ? syscall_return_slowpath+0x30f/0x5c0 [ 133.535050] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 133.540407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 133.545243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 133.550421] RIP: 0033:0x455389 [ 133.553589] RSP: 002b:00007f0b7a5abce8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 133.561277] RAX: 0000000000000000 RBX: 000000000072bec8 RCX: 0000000000455389 [ 133.568526] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000072bec8 [ 133.575774] RBP: 000000000072bec8 R08: 0000000000000000 R09: 000000000072bea0 [ 133.583027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 133.591556] R13: 00007ffcc5f7124f R14: 00007f0b7a5ac9c0 R15: 0000000000000000 [ 133.599349] Dumping ftrace buffer: [ 133.602890] (ftrace buffer empty) [ 133.606583] Kernel Offset: disabled [ 133.610200] Rebooting in 86400 seconds..